Leach an Application-specific Protocol Architecture for Wireless Microsensor Networks
Leach an Application-specific Protocol Architecture for Wireless Microsensor Networks
4, OCTOBER 2002
Abstract—Networking together hundreds or thousands of cheap In order to design good protocols for wireless microsensor
microsensor nodes allows users to accurately monitor a remote en- networks, it is important to understand the parameters that are
vironment by intelligently combining the data from the individual relevant to the sensor applications. While there are many ways
nodes. These networks require robust wireless communication pro-
tocols that are energy efficient and provide low latency. In this in which the properties of a sensor network protocol can be eval-
paper, we develop and analyze low-energy adaptive clustering hier- uated, we use the following metrics.
archy (LEACH), a protocol architecture for microsensor networks
that combines the ideas of energy-efficient cluster-based routing A. Ease of Deployment
and media access together with application-specific data aggrega-
tion to achieve good performance in terms of system lifetime, la- Sensor networks may contain hundreds or thousands of
tency, and application-perceived quality. LEACH includes a new, nodes, and they may need to be deployed in remote or dan-
distributed cluster formation technique that enables self-organiza- gerous environments, allowing users to extract information
tion of large numbers of nodes, algorithms for adapting clusters in ways that would not have been possible otherwise. This
and rotating cluster head positions to evenly distribute the energy requires that nodes be able to communicate with each other
load among all the nodes, and techniques to enable distributed
signal processing to save communication resources. Our results even in the absence of an established network infrastructure
show that LEACH can improve system lifetime by an order of mag- and predefined node locations.
nitude compared with general-purpose multihop approaches.
Index Terms—Data aggregation, protocol architecture, wireless
B. System Lifetime
microsensor networks. These networks should function for as long as possible. It may
be inconvenient or impossible to recharge node batteries. There-
I. INTRODUCTION fore, all aspects of the node, from the hardware to the protocols,
must be designed to be extremely energy efficient.
II. BACKGROUND not suited for microsensor networks. LEACH builds on this
work by creating a new ad-hoc cluster formation algorithm that
Since both device and battery technology have only recently
better suits microsensor network applications.
matured to the point where microsensor nodes are feasible, this
is a fairly new field of study. Researchers have begun discussing
not only the uses and challenges facing sensor networks [2], III. LEACH PROTOCOL ARCHITECTURE
[7], [20], but have also been developing preliminary ideas as to To meet the unique requirements of wireless microsensor
how these networks should function [4], [5], [13] as well as the networks, we developed LEACH, an application-specific
appropriate low-energy architecture for the sensor nodes them- protocol architecture [10], [11]. The application that typical
selves [6], [21]. microsensor networks support is the monitoring of a remote
There have been some application-specific protocols devel- environment. Since individual nodes’ data are often correlated
oped for microsensor networks. Clare et al. developed a time- in a microsensor network, the end user does not require all
divison multiple-access (TDMA) MAC protocol for low-energy the (redundant) data; rather, the end user needs a high-level
operation [5]. Using a TDMA approach saves energy by al- function of the data that describes the events occurring in the
lowing the nodes to remain in the sleep state, with radios pow- environment. Because the correlation is strongest between data
ered-down, for a long time. Intanagonwiwat et al. developed di- signals from nodes located close to each other, we chose to
rected diffusion, a protocol that employs a data-driven model to use a clustering infrastructure as the basis for LEACH. This
achieve low-energy routing [13]. allows all data from nodes within the cluster to be processed
Recently, there has been much work on “power-aware” locally, reducing the data set that needs to be transmitted to
routing protocols for wireless networks [19], [25]. In these the end user. In particular, data aggregation techniques can be
protocols, optimal routes are chosen based on the energy at used to combine several correlated data signals into a smaller
each node along the route. Routes that are longer, but which set of information that maintains the effective data (i.e., the
use nodes with more energy than the nodes along the shorter information content) of the original signals [9]. Therefore,
routes, are favored, helping avoid “hot spots” in the network. much less actual data needs to be transmitted from the cluster
In LEACH, we use randomized rotation of the cluster head to the base station (BS).
positions to achieve the same goal. For the development of LEACH, we made some assumptions
One method of choosing routes is to use “minimum transmis- about the sensor nodes and the underlying network model. For
sion energy” (MTE) routing [8], [24], where intermediate nodes the sensor nodes, we assume that all nodes can transmit with
are chosen such that the sum of squared distances (and, hence, enough power to reach the BS if needed, that the nodes can
the total transmit energy , assuming a power loss) is use power control to vary the amount of transmit power, and
minimized. Thus, for three nodes A, B, and C, node A would that each node has the computational power to support different
MAC protocols and perform signal processing functions. These
transmit to node C through node B if and only if
assumptions are reasonable due to technological advances in
(1) radio hardware and low-power computing. For the network, we
or . This approach ignores the energy dis- use a model where nodes always have data to send to the end
sipated in the radio to send and receive the data and, therefore, user and nodes located close to each other have correlated data.
may not actually produce the lowest energy routes. Although LEACH is optimized for this situation, it will continue
Another method of wireless communication is to use clus- to work if it were not true. In Section V, we discuss ways in
tering. In this case, nodes send their data to a central cluster which LEACH may be improved when these assumptions do
not hold.
head that forwards the data to get it closer to the desired recip-
In LEACH, the nodes organize themselves into local clusters,
ient. Clustering enables bandwidth reuse and can, thus, increase
with one node acting as the cluster head. All non-cluster head
system capacity. Using clustering enables better resource allo-
nodes transmit their data to the cluster head, while the cluster
cation and helps improve power control [14].
head node receives data from all the cluster members, performs
While conventional cluster-based networks rely on a fixed
signal processing functions on the data (e.g., data aggregation),
infrastructure, new research is focusing on ways to deploy clus- and transmits data to the remote BS. Therefore, being a cluster
tering architectures in an ad-hoc fashion [3], [15], [23]. Early head node is much more energy intensive than being a non-
work by Baker et al. developed a linked cluster architecture, cluster head node. If the cluster heads were chosen a priori and
where nodes are assigned to be either ordinary nodes, cluster fixed throughout the system lifetime, these nodes would quickly
head nodes, or gateways between different clusters [3]. The use up their limited energy. Once the cluster head runs out of en-
cluster heads act as local control centers, whereas the gate- ergy, it is no longer operational, and all the nodes that belong to
ways act as the backbone network, transporting data between the cluster lose communication ability. Thus, LEACH incorpo-
clusters. This enables robust networking with point-to-point rates randomized rotation of the high-energy cluster head posi-
connectivity. Another ad-hoc clustering protocol, the near term tion among the sensors to avoid draining the battery of any one
digital radio (NTDR), uses a clustering approach with a two-tier sensor in the network. In this way, the energy load of being a
hierarchical routing algorithm [23]. Nodes form local clusters, cluster head is evenly distributed among the nodes.
and intra-cluster data are sent directly from one node to the The operation of LEACH is divided into rounds. Each round
next, whereas inter-cluster data are routed through the cluster begins with a set-up phase when the clusters are organized, fol-
head nodes. This protocol enables point-to-point connectivity lowed by a steady-state phase when data are transfered from
and does not use low-energy routing or MAC; therefore, it is the nodes to the cluster head and on to the BS, as shown in
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
662 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, OCTOBER 2002
This ensures that the energy at all nodes are approximately equal
to each other after every rounds. Using (3) and (4), the
expected number of cluster heads per round is
Fig. 1. Time line showing LEACH operation. Adaptive clusters are formed
during the set-up phase and data transfers occur during the steady-state phase.
A. Cluster Head Selection Algorithms In Section IV-B, we analytically determine the optimal
based on our energy dissipation models for computation and
LEACH forms clusters by using a distributed algorithm, communication.
where nodes make autonomous decisions without any central- This choice of probability for becoming a cluster head is
ized control. Our goal is to design a cluster formation algorithm based on the assumption that all nodes start with an equal
such that there are a certain number of clusters, , during each amount of energy, and that all nodes have data to send during
round. In addition, if nodes begin with equal energy, our goal is each frame. If nodes have different amounts of energy (or an
to try to evenly distribute the energy load among all the nodes event-driven model is used, whereby nodes only send data
in the network so that there are no overly-utilized nodes that when some event occurs in the environment), the nodes with
will run out of energy before the others. As being a cluster head more energy should be cluster heads more often than the nodes
node is much more energy intensive than being a non-cluster with less energy, to ensure that all nodes die at approximately
head node, this requires that each node take its turn as cluster the same time. This can be achieved by setting the probability
head. of becoming a cluster head as a function of a node’s energy
Each sensor elects itself to be a cluster head at the beginning level relative to the aggregate energy remaining in the network,
of round (which starts at time ) with probability . rather than purely as a function of the number of times the node
is chosen such that the expected number of cluster head has been cluster head, Thus
nodes for this round is . Thus, if there are nodes in the net-
work (6)
(7)
Ensuring that all nodes are cluster heads the same number of
times requires each node to be a cluster head once in Using these probabilities, the nodes with higher energy are more
rounds on average. If is the indicator function determining likely to become cluster heads than nodes with less energy. The
whether or not node has been a cluster head in the most recent expected number of cluster head nodes is1
( ) rounds (i.e., if node has been a
cluster head and one otherwise), then each node should choose
to become a cluster head at round with probability
(8)
Equation (6) can be approximated by (3) when the nodes begin
(3)
with equal energy [10].
To use the probabilities in (6), each node must have an es-
Therefore, only nodes that have not already been cluster heads timate of the total energy of all nodes in the network. This re-
recently, and which presumably have more energy available than quires a routing protocol that allows each node to determine the
nodes that have recently performed this energy-intensive func- total energy, whereas the probabilities in (3) enable each node to
tion, may become cluster heads at round . make completely autonomous decisions. One approach to avoid
The expected number of nodes that have not been cluster this might be to approximate the aggregate node energy by mul-
heads in the first rounds is . After rounds, all tiplying the average energy of the nodes in each cluster by .
nodes are expected to have been cluster head once, following Note that to compute the probabilities in (3) and (6) requires
which they are all eligible to perform this task in the next se- that each node knows the parameters and . In this paper,
quence of rounds. Since is one if node is eligible to be a we assume these parameters are programmed into the nodes a
cluster head at time and zero otherwise, the term priori. However, this approach does not work well in dynamic
represents the total number of nodes that are eligible to be a networks. As we show in Section IV-B, the optimal number of
cluster head at time and clusters is a function of the number of nodes distributed
throughout an region of space. Therefore, the nodes
(4) 1Note that if any node i has E > (E =k ), which occurs with a small but
nonzero probability, the expected number of cluster heads will be less than k .
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
HEINZELMAN et al.: AN APPLICATION-SPECIFIC PROTOCOL ARCHITECTURE FOR WIRELESS MICROSENSOR NETWORKS 663
(11)
where is the number of bits in each data message, is
the distance from the cluster head node to the BS, and we have
assumed perfect data aggregation.
Each non-cluster head node only needs to transmit its data to
the cluster head once during a frame. Presumably the distance
to the cluster head is small, so the energy dissipation follows the
Friss free-space model ( power loss). Thus, the energy used
in each non-cluster head node is
(12) Fig. 6. Average energy dissipated per round in LEACH as the number of
clusters is varied between 1 and 11. This graph shows that LEACH is most
where is the distance from the node to the cluster head. energy efficient when there are between 3 and 5 clusters in the 100-node
The area occupied by each cluster is approximately . In network, as predicted by the analysis.
general, this is an arbitrary-shaped region with a node distri-
bution . The expected squared distance from the nodes
For our experiments, nodes, m,
to the cluster head (assumed to be at the center of mass of the
pJ, pJ, and 75 m 185 m, so we
cluster) is given by
expect the optimum number of clusters to be .
These analytical results were verified using simulations on
a 100-node network where we varied the number of clusters
between 1 and 11 and ran LEACH for 1000 simulated sec-
(13)
onds. Note that for these simulations, the nodes were placed
randomly throughout the 100 m 100 m area and we made
If we assume this area is a circle with radius
no restrictions on the distance between the nodes and their
and is constant for and , (13) simplifies to
cluster heads (e.g., ) or between the nodes and the BS
(e.g., ). Even though we made these assumptions for the
(14) analysis, Fig. 6, which shows the average energy dissipated per
round as a function of the number of clusters, shows that the
If the density of nodes is uniform throughout the cluster area, simulation agrees well with the analysis. This graph shows that
then and the optimum number of clusters is around 3–5 for the 100-node
network. When there is only one cluster, the non-cluster head
(15) nodes often have to transmit data very far to reach the cluster
Therefore, in this case head node, draining their energy, and when there are more than
five clusters, there is not as much local data aggregation being
(16) performed. For the rest of the experiments, we set to five.
(19) energy to act as cluster head once and non-cluster head several times throughout
the simulation lifetime [10].
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
HEINZELMAN et al.: AN APPLICATION-SPECIFIC PROTOCOL ARCHITECTURE FOR WIRELESS MICROSENSOR NETWORKS 667
(a) (b)
Fig. 7. Data for the limited energy simulations, where each node begins with 2 J of energy. (a) Total amount of data received at the BS over time. (b) Total amount
of data received at the BS per given amount of energy. These graphs show that LEACH distributes an order of magnitude more data per unit energy than MTE
routing, LEACH-C delivers 40% more data per unit energy than LEACH, and static clustering does not perform well when the nodes have limited energy.
thereby increasing the amount of energy dissipated in the traverses several hops. In the other protocols, each message
electronics of the radio. We do not assume any static energy is transmitted over a single hop, to the cluster head, where
dissipation nor do we assume energy is consumed during data aggregation occurs. The aggregate signals are sent to the
carrier-sense operations; hence, the results here do not account BS, greatly reducing the amount of data transmitted. Fig. 7(b)
for the potential energy benefits of using TDMA in LEACH shows the total data received at the BS for a given amount of
compared with CSMA in MTE. energy. This graph shows that LEACH and LEACH-C deliver
Although quality is an application-specific and data-de- the most data per unit energy, achieving both energy and latency
pendent quantity, one application-independent method of efficiency. A routing protocol such as MTE does not enable
determining quality is to measure the amount of data (number local computation to reduce the amount of data that needs to
of actual data signals or number of data signals represented be transmitted to the BS.
by an aggregate signal) received at the BS. The more data Fig. 7 shows that LEACH is not as efficient as LEACH-C
the BS receives, the more accurate its view of the remote (LEACH-C delivers about 40% more data per unit energy than
environment will be. If all the nodes within a cluster are sensing LEACH). This is because the BS has global knowledge of the
the same event, the actual and effective data will contain the location and energy of all the nodes in the network, so it can
same information, and there is no loss in quality by sending produce better clusters that require less energy for data trans-
effective or aggregate data. If, on the other hand, the nodes mission. In addition, the BS formation algorithm ensures that
are seeing different events, the cluster head will pick out the there are clusters during each round of operation. As
strongest event (strongest signal within the signals of the cluster there are only 100 nodes in the simulation, even though the ex-
members) and send that as the data from the cluster. In this pected number of clusters per round is in LEACH, each
case, there will be a loss in quality by aggregating signals into round does not always have five clusters.
a single representative signal. As with radio wave propagation, Fig. 8(a) shows the total number of nodes that remain alive
it is difficult to quantify signal propagation as it depends on over the simulation time. While nodes remain alive for a long
factors such as the nature of the signal, the path between the time in MTE, this is because a much smaller amount of data
source and the sensor, and the sensitivity of the sensors. If the has been transmitted to the BS. If we plot the total number of
distance between nodes within a cluster is small compared with nodes that remain alive per amount of data received at the BS
the distance from which events can be sensed, or if the distance [Fig. 8(b)], we see that nodes in LEACH can deliver ten times
between events occurring in the environment is large, there is a more effective data than MTE for the same number of node
high probability that the nodes will be sensing the same event. deaths. There are two reasons that MTE requires more energy
For our experiments, we assume that all nodes in a cluster sense to send data to the BS (hence, causing more node deaths for
the same events. the same amount of data delivery): collisions and lack of data
Fig. 7 shows the total number of data signals (actual for MTE aggregation. Because MTE does not have any centralized con-
and effective for LEACH, LEACH-C, and static clustering) trol over when nodes transmit and receive packets, collisions
received at the BS over time and the total data received at increase the amount of energy required to send each successful
the BS for a given amount of energy. Fig. 7(a) shows that message. Furthermore, each message in MTE must traverse
LEACH sends much more data to the BS in the simulation time approximately hops to get to the BS,7 whereas
than MTE routing. The reason MTE requires so much time 7The analysis for finding the average number of hops is similar to the analysis
to send data from the nodes to the BS is that each message for finding E [d ] in (13).
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
668 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, OCTOBER 2002
(a) (b)
Fig. 8. Data for the limited energy simulations, where each node begins with 2 J of energy. (a) Number of nodes alive over time. (b) Number of nodes alive per
amount of data sent to the BS. LEACH can deliver ten times the amount of effective data to the BS as MTE routing for the same number of node deaths. The benefit
of rotating cluster heads in LEACH is clearly seen by comparing the number of nodes alive in LEACH and static clustering.
each message in LEACH need only traverse one hop due to that assigns the cluster head role to another node in the cluster
data aggregation at the cluster head. Of course, this assumes when the current cluster head node dies. Adapting the clusters
perfect aggregation—the advantages of using MTE become depending on which nodes are cluster heads for a particular
greater when this assumption is relaxed. round (as in LEACH) is advantageous because it ensures that
Fig. 8 shows why static clustering performs poorly (as seen nodes communicate with the cluster head node that requires
in the results from Fig. 7)—the cluster head nodes die quickly, the lowest amount of transmit power. In addition to reducing
ending the lifetime of all nodes belonging to those clusters. energy dissipation, this ensures minimum inter-cluster in-
Therefore, rotating the cluster head position enables LEACH to terference. If, on the other hand, the clusters were fixed and
achieve a longer lifetime than static clustering. only the cluster head nodes were rotated, a node may have to
use a large amount of power to communicate with its cluster
head when there is another cluster’s cluster head close by.
V. DISCUSSION Therefore, using fixed clusters and rotating cluster head nodes
While LEACH appears to be a promising protocol, there are within the cluster may require more transmit power from the
some areas for improvement to make the protocol more widely nodes, increasing non-cluster head node energy dissipation and
applicable. In the current implementation of LEACH, we as- increasing inter-cluster interference. However, the advantage
sume sensors always transmit data to the cluster head during of fixed clusters is that once the clusters are formed, there is no
their allocated TDMA slot (or, for MTE routing, each sec- set-up overhead at the beginning of each round. Depending on
onds). To save energy, nodes may only need to transmit data the cost of forming adaptive clusters, an approach where the
after they detect some interesting event. In this case, we may clusters are formed once and fixed and the cluster head position
need to rethink the intra-cluster communication scheme to make rotates among the nodes in the cluster may be more energy
sure that we efficiently utilize bandwidth when not all nodes efficient than LEACH.
communicate to the cluster head all the time. Finally, we showed that using data aggregation reduces en-
Another assumption we have made is that all nodes are within ergy dissipation and latency in data transfer compared with an
communication range of each other and the BS. This assump- approach like MTE that cannot take advantage of local data
tion limits the scalability of the protocol but can be relaxed by correlation. However, if there is no correlation among the data
using collision-avoidance techniques during the set-up phase to (and, hence, the cluster head cannot compress the data from the
reduce collisions in ADV and Join-REQ messages and using a cluster members), a multihop approach like MTE will outper-
hierarchical or multihop routing approach to get data from the form LEACH. In Section III-A we discussed an approach to de-
cluster head nodes to the BS. The cluster heads could form a termine the number of nodes in an approximately
multihop backbone whereby data are transmitted among cluster
region of space around each node. We can set appropriately
heads until they reach the BS. Alternatively, LEACH can evolve
so that there is a high probability that all the sensors within the
into a hierarchical protocol by forming “super clusters” out of
the cluster head nodes and having a “super-cluster head” that area have correlated data. Using the determined value
processes the data from all the cluster head nodes in the super for , each node can find the approximate optimal value (19)
cluster. These changes will make LEACH suitable for a wider and compute the appropriate probability that it should become a
range of wireless microsensor networks. cluster head during the next round. Using this approach we can
As our results have clearly shown the advantage of rotating assure that, with high probability, the clusters have correlated
the cluster head position among all the nodes, it would be data and the protocol can scale to a large number of nodes and
interesting to compare LEACH to a fixed clustering protocol a large network area, and can handle dynamic nodes.
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
HEINZELMAN et al.: AN APPLICATION-SPECIFIC PROTOCOL ARCHITECTURE FOR WIRELESS MICROSENSOR NETWORKS 669
VI. CONCLUSION [20] G. Pottie, “Wireless sensor networks,” in Proc. Information Theory
Workshop, San Diego, CA, June 1998, pp. 139–140.
When designing protocol architectures for wireless mi- [21] G. Pottie and W. Kaiser, “Wireless integrated network sensors,”
crosensor networks, it is important to consider the function Commun. ACM, vol. 43, pp. 51–58, May 2000.
[22] T. Rappaport, Wireless Communications: Principles & Prac-
of the application, the need for ease of deployment, and the tice. Englewood Cliffs, NJ: Prentice-Hall, 1996.
severe energy constraints of the nodes. These features led us [23] R. Ruppe, S. Griswald, P. Walsh, and R. Martin, “Near term digital radio
to design LEACH, a protocol architecture where computation (NTDR) system,” in Proc. MILCOM, vol. 3, Monterey, CA, Nov. 1997,
pp. 1282–1287.
is performed locally to reduce the amount of transmitted [24] T. Shepard, “A channel access scheme for large dense packet radio
data, network configuration and operation is done using local networks,” in Proc. ACM SIGCOMM, Stanford, CA, Aug. 1996, pp.
control, and media access control (MAC) and routing protocols 219–230.
[25] S. Singh, M. Woo, and C. Raghavendra, “Power-aware routing in mobile
enable low-energy networking. Results from our experiments ad hoc networks,” in Proc. 4th Annual ACM/IEEE Int. Conf. Mobile
show that LEACH provides the high performance needed under Computing Networking (MobiCom), Oct. 1998.
the tight constraints of the wireless channel. [26] A. Wang, W. Heinzelman, and A. Chandrakasan, “Energy-scalable
protocols for battery-operated microsensor networks,” Proc. 1999 IEEE
Workshop Signal Processing Systems (SiPS ’99), pp. 483–492, Oct.
1999.
ACKNOWLEDGMENT
The authors would like to thank the reviewers for their de-
tailed comments on earlier versions of this paper.
Wendi B. Heinzelman (S’95–M’01) received the
B.S. degree in electrical engineering from Cornell
REFERENCES University, Ithaca, NY, in 1995, and the M.S.
and Ph.D. degrees in electrical engineering and
[1] P. Agarwal and C. Procopiuc, “Exact and approximation algorithms for computer science from the Massachusetts Institute
clustering,” in Proc. 9th Annu. ACM-SIAM Symp. Discrete Algorithms, of Technology (MIT), Cambridge, in 1997 and 2000,
Baltimore, MD, Jan. 1999, pp. 658–667. respectively.
[2] J. Agre and L. Clare, “An integrated architecture for cooperative sensing Since January 2001, she has been an Assistant Pro-
networks,” IEEE Computer, vol. 33, pp. 106–108, May 2000. fessor in the Department of Electrical and Computer
[3] D. Baker, A. Ephremides, and J. Flynn, “The design and simulation of Engineering, University of Rochester, Rochester, NY.
a mobile radio network with distributed control,” IEEE J. Select. Areas Her current research interests lie in the area of low-
Commun., vol. SAC–2, pp. 226–237, Jan. 1984.
power ad-hoc wireless protocol architectures, scalable sensor networks, and
[4] A. Chandrakasan, R. Amirtharajah, S.-H. Cho, J. Goodman, G. Kon-
multimedia communication.
duri, J. Kulik, W. Rabiner, and A. Wang, “Design considerations for
distributed microsensor systems,” in Proc. IEEE Custom Integrated Cir- Dr. Heinzelman is an Elected Member of the Design and Implementation of
cuits Conf. (CICC), San Diego, CA, May 1999, pp. 279–286. Signal Processing Systems (DISPS) Technical Committee of the IEEE Signal
[5] L. Clare, G. Pottie, and J. Agre, “Self-organizing distributed sensor net- Processing Society and a member of Sigma Xi and the ACM.
works,” in Proc. SPIE Conf. Unattended Ground Sensor Technologies
and Applications, vol. 3713, Orlando, FL, Apr. 1999, pp. 229–237.
[6] M. Dong, K. Yung, and W. Kaiser, “Low power signal processing ar-
chitectures for network microsensors,” in Proc. Int. Symp. Low Power
Electronics and Design, Monterey, CA, Aug. 1997, pp. 173–177. Anantha P. Chandrakasan (S’87–M’95–SM’01)
[7] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next century received the B.S, M.S. and the Ph.D. degrees in
challenges: Scalable coordination in sensor networks,” in Proc. 5th electrical engineering and computer sciences from
Annual ACM Int. Confe. Mobile Computing Networking (MobiCom), the University of California, Berkeley, in 1989,
Seattle, WA, Aug. 1999, pp. 263–270. 1990, and 1994, respectively.
[8] M. Ettus, “System capacity, latency, and power consumption in mul- Since September 1994, he has been with the
tihop-routed SS-CDMA wireless networks,” in Proc. Radio and Wire- Massachusetts Institute of Technology (MIT),
less Conf. (RAWCON), Colorado Springs, CO, Aug. 1998, pp. 55–58. Cambridge, and is currently an Associate Professor
[9] D. Hall, Mathematical Techniques in Multisensor Data Fu- of electrical engineering and computer science. He
sion. Boston, MA: Artech House, 1992.
held the Analog Devices Career Development Chair
[10] W. Heinzelman, “Application-specific protocol architectures for wire-
less networks,” Ph.D. dissertstion, Mass. Inst. Technol., Cambridge, from 1994 to 1997. He is a co-author of Low Power
2000. Digital CMOS Design (Norwell, MA: Kluwer) and a co-editor of Low Power
[11] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-ef- CMOS Design and Design of High-Performance Microprocessor Circuits
ficient routing protocols for wireless microsensor networks,” in Proc. (Piscataway, NJ: IEEE Press). His research interests include the ultra low
33rd Hawaii Int. Conf. System Sciences (HICSS), Maui, HI, Jan. 2000. power implementation of custom and programmable digital signal processors,
[12] L. Hu, “Distributed code assignments for CDMA packet radio net- distributed wireless sensors, multimedia devices, emerging technologies, and
works,” IEEE/ACM Trans. Networking, vol. 1, pp. 668–677, Dec. 1993. CAD tools for VLSI.
[13] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: A Dr. Chandrakasan received the NSF Career Development Award in 1995, the
scalable and robust communication paradigm for sensor networks,” in IBM Faculty Development Award in 1995, and the National Semiconductor Fac-
Proc. Fourth Annu. ACM Int. Conf. Mobile Computing and Networking ulty Development Award in 1996 and 1997, respectively. He has received several
(MobiCom), Boston, MA, Aug. 2000, pp. 56–67. best paper awards, including the 1993 IEEE Communications Society’s Best
[14] T. Kwon and M. Gerla, “Clutering with power control,” in Proc. Tutorial Paper Award, the IEEE Electron Devices Society’s 1997 Paul Rappa-
MILCOM, vol. 2, Atlantic City, NJ, Nov. 1999. port Award for the Best Paper in an EDS publication during 1997, and the 1999
[15] C. Lin and M. Gerla, “Adaptive clustering for mobile wireless net- Design Automation Conference Design Contest Award. He has served on the
works,” IEEE J. Select. Areas Commun., vol. 15, pp. 1265–1275, Sept. technical program committee of various conferences, including ISSCC, VLSI
1997. Circuits Symposium, DAC, and ISLPED. He has served as a Technical Program
[16] T. Murata and H. Ishibuchi, “Performance evaluation of genetic algo- Co-Chair for the 1997 International Symposium on Low-Power Electronics and
rithms for flowshop scheduling problems,” Proc. 1st IEEE Conf. Evolu- Design (ISLPED), VLSI Design ’98, and the 1998 IEEE Workshop on Signal
tionary Computation, vol. 2, pp. 812–817, June 1994.
Processing Systems, and as a General Co-Chair of the 1998 ISLPED. He was an
[17] UCB/LBNL/VINT Network Simulator – ns (2000). [Online]. Available:
http://www.isi.edu/vint/ nsnam/ Associate Editor for the IEEE JOURNAL ON SOLID-STATE CIRCUITS from 1998
[18] K. Pahlavan and A. Levesque, Wireless Information Networks. New to 2001. He served as an Elected Member of the Design and Implementation
York: Wiley, 1995. of Signal Processing Systems (DISPS) Technical Committee of the Signal Pro-
[19] S. Park and M. Srivastava, “Power aware routing in sensor networks cessing Society. He was the Signal Processing Subcommittee Chair for ISSCC
using dynamic source routing,” ACM MONET Special Issue on Energy 1999 through 2001 and the Program Vice-Chair for ISSCC 2002. He is the Tech-
Conserving Protocols in Wireless Networks, 1999. nical Program Chair for ISSCC 2003.
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.
670 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, OCTOBER 2002
Authorized licensed use limited to: Indian Institute of Technology (Ropar). Downloaded on September 15,2024 at 18:16:55 UTC from IEEE Xplore. Restrictions apply.