SlideShare a Scribd company logo
1 of 13
Introduction
When a sensor network is first activated, various tasks must be performed to establish the
necessary infrastructure that will allow useful collaborative work to be performed. In particular,
each node must discover which other nodes it can directly communicate with, and its radio
power must be set appropriately to ensure adequate connectivity. Nodes near one another may
wish to organize themselves into clusters, so that sensing redundancy can be avoided and
scarce resources, such as radio frequency, may be reused across nonoverlapping clusters.
A wireless sensor network may consist of a large number of sensor nodes, and each node is
equipped with sensors, microprocessors, memory, wireless transceiver, and battery. Once
deployed, the sensor nodes form a network through short-range wireless communication. They
collect environmental surveillance data and send them back to the data processing center, which
is also called the sink node or base station. In many applications, wireless sensor networks are
used to monitor some measures of interest, such as temperature, light intensity, air pressure,
humidity etc.
The wireless sensors are mostly deployed in remote and hazardous locations, where manual
monitoring is very difficult or almost impossible. Due to the low cost of wireless sensors, these
can be deployed in large numbers. Apart from sensing, sensor nodes are equipped with data
processing and communication capabilities. The sensing circuitry measures the parameters of
interest (temperature, pressure, etc.) within its sensing range and transforms them into electrical
signals. These electrical signals are processed and with the help of onboard radio they are
transmitted to the remotely located sink node. Due to deployment of wireless sensors in
unattended harsh environment, it is not possible to charge or replace their batteries. Therefore,
energy efficient operation of wireless sensors to prolong the lifetime of overall wireless sensor
Network is of utmost importance. Most of the energy consumption in wireless sensor node is
attributed to transmitting/receiving, processing, and forwarding the data to neighboring nodes.
The dense deployment and unattended nature of WSNs make it quite difficult to recharge node
batteries. Therefore, energy efficiency is a major design goal in these networks.
Grouping sensor nodes into clusters has been widely used to achieve this objective. Clustering is
especially important for sensor network applications where a large number of ad-hoc sensors are
deployed for sensing purposes. If each and every sensor start to communicate and engage in data
transmission in the network, a great network congestion and data collisions will be experienced.
This will result to drain limited energy from the network. Node clustering will address these
issues. Scalability of the network of those WSNs are useful to meet load balancing and efficient
resource utilization constraints.
In cluster networks, sensors are partitioned into smaller clusters and cluster head (CH) for each
cluster is elected. Sensor nodes in each cluster transmit their data to the respective CH and CH
aggregates data and forward them to a central base station. Clustering through creating a
hierarchical WSN facilitates efficient utilization of limited energy of sensor nodes and hence
extends network lifetime. Although sensor nodes in clusters transmit messages over a short
distance (within clusters), more energy is drained from CHs due to message transmission over
long distances (CHs to the base Station) compared to other sensor nodes in the cluster. Periodic
Page 1
re-election of CHs within clusters based on their residual energy is a possible solution to balance
the power consumption of each cluster. In addition, clustering increases the efficiency of data
transmission by reducing number of sensors attempting to transmit data in the WSN, aggregating
data at CHs via intra-cluster communication and reducing total data packet loses.

General Sensor Network Architecture
The following figure shows the general sensor network architecture.

Fig. 1. General Sensor Network Architecture
Sensor Node: A sensor node is the core component of a WSN. Sensor nodes can take on
multiple roles in a network, such as simple sensing; data storage; routing; and data processing.
• Clusters: Clusters are the organizational unit for WSNs. The dense nature of these networks
require the need for them to be broken down into clusters to simplify tasks such a
communication.

Page 2
• Clusterheads: Clusterheads are the organization leader of a cluster. They often are required to
organize activities in the cluster. These tasks include but are not limited to data-aggregation and
organizating the communication schedule of a cluster.
• Base Station: The base station is at the upper level of the hierarchical WSN. It provides the
communication link between the sensor network and the end-user.
• End User: The data in a sensor network can be used for a wide-range of applications.
Therefore, a particular application may make use of the network data over the internet, using a
PDA, or even a desktop computer. In a queried sensor network (where the required data is
gathered from a query sent through the network). This query is generated by the end user.
The clustering phenomenon , plays an important role in not just organization of the network, but
can dramatically affect network performance.

Pros and Cons of Clustering
The pros of Clustering are that it enables bandwidth reuse thus can improve the system capacity.
Due to the fact that within a cluster, all the normal nodes send their data to the CHs so energy
saving is achieved by absence of flooding, multiple routes, or routing loops. Due to the fact that
clustering enables efficient resource allocation and thus help in better designing of power control
and other advantage is due to the fact that any changes of nodes behavior within a cluster affect
only that cluster but not the entire network, which will therefore be robust to these changes.
There are also several cons of existing clustering schemes in WSNs like in the selection of the
cluster heads, some algorithm selects cluster heads only according to the ID number or residual
energy of the sensor nodes. Since all the data in sensor network are sent to the base station, the
traffic near the base station is higher. The sensor nodes in these areas will therefore run out
energy earlier. The base station will then be isolated and as a result, the residual energy stored in
the other sensor nodes will be wasted. Another disadvantage is the energy is wasted by flooding
in route discovery and duplicated transmission of data by multiple routes from the source to the
destination.

Page 3
Design challenges in clustering algoriths
Wireless Sensor Networks present vast challenges in terms of implementation. Design goals
targeted in traditional networking provide little more than a basis for the design in wireless
sensor networks .Decomposition of a WSN into smaller clusters is considered to be a convenient
and an efficient approach to prolong network lifetime through efficient energy utilization of
WSN. Some important design considerations in designing clustering algorithms are discussed
below:
• Limited Energy: Wireless sensor nodes have limited energy storage and once they are
deployed, it is not practical to recharge or replace their batteries. With the capability of reducing
the amount of data transmission, the clustering algorithms are more energy efficient compared to
the direct routing algorithms. This can be achieved by balancing the energy consumption in
sensor nodes by optimizing the cluster formation, periodically reelecting CHs based on their
residual energy, and efficient intra-cluster and inter-cluster communication. But clustering
algorithms should prevent high energy cluster reconstruction process.
• Network Lifetime: The energy limitation on nodes results in a limited network lifetime for
nodes in a network. Clustering helps to prolong the network lifetime of WSNs through reducing
in the number of nodes contending for channel access, data aggregation at CHs via intra-cluster
communication and direct or multi-hop communication by CHs with a base station. Proper
design should focus on increasing network lifetime.
• Limited Abilities: The small physical size and small amount of stored energy in a sensor node
limits many of the abilities of nodes in terms of processing, memory, storage,and
communication.
• Application Dependency: When designing protocols for WSNs, application robustness must be
focused on, as protocols should be able to adapt to a variety of application requirements.
Changes in the deployment environment can also be observed due to variations in the
surrounding conditions.
• Secure Communication: The ability of a WSN to provide secure communication is ever more
important when considering these networks for military applications. The self-organization of a
network has a huge dependence on the application it is required for. An establishment of secure
and energy efficient intra-cluster and inter-cluster communication is one of the important
challenges in designing clustering algorithms since these tiny nodes are deployed unattended in
most cases.
• Cluster formation and CH selection: Cluster formation and CHs selection are two of the
important operations in clustering algorithms. Energy wastage in sensors in WSN due to direct
transmission between sensors and a base station can be avoided by clustering the WSN.
Clustering further enhances scalability of WSN in real world applications. Selecting optimum
cluster size, election and reelection of CHs, and cluster maintenance are the main issues to be
addressed in designing of clustering algorithms. The selection criteria to isolate clusters and to
Page 4
choose the CHs should maximize energy utilization, as well as function for a variety of
applications.
• Synchronization: Slotted transmission schemes such as TDMA allow nodes to regularly
schedule sleep intervals to minimize energy used. Such schemes require synchronization
mechanisms to setup and maintain the transmission schedule and the effectiveness of this
mechanism must be considered.
• Data Aggregation: Data aggregation allows the differentiation between sensed data and useful
data. In a densely populated network there are often multiple nodes sensing similar information.
In network processing this process makes energy optimization possible and now it is
fundamental in many sensor network schemes, as the power required for processing tasks is
substantially less than communication tasks. As such, the amount of data transferred in-network
should be minimized.
• Repair Mechanisms: Due to the nature of Wireless Sensor Networks, they are often prone to
node mobility, node death and interference. All of these situations can result in ink failure. When
looking at clustering schemes, it is important to look at the mechanisms in place for link
recovery and reliable data communication.
• Quality of Service (QoS): Existing clustering algorithms for WSN mainly focus on providing
energy efficient network utilization but pay less attention to QoS support in WSN. From an
overall network standpoint, we can look at QoS requirements in WSNs. Many of these
requirements are application dependant such as acceptable delay and packet loss tolerance. For
example in applications such as habitat monitoring, there is no bound on acceptable delay,
however in military tracking, even a small delay is unacceptable. QoS metrics must be taken into
account in the design process.

Classification of clustering algoriths
Clustering in WSNs involves grouping nodes into clusters and electing a CH such that:
• The members of a cluster can communicate with their CH directly.
• A CH can forward the aggregated data to the central base station through other CHs.
Thus, the collection of CHs in the network forms a connected dominating set. Research on
clustering in WSNs has focused on developing centralized and distributed algorithms to compute
connected dominating sets. Distributed approaches are more practical for large-scale deployment
scenarios. Since obtaining an optimal dominating set is an NP-complete problem, the proposed
algorithms are heuristic in nature.
We classify the clustering techniques based on two criteria:
• The parameter(s) used for electing CHs
• The execution nature of a clustering algorithm (probabilistic or iterative)

Page 5
In self-organization schemes, CHs are nodes that consume more energy than cluster members
when they involve in aggregating, processing and routing data. Clustering algorithms are
heuristic in nature and NP hard. Distributed clustering algorithms are more feasible compared to
centralized clustering algorithms since central control of large number of sensor nodes are not
practical. Only distributed clustering algorithms therefore are considered in this analysis.
Existing clustering algorithms can be categorized into four groups vertically depending on
cluster formation criteria and parameters used for CH election. Some algorithms make decisions
on cluster formation and CHs selection based on pre-collected network information or heuristics
with some specific assumptions on some desirable properties. Node identifiers, node weights
based on the significance of the sensor node, number of neighboring nodes, probabilities
assigned to nodes and residual energy of nodes are common parameters in selecting CHs. If
overheads of collecting prior information about the network are significant or heuristics and
assumptions are not much realistic, energy efficiency and higher network lifetime may not be
achieved. Based on the cluster formation methodology and CH selection criteria, clustering
algorithms are classified into:
1. Identity-based clustering algorithms,
2. Neighborhood information based clustering algorithms,
3. Probabilistic clustering algorithms and
4. Biologically inspired clustering algorithms

We will now provide an overview of the clustering algorithms that are most commonly
considered when investing the self-organization of WSNs.

Page 6
1. Identity-based clustering algorithms: Uniformly assigned unique identifiers are the
key parameter for selecting CHs in Identity-based clustering algorithms [1][2]. For a
sensor node to be the CH, it should have the highest identity among all one-hop sensor
nodes [1] or the lowest identity among all nodes that are neither a cluster head nor are
within one hop of already selected CH [2]. These algorithms may not favor the energy
limited sensor networks since they drain the power of some nodes in the network.
Generally these algorithms are coming under static clustering algorithms and do not
change the CHs once selected. However, energy efficiency is not a primary objective of
most of Identity-based clustering algorithms. A load balancing heuristic can be added to
these algorithms and hence, longer, low variance CH durations can be achieved.The
following are Identity-based clustering algorithms:

Linked Cluster Algorithm (LCA)]: In LCA, each node is assigned a unique ID
number and has two ways of becoming a CH. The first way is if a node has the highest ID
number in the set including all neighbor nodes and the node itself. The second way,
assuming none of its neighbors are CHs, then it becomes a CH. LCA2 [2], an extension
of LCA, was proposed to eliminate the election of an unnecessary number of CHs. Here
the concept of a node being covered and noncovered is introduced. A node is covered if
one of its neighbors is a CH. CHs are elected starting with the node having the lowest ID
among non-covered neighbors. LCA2 generates smaller number of clusters compared to
LCA.
LCA and LCA2 have very limited scope as clustering algorithms for WSN since they did
not address the issue of limited energy of WSN. Both algorithms form 1-hop clusters
requiring clock synchronization with time complexity of O(n). Load balancing of
LCA/LCA2 focuses only on intra-cluster communication and is not favorable for real
applications.

2. Neighborhood information based clustering algorithms:
In neighborhood information based clustering algorithms; sensors should have information about
their neighbors and should be able to decide on number of neighbors within a pre-specified
transmission range (cluster range). Based on connectivity-based heuristics considering number of
neighbors, some algorithms elect sensors with maximum number of 1-hop neighbors as the CHs .
Some other algorithms under this category use a combination of metrics in addition to node
degree such as: transmission power; mobility; and the remaining energy of the nodes .
Depending on specific application, any or all of these parameters will be utilized for CH
selection. The power consumption at CHs can be reduced by using load balancing heuristic in
these algorithms. This may further build a larger number of clusters within the network creating
congestion in data routing to a base station. Re-clustering or CH reelection is not considered in
these algorithms and mostly they are static clustering algorithms. The following are
neighborhood information based clustering algorithms:

Page 7
Highest-Connectivity Cluster Algorithm : In this scheme each node broadcasts the
number of neighbors it has to the surrounding nodes. Here the connectivity of a node is
considered. The node with the highest connectivity (highest degree) is elected CH, but in
the case of a tie, the node with the lowest ID prevails. Node which has already selected a
CH withdraws its intention to be a CH. The connectivity– based heuristic used in this
scheme elects the sensor with maximum number of 1-hop neighbors as the CH. The
creation of one-hop cluster and clock synchronization requirement limit the practical
usage of the algorithm.

Max-Min D-Cluster Algorithm: This is a distributed algorithm for CH election, where
no node is more than d hops away from the CH where d (>1) is a value selected for the
heuristic in the algorithm. CHs are selected based on their node ID. Therefore a change in
the network topology will not have much influence on the node clusters and CHs.
The time complexity of generating d-hop clusters is O(d) and this algorithm does not require
clock synchronization as LCA/LCA2 or highest connectivity algorithm. This algorithm further
provides a better load balancing compared to LCA/LCA2 algorithm and highest connectivity
cluster algorithm.

Weighted Clustering Algorithm (WCA) : This algorithm is a non-periodic procedure
for CH election. It is invoked on demand every time a reconfiguration of the network’s
topology is unavoidable. A new election is invoked every time a sensor loses the
connection with any CH, thus saving power. WCA is based on a combination of metrics
that take into account several system parameters such as: the ideal node degree;
transmission power; mobility; and the remaining energy of the nodes. Depending on the
specific application, any or all of these parameters can be used as a metric to elect CHs.
The election procedure is based upon a global parameter that is called combined weight.

Linked Cluster Algorithm (LCA)]: One of the first clustering algorithms developed
and was meant for wired sensors, but has since been implemented for Wireless Sensor
Networks. In LCA, each node is assigned a unique ID number and has two ways of
becoming a CH. The first way is if a node has the highest ID number in the set including
all neighbor nodes and the node itself. The second way, assuming none of its neighbors
are CHs, then it becomes a CH. LCA2 , an extension of LCA, was proposed to eliminate
the election of an unnecessary number of CHs. LCA2 generates smaller number of
clusters compared to LCA. LCA and LCA2 have very limited scope as clustering
algorithms for WSN since they did not address the issue of limited energy of WSN. Both
algorithms form 1-hop clusters requiring clock synchronization with time complexity of
O(n). Load balancing of LCA/LCA2 focuses only on intra-cluster communication and is
not favorable for real applications. This algorithm attempted to provide better load
balancing through reduced number of sensors in a cluster but the requirement of clock
synchronization limits its applications.

Grid-clustering ROUting Protocol (GROUP): In this algorithm one of the sinks
(called the primary sink), dynamically and randomly builds the cluster grid, where CHs
are arranged in a grid-like manner. Forwarding of data queries from the sink to source
Page 8
node is propagated from the Grid Seed (GS) to its CHs, and so on. In the case of a
location unaware data query the query is passed from the central most sink in the network
to its nearest CH. That CH will then broadcast the message to neighboring CHs. If the
data is location aware, then the requests are sent down the chain of CHs towards the
specified region using unicast packets. For both data queries, data is transmitted upstream
through the chain of CHs established during cluster formation. Energy conservation is
achieved due to the lower transmission distance for upstream data.
PEGASIS: It offers promising improvements with relation to network lifetime, however
reliability may not be as promising. In PEGASIS, each node communicates with its
nearest neighbor. This implementation may be more susceptible to failure due to gaps in
the network.

Clustering Algorithm via Waiting Timer - CWAT: A decentralized algorithm for
organizing clusters has been proposed for homogeneous sensors with the same
transmission range. The performance of CWAT was evaluated using simplified
simulations. It is observed that the generalization of the proposed algorithm is needed to
see its performance with respect to load balancing, CH reelection and energy usage
across the network.
3 .Probabilistic clustering algorithms:
In Probabilistic clustering algorithm, a prior probability assigned to each sensor node is used to
determine CHs. The probabilities assigned to individual node in the cluster facilitate individual
node to decide on their election as a CH in the cluster while considering few other primary
parameters. In addition to the probability assigned to each node, residual energy at nodes or node
degree is taken as the primary parameter to elect CH. Clustering algorithms in this category
shows faster convergence in addition to energy efficient network utilization, efficient load
balancing and low message overheads. The following are Probabilistic clustering algorithms:

Low-Energy Adaptive Clustering Hierarchy (LEACH) : This algorithm was one of
the first major improvements on conventional clustering. It provides a balancing of
energy usage by random rotation of CHs. The algorithm is also organized in such a
manner that data fusion can be used to reduce the amount of data transmission. The
decision of whether a node elevates itself to CH is made dynamically at each interval, to
minimize overhead in CH establishment. This decision is a function of the percentage of
optimal CHs in a network (determined a priori on application), in combination with how
often and the last time a given node was the CH. This scheduling scheme allows for
energy minimization as nodes can turn off their radio during all but their scheduled timeslot.
Therefore LEACH provides an uniform load balancing in one-hop sensor networks. Localized
coordination scheme used in LEACH provides better scalability for cluster formation and better
load balancing enhances the network lifetime.

Page 9
Two-Level LEACH (TL-LEACH) [14]: This algorithm is an extension to LEACH
and utilizes two levels of CHs (primary and secondary). The primary CH in each cluster
communicates with the secondaries and the corresponding secondaries communicate with
the nodes in their subcluster. Data-fusion can also be performed as in LEACH. In
addition, communication with a cluster is still scheduled using TDMA time-slots. The
organization of a round will consist of first selecting the primary and secondary CHs
using the same mechanism as LEACH, with a priori probability of being elevated to a
primary CH less than that of a secondary node. The two-level structure of TL-LEACH
reduces the amount of nodes that need to transmit to the base station, effectively reducing
the total energy usage.

Energy Efficient Clustering Scheme (EECS): EECS is similar to LEACH with some
enhancement in cluster formation and cluster head selection process. According to
residual energy of sensor nodes, a constant number of CHs are elected using localized
competition process without iteration. In EECS, clusters are formed by dynamic sizing of
clusters based on cluster distance from the base station. The result is an algorithm that
addresses the problem that clusters at a greater distance from the base station require
more energy for transmission than those that are closer. This provides much lower
message overheads and uniform distribution of CHs compared to LEACH.

Hybrid Energy Efficient Distributed Clustering (HEED) : HEED is a multi-hop
clustering algorithm for Wireless Sensor Networks. CHs are chosen based on two
important parameters: residual energy and intra-cluster communication cost. Residual
energy of each node is used to probabilistically choose the initial set of CHs, as
commonly done in other clustering schemes. In HEED, Intra-Cluster Communication
Cost reflects the node degree or node’s proximity to the neighbor and is used by the
nodes in deciding to join the cluster. Low cluster power levels promote an increase in
spatial reuse while high cluster power levels are required for inter-cluster communication
as they span two or more cluster areas. HEED provides a uniform CH distribution across
the network and better load balancing. However, knowledge of the entire network is
needed to determine intra-cluster communication cost and configuration of those
parameters might be difficult in the practical world.

Time Controlled Clustering Algorithm -TCCA : Similar to LEACH, the operation of
TCCA is divided into rounds enabling better load distribution among sensor nodes. Each
round consists of a cluster setup phase targeting at cluster formation and CH selection,
and a steady state phase focusing cyclic collection, aggregation and transfer of data at CH
to a base station. Node’s residual energy and a desired CH probability are considered in
the eligibility criteria for CH selection. Once the CH is selected it advertises its selection
as the CH to the neighboring nodes by sending an advertisement message (ADV) which
includes its node id, initial Time-To-Live (TTL), its residual energy and a timestamp.
TTL selected based on residual energy of the node is used to limit the size of the cluster
to be formed.

4. Biologically inspired clustering algorithms:
Page 10
Recently proposed biologically inspired clustering algorithms utilize swarm intelligence
techniques which model the collective behavior of social insects like ants. These algorithms are
not yet matured and improvements are to be sought. In these clustering algorithms, colonial
closure model which has been derived based on ant colonies are used. Biologically inspired
clustering algorithms show that they can dynamically control the CH selection while achieving
uniform distribution of CHs and optimal number of clusters.Following is biologically inspired
clustering algorithm:

ANTCLUST based clustering : In this, Swarm Intelligence based clustering algorithm
has been proposed. Swarm intelligence is a technique used to model the collective
behavior of social insects like ants and shows the properties of robustness, distributed
problem solving capabilities, de-centralized performance. ANTCLUST is a model of an
ant colonial closure to solve clustering problems. In the ANTCLUST-based clustering
method, sensor nodes with more residual energy become cluster heads independently.
Then, randomly chosen nodes meet with each other and clusters are created, merged, and
discarded through local meetings. Each sensor node with less residual energy chooses a
cluster based on the residual energy of the cluster head, its distance to the cluster head,
and an estimation of the cluster size. Eventually energy efficient clusters are formed that
result in an extension of the lifetime of a sensor network.

Page 11
Conclusion:
Wireless sensor networks (WSNs) have attracted significant attention over the past few years. A
growing list of civil and military applications can employ WSNs for increased effectiveness;
especially in hostile and remote areas. Examples include disaster management, border protection,
combat field surveillance. In these applications a large number of sensors are expected, requiring
careful architecture and management of the network.
Grouping nodes into clusters has been the most popular approach for support scalability in
WSNs.Clustering is an important technique that
▫ Prolongs network lifetime
▫ Reduces channel contention
▫ Reduces collisions
Significant attention has been paid to clustering algorithms.

Page 12
References:
[1] Ossama Younis, Marwan Krunz, and Srinivas Ramasubramanian, “Node Clustering in
Wireless Sensor Networks: Recent Developments and Deployment Challenges”, IEEE
Network, 2006.
[2] P. Kumarawadu*, D. J. Dechene+, M. Luccini+, and A. Sauer, “Algorithms for
Node Clustering in Wireless Sensor Networks: A Survey”, IEEE,2008
[3] D.J. Baker and A. Epheremides, “The Architectural Organization of a Mobile Radio
Network via a Distributed Algorithm,” IEEE Transactions on Communications, 1981,
vol. Com-29,no.11.
[4]
M. Chatterjee, S. K. Das and D. Turgut, “WCA: A Weighted Clustering
Algorithm for Mobile Ad Hoc Networks,” Clustering Computing, 2002, vol. 5,
pp. 193–204
[5] A. Amis, R. Prakash, T. Vuong and D. Huynh, “Max-Min D-Cluster Formation in
Wireless Ad Hoc Networks,” IEEE INFOCOM, March 2000.
[6] M. Ye, C. Li, G. Chen and J. Wu, “An Energy Efficient Clustering Scheme
in Wireless Sensor Networks,” Ad Hoc & Sensor Wireless Networks,2006,
vol.1, pp.1–21.
[7] Mao YE, Chengfa LI, Guihai CHEN and Jie WU, “An Energy Efficient
Clustering Scheme in Wireless Sensor Networks”, Ad Hoc & Sensor
Wireless Networks, 2005, Vol. 3, pp. 99-119

Page 13

More Related Content

What's hot

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocoleSAT Publishing House
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ijwmn
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 

What's hot (19)

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 

Similar to Report

Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's finalsumavaidya90
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
 
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...IJCNCJournal
 
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...IJCNCJournal
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 

Similar to Report (20)

A250106
A250106A250106
A250106
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
De3211001104
De3211001104De3211001104
De3211001104
 
D035418024
D035418024D035418024
D035418024
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
Energy consumption mitigation routing protocols for large wsn's final
Energy consumption mitigation  routing protocols for large wsn's finalEnergy consumption mitigation  routing protocols for large wsn's final
Energy consumption mitigation routing protocols for large wsn's final
 
F04623943
F04623943F04623943
F04623943
 
pxc3903794
pxc3903794pxc3903794
pxc3903794
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
C018141418
C018141418C018141418
C018141418
 
B05630814
B05630814B05630814
B05630814
 
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...
 
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Report

  • 1. Introduction When a sensor network is first activated, various tasks must be performed to establish the necessary infrastructure that will allow useful collaborative work to be performed. In particular, each node must discover which other nodes it can directly communicate with, and its radio power must be set appropriately to ensure adequate connectivity. Nodes near one another may wish to organize themselves into clusters, so that sensing redundancy can be avoided and scarce resources, such as radio frequency, may be reused across nonoverlapping clusters. A wireless sensor network may consist of a large number of sensor nodes, and each node is equipped with sensors, microprocessors, memory, wireless transceiver, and battery. Once deployed, the sensor nodes form a network through short-range wireless communication. They collect environmental surveillance data and send them back to the data processing center, which is also called the sink node or base station. In many applications, wireless sensor networks are used to monitor some measures of interest, such as temperature, light intensity, air pressure, humidity etc. The wireless sensors are mostly deployed in remote and hazardous locations, where manual monitoring is very difficult or almost impossible. Due to the low cost of wireless sensors, these can be deployed in large numbers. Apart from sensing, sensor nodes are equipped with data processing and communication capabilities. The sensing circuitry measures the parameters of interest (temperature, pressure, etc.) within its sensing range and transforms them into electrical signals. These electrical signals are processed and with the help of onboard radio they are transmitted to the remotely located sink node. Due to deployment of wireless sensors in unattended harsh environment, it is not possible to charge or replace their batteries. Therefore, energy efficient operation of wireless sensors to prolong the lifetime of overall wireless sensor Network is of utmost importance. Most of the energy consumption in wireless sensor node is attributed to transmitting/receiving, processing, and forwarding the data to neighboring nodes. The dense deployment and unattended nature of WSNs make it quite difficult to recharge node batteries. Therefore, energy efficiency is a major design goal in these networks. Grouping sensor nodes into clusters has been widely used to achieve this objective. Clustering is especially important for sensor network applications where a large number of ad-hoc sensors are deployed for sensing purposes. If each and every sensor start to communicate and engage in data transmission in the network, a great network congestion and data collisions will be experienced. This will result to drain limited energy from the network. Node clustering will address these issues. Scalability of the network of those WSNs are useful to meet load balancing and efficient resource utilization constraints. In cluster networks, sensors are partitioned into smaller clusters and cluster head (CH) for each cluster is elected. Sensor nodes in each cluster transmit their data to the respective CH and CH aggregates data and forward them to a central base station. Clustering through creating a hierarchical WSN facilitates efficient utilization of limited energy of sensor nodes and hence extends network lifetime. Although sensor nodes in clusters transmit messages over a short distance (within clusters), more energy is drained from CHs due to message transmission over long distances (CHs to the base Station) compared to other sensor nodes in the cluster. Periodic Page 1
  • 2. re-election of CHs within clusters based on their residual energy is a possible solution to balance the power consumption of each cluster. In addition, clustering increases the efficiency of data transmission by reducing number of sensors attempting to transmit data in the WSN, aggregating data at CHs via intra-cluster communication and reducing total data packet loses. General Sensor Network Architecture The following figure shows the general sensor network architecture. Fig. 1. General Sensor Network Architecture Sensor Node: A sensor node is the core component of a WSN. Sensor nodes can take on multiple roles in a network, such as simple sensing; data storage; routing; and data processing. • Clusters: Clusters are the organizational unit for WSNs. The dense nature of these networks require the need for them to be broken down into clusters to simplify tasks such a communication. Page 2
  • 3. • Clusterheads: Clusterheads are the organization leader of a cluster. They often are required to organize activities in the cluster. These tasks include but are not limited to data-aggregation and organizating the communication schedule of a cluster. • Base Station: The base station is at the upper level of the hierarchical WSN. It provides the communication link between the sensor network and the end-user. • End User: The data in a sensor network can be used for a wide-range of applications. Therefore, a particular application may make use of the network data over the internet, using a PDA, or even a desktop computer. In a queried sensor network (where the required data is gathered from a query sent through the network). This query is generated by the end user. The clustering phenomenon , plays an important role in not just organization of the network, but can dramatically affect network performance. Pros and Cons of Clustering The pros of Clustering are that it enables bandwidth reuse thus can improve the system capacity. Due to the fact that within a cluster, all the normal nodes send their data to the CHs so energy saving is achieved by absence of flooding, multiple routes, or routing loops. Due to the fact that clustering enables efficient resource allocation and thus help in better designing of power control and other advantage is due to the fact that any changes of nodes behavior within a cluster affect only that cluster but not the entire network, which will therefore be robust to these changes. There are also several cons of existing clustering schemes in WSNs like in the selection of the cluster heads, some algorithm selects cluster heads only according to the ID number or residual energy of the sensor nodes. Since all the data in sensor network are sent to the base station, the traffic near the base station is higher. The sensor nodes in these areas will therefore run out energy earlier. The base station will then be isolated and as a result, the residual energy stored in the other sensor nodes will be wasted. Another disadvantage is the energy is wasted by flooding in route discovery and duplicated transmission of data by multiple routes from the source to the destination. Page 3
  • 4. Design challenges in clustering algoriths Wireless Sensor Networks present vast challenges in terms of implementation. Design goals targeted in traditional networking provide little more than a basis for the design in wireless sensor networks .Decomposition of a WSN into smaller clusters is considered to be a convenient and an efficient approach to prolong network lifetime through efficient energy utilization of WSN. Some important design considerations in designing clustering algorithms are discussed below: • Limited Energy: Wireless sensor nodes have limited energy storage and once they are deployed, it is not practical to recharge or replace their batteries. With the capability of reducing the amount of data transmission, the clustering algorithms are more energy efficient compared to the direct routing algorithms. This can be achieved by balancing the energy consumption in sensor nodes by optimizing the cluster formation, periodically reelecting CHs based on their residual energy, and efficient intra-cluster and inter-cluster communication. But clustering algorithms should prevent high energy cluster reconstruction process. • Network Lifetime: The energy limitation on nodes results in a limited network lifetime for nodes in a network. Clustering helps to prolong the network lifetime of WSNs through reducing in the number of nodes contending for channel access, data aggregation at CHs via intra-cluster communication and direct or multi-hop communication by CHs with a base station. Proper design should focus on increasing network lifetime. • Limited Abilities: The small physical size and small amount of stored energy in a sensor node limits many of the abilities of nodes in terms of processing, memory, storage,and communication. • Application Dependency: When designing protocols for WSNs, application robustness must be focused on, as protocols should be able to adapt to a variety of application requirements. Changes in the deployment environment can also be observed due to variations in the surrounding conditions. • Secure Communication: The ability of a WSN to provide secure communication is ever more important when considering these networks for military applications. The self-organization of a network has a huge dependence on the application it is required for. An establishment of secure and energy efficient intra-cluster and inter-cluster communication is one of the important challenges in designing clustering algorithms since these tiny nodes are deployed unattended in most cases. • Cluster formation and CH selection: Cluster formation and CHs selection are two of the important operations in clustering algorithms. Energy wastage in sensors in WSN due to direct transmission between sensors and a base station can be avoided by clustering the WSN. Clustering further enhances scalability of WSN in real world applications. Selecting optimum cluster size, election and reelection of CHs, and cluster maintenance are the main issues to be addressed in designing of clustering algorithms. The selection criteria to isolate clusters and to Page 4
  • 5. choose the CHs should maximize energy utilization, as well as function for a variety of applications. • Synchronization: Slotted transmission schemes such as TDMA allow nodes to regularly schedule sleep intervals to minimize energy used. Such schemes require synchronization mechanisms to setup and maintain the transmission schedule and the effectiveness of this mechanism must be considered. • Data Aggregation: Data aggregation allows the differentiation between sensed data and useful data. In a densely populated network there are often multiple nodes sensing similar information. In network processing this process makes energy optimization possible and now it is fundamental in many sensor network schemes, as the power required for processing tasks is substantially less than communication tasks. As such, the amount of data transferred in-network should be minimized. • Repair Mechanisms: Due to the nature of Wireless Sensor Networks, they are often prone to node mobility, node death and interference. All of these situations can result in ink failure. When looking at clustering schemes, it is important to look at the mechanisms in place for link recovery and reliable data communication. • Quality of Service (QoS): Existing clustering algorithms for WSN mainly focus on providing energy efficient network utilization but pay less attention to QoS support in WSN. From an overall network standpoint, we can look at QoS requirements in WSNs. Many of these requirements are application dependant such as acceptable delay and packet loss tolerance. For example in applications such as habitat monitoring, there is no bound on acceptable delay, however in military tracking, even a small delay is unacceptable. QoS metrics must be taken into account in the design process. Classification of clustering algoriths Clustering in WSNs involves grouping nodes into clusters and electing a CH such that: • The members of a cluster can communicate with their CH directly. • A CH can forward the aggregated data to the central base station through other CHs. Thus, the collection of CHs in the network forms a connected dominating set. Research on clustering in WSNs has focused on developing centralized and distributed algorithms to compute connected dominating sets. Distributed approaches are more practical for large-scale deployment scenarios. Since obtaining an optimal dominating set is an NP-complete problem, the proposed algorithms are heuristic in nature. We classify the clustering techniques based on two criteria: • The parameter(s) used for electing CHs • The execution nature of a clustering algorithm (probabilistic or iterative) Page 5
  • 6. In self-organization schemes, CHs are nodes that consume more energy than cluster members when they involve in aggregating, processing and routing data. Clustering algorithms are heuristic in nature and NP hard. Distributed clustering algorithms are more feasible compared to centralized clustering algorithms since central control of large number of sensor nodes are not practical. Only distributed clustering algorithms therefore are considered in this analysis. Existing clustering algorithms can be categorized into four groups vertically depending on cluster formation criteria and parameters used for CH election. Some algorithms make decisions on cluster formation and CHs selection based on pre-collected network information or heuristics with some specific assumptions on some desirable properties. Node identifiers, node weights based on the significance of the sensor node, number of neighboring nodes, probabilities assigned to nodes and residual energy of nodes are common parameters in selecting CHs. If overheads of collecting prior information about the network are significant or heuristics and assumptions are not much realistic, energy efficiency and higher network lifetime may not be achieved. Based on the cluster formation methodology and CH selection criteria, clustering algorithms are classified into: 1. Identity-based clustering algorithms, 2. Neighborhood information based clustering algorithms, 3. Probabilistic clustering algorithms and 4. Biologically inspired clustering algorithms We will now provide an overview of the clustering algorithms that are most commonly considered when investing the self-organization of WSNs. Page 6
  • 7. 1. Identity-based clustering algorithms: Uniformly assigned unique identifiers are the key parameter for selecting CHs in Identity-based clustering algorithms [1][2]. For a sensor node to be the CH, it should have the highest identity among all one-hop sensor nodes [1] or the lowest identity among all nodes that are neither a cluster head nor are within one hop of already selected CH [2]. These algorithms may not favor the energy limited sensor networks since they drain the power of some nodes in the network. Generally these algorithms are coming under static clustering algorithms and do not change the CHs once selected. However, energy efficiency is not a primary objective of most of Identity-based clustering algorithms. A load balancing heuristic can be added to these algorithms and hence, longer, low variance CH durations can be achieved.The following are Identity-based clustering algorithms: Linked Cluster Algorithm (LCA)]: In LCA, each node is assigned a unique ID number and has two ways of becoming a CH. The first way is if a node has the highest ID number in the set including all neighbor nodes and the node itself. The second way, assuming none of its neighbors are CHs, then it becomes a CH. LCA2 [2], an extension of LCA, was proposed to eliminate the election of an unnecessary number of CHs. Here the concept of a node being covered and noncovered is introduced. A node is covered if one of its neighbors is a CH. CHs are elected starting with the node having the lowest ID among non-covered neighbors. LCA2 generates smaller number of clusters compared to LCA. LCA and LCA2 have very limited scope as clustering algorithms for WSN since they did not address the issue of limited energy of WSN. Both algorithms form 1-hop clusters requiring clock synchronization with time complexity of O(n). Load balancing of LCA/LCA2 focuses only on intra-cluster communication and is not favorable for real applications. 2. Neighborhood information based clustering algorithms: In neighborhood information based clustering algorithms; sensors should have information about their neighbors and should be able to decide on number of neighbors within a pre-specified transmission range (cluster range). Based on connectivity-based heuristics considering number of neighbors, some algorithms elect sensors with maximum number of 1-hop neighbors as the CHs . Some other algorithms under this category use a combination of metrics in addition to node degree such as: transmission power; mobility; and the remaining energy of the nodes . Depending on specific application, any or all of these parameters will be utilized for CH selection. The power consumption at CHs can be reduced by using load balancing heuristic in these algorithms. This may further build a larger number of clusters within the network creating congestion in data routing to a base station. Re-clustering or CH reelection is not considered in these algorithms and mostly they are static clustering algorithms. The following are neighborhood information based clustering algorithms: Page 7
  • 8. Highest-Connectivity Cluster Algorithm : In this scheme each node broadcasts the number of neighbors it has to the surrounding nodes. Here the connectivity of a node is considered. The node with the highest connectivity (highest degree) is elected CH, but in the case of a tie, the node with the lowest ID prevails. Node which has already selected a CH withdraws its intention to be a CH. The connectivity– based heuristic used in this scheme elects the sensor with maximum number of 1-hop neighbors as the CH. The creation of one-hop cluster and clock synchronization requirement limit the practical usage of the algorithm. Max-Min D-Cluster Algorithm: This is a distributed algorithm for CH election, where no node is more than d hops away from the CH where d (>1) is a value selected for the heuristic in the algorithm. CHs are selected based on their node ID. Therefore a change in the network topology will not have much influence on the node clusters and CHs. The time complexity of generating d-hop clusters is O(d) and this algorithm does not require clock synchronization as LCA/LCA2 or highest connectivity algorithm. This algorithm further provides a better load balancing compared to LCA/LCA2 algorithm and highest connectivity cluster algorithm. Weighted Clustering Algorithm (WCA) : This algorithm is a non-periodic procedure for CH election. It is invoked on demand every time a reconfiguration of the network’s topology is unavoidable. A new election is invoked every time a sensor loses the connection with any CH, thus saving power. WCA is based on a combination of metrics that take into account several system parameters such as: the ideal node degree; transmission power; mobility; and the remaining energy of the nodes. Depending on the specific application, any or all of these parameters can be used as a metric to elect CHs. The election procedure is based upon a global parameter that is called combined weight. Linked Cluster Algorithm (LCA)]: One of the first clustering algorithms developed and was meant for wired sensors, but has since been implemented for Wireless Sensor Networks. In LCA, each node is assigned a unique ID number and has two ways of becoming a CH. The first way is if a node has the highest ID number in the set including all neighbor nodes and the node itself. The second way, assuming none of its neighbors are CHs, then it becomes a CH. LCA2 , an extension of LCA, was proposed to eliminate the election of an unnecessary number of CHs. LCA2 generates smaller number of clusters compared to LCA. LCA and LCA2 have very limited scope as clustering algorithms for WSN since they did not address the issue of limited energy of WSN. Both algorithms form 1-hop clusters requiring clock synchronization with time complexity of O(n). Load balancing of LCA/LCA2 focuses only on intra-cluster communication and is not favorable for real applications. This algorithm attempted to provide better load balancing through reduced number of sensors in a cluster but the requirement of clock synchronization limits its applications. Grid-clustering ROUting Protocol (GROUP): In this algorithm one of the sinks (called the primary sink), dynamically and randomly builds the cluster grid, where CHs are arranged in a grid-like manner. Forwarding of data queries from the sink to source Page 8
  • 9. node is propagated from the Grid Seed (GS) to its CHs, and so on. In the case of a location unaware data query the query is passed from the central most sink in the network to its nearest CH. That CH will then broadcast the message to neighboring CHs. If the data is location aware, then the requests are sent down the chain of CHs towards the specified region using unicast packets. For both data queries, data is transmitted upstream through the chain of CHs established during cluster formation. Energy conservation is achieved due to the lower transmission distance for upstream data. PEGASIS: It offers promising improvements with relation to network lifetime, however reliability may not be as promising. In PEGASIS, each node communicates with its nearest neighbor. This implementation may be more susceptible to failure due to gaps in the network. Clustering Algorithm via Waiting Timer - CWAT: A decentralized algorithm for organizing clusters has been proposed for homogeneous sensors with the same transmission range. The performance of CWAT was evaluated using simplified simulations. It is observed that the generalization of the proposed algorithm is needed to see its performance with respect to load balancing, CH reelection and energy usage across the network. 3 .Probabilistic clustering algorithms: In Probabilistic clustering algorithm, a prior probability assigned to each sensor node is used to determine CHs. The probabilities assigned to individual node in the cluster facilitate individual node to decide on their election as a CH in the cluster while considering few other primary parameters. In addition to the probability assigned to each node, residual energy at nodes or node degree is taken as the primary parameter to elect CH. Clustering algorithms in this category shows faster convergence in addition to energy efficient network utilization, efficient load balancing and low message overheads. The following are Probabilistic clustering algorithms: Low-Energy Adaptive Clustering Hierarchy (LEACH) : This algorithm was one of the first major improvements on conventional clustering. It provides a balancing of energy usage by random rotation of CHs. The algorithm is also organized in such a manner that data fusion can be used to reduce the amount of data transmission. The decision of whether a node elevates itself to CH is made dynamically at each interval, to minimize overhead in CH establishment. This decision is a function of the percentage of optimal CHs in a network (determined a priori on application), in combination with how often and the last time a given node was the CH. This scheduling scheme allows for energy minimization as nodes can turn off their radio during all but their scheduled timeslot. Therefore LEACH provides an uniform load balancing in one-hop sensor networks. Localized coordination scheme used in LEACH provides better scalability for cluster formation and better load balancing enhances the network lifetime. Page 9
  • 10. Two-Level LEACH (TL-LEACH) [14]: This algorithm is an extension to LEACH and utilizes two levels of CHs (primary and secondary). The primary CH in each cluster communicates with the secondaries and the corresponding secondaries communicate with the nodes in their subcluster. Data-fusion can also be performed as in LEACH. In addition, communication with a cluster is still scheduled using TDMA time-slots. The organization of a round will consist of first selecting the primary and secondary CHs using the same mechanism as LEACH, with a priori probability of being elevated to a primary CH less than that of a secondary node. The two-level structure of TL-LEACH reduces the amount of nodes that need to transmit to the base station, effectively reducing the total energy usage. Energy Efficient Clustering Scheme (EECS): EECS is similar to LEACH with some enhancement in cluster formation and cluster head selection process. According to residual energy of sensor nodes, a constant number of CHs are elected using localized competition process without iteration. In EECS, clusters are formed by dynamic sizing of clusters based on cluster distance from the base station. The result is an algorithm that addresses the problem that clusters at a greater distance from the base station require more energy for transmission than those that are closer. This provides much lower message overheads and uniform distribution of CHs compared to LEACH. Hybrid Energy Efficient Distributed Clustering (HEED) : HEED is a multi-hop clustering algorithm for Wireless Sensor Networks. CHs are chosen based on two important parameters: residual energy and intra-cluster communication cost. Residual energy of each node is used to probabilistically choose the initial set of CHs, as commonly done in other clustering schemes. In HEED, Intra-Cluster Communication Cost reflects the node degree or node’s proximity to the neighbor and is used by the nodes in deciding to join the cluster. Low cluster power levels promote an increase in spatial reuse while high cluster power levels are required for inter-cluster communication as they span two or more cluster areas. HEED provides a uniform CH distribution across the network and better load balancing. However, knowledge of the entire network is needed to determine intra-cluster communication cost and configuration of those parameters might be difficult in the practical world. Time Controlled Clustering Algorithm -TCCA : Similar to LEACH, the operation of TCCA is divided into rounds enabling better load distribution among sensor nodes. Each round consists of a cluster setup phase targeting at cluster formation and CH selection, and a steady state phase focusing cyclic collection, aggregation and transfer of data at CH to a base station. Node’s residual energy and a desired CH probability are considered in the eligibility criteria for CH selection. Once the CH is selected it advertises its selection as the CH to the neighboring nodes by sending an advertisement message (ADV) which includes its node id, initial Time-To-Live (TTL), its residual energy and a timestamp. TTL selected based on residual energy of the node is used to limit the size of the cluster to be formed. 4. Biologically inspired clustering algorithms: Page 10
  • 11. Recently proposed biologically inspired clustering algorithms utilize swarm intelligence techniques which model the collective behavior of social insects like ants. These algorithms are not yet matured and improvements are to be sought. In these clustering algorithms, colonial closure model which has been derived based on ant colonies are used. Biologically inspired clustering algorithms show that they can dynamically control the CH selection while achieving uniform distribution of CHs and optimal number of clusters.Following is biologically inspired clustering algorithm: ANTCLUST based clustering : In this, Swarm Intelligence based clustering algorithm has been proposed. Swarm intelligence is a technique used to model the collective behavior of social insects like ants and shows the properties of robustness, distributed problem solving capabilities, de-centralized performance. ANTCLUST is a model of an ant colonial closure to solve clustering problems. In the ANTCLUST-based clustering method, sensor nodes with more residual energy become cluster heads independently. Then, randomly chosen nodes meet with each other and clusters are created, merged, and discarded through local meetings. Each sensor node with less residual energy chooses a cluster based on the residual energy of the cluster head, its distance to the cluster head, and an estimation of the cluster size. Eventually energy efficient clusters are formed that result in an extension of the lifetime of a sensor network. Page 11
  • 12. Conclusion: Wireless sensor networks (WSNs) have attracted significant attention over the past few years. A growing list of civil and military applications can employ WSNs for increased effectiveness; especially in hostile and remote areas. Examples include disaster management, border protection, combat field surveillance. In these applications a large number of sensors are expected, requiring careful architecture and management of the network. Grouping nodes into clusters has been the most popular approach for support scalability in WSNs.Clustering is an important technique that ▫ Prolongs network lifetime ▫ Reduces channel contention ▫ Reduces collisions Significant attention has been paid to clustering algorithms. Page 12
  • 13. References: [1] Ossama Younis, Marwan Krunz, and Srinivas Ramasubramanian, “Node Clustering in Wireless Sensor Networks: Recent Developments and Deployment Challenges”, IEEE Network, 2006. [2] P. Kumarawadu*, D. J. Dechene+, M. Luccini+, and A. Sauer, “Algorithms for Node Clustering in Wireless Sensor Networks: A Survey”, IEEE,2008 [3] D.J. Baker and A. Epheremides, “The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm,” IEEE Transactions on Communications, 1981, vol. Com-29,no.11. [4] M. Chatterjee, S. K. Das and D. Turgut, “WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks,” Clustering Computing, 2002, vol. 5, pp. 193–204 [5] A. Amis, R. Prakash, T. Vuong and D. Huynh, “Max-Min D-Cluster Formation in Wireless Ad Hoc Networks,” IEEE INFOCOM, March 2000. [6] M. Ye, C. Li, G. Chen and J. Wu, “An Energy Efficient Clustering Scheme in Wireless Sensor Networks,” Ad Hoc & Sensor Wireless Networks,2006, vol.1, pp.1–21. [7] Mao YE, Chengfa LI, Guihai CHEN and Jie WU, “An Energy Efficient Clustering Scheme in Wireless Sensor Networks”, Ad Hoc & Sensor Wireless Networks, 2005, Vol. 3, pp. 99-119 Page 13