Final Thesis
Final Thesis
Supervisor
Dr. Liana Tamimi
Signature: Date:
Signature: Date:
Thesis Approved
Signature: Date:
i
Dedication
I would like to express deepest appreciation towards My father
prof. Numan Amro and Mother Ghada Wahab and to Sarah,
Rana, Ehab for their sincere and true support.
ii
Acknowledgment
I am profoundly grateful to Dr. Liana AL-Tamimi for her expert
guidance and continuous encouragement throughout to see that this
thesis rights its target since its commencement to its completion.
At last I must express my sincere heartfelt gratitude to all the staff
members of Graduate Studies and scientific research facility who
helped me directly or indirectly during this course of work.
iii
Table of Contents
Table of Contents v
List of Tables vi
Acronyms viii
Abstract 1
Introduction 2
1 Introduction 3
1.1 Thesis Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 Objectives and Benefits . . . . . . . . . . . . . . . . . . . . . . . 5
1.5 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.6 Structure of the Thesis . . . . . . . . . . . . . . . . . . . . . . . 6
1.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Background 8
2.1 WSNs Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 WSNs Applications . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Hardware Components of a WSNs . . . . . . . . . . . . . . . . . 11
2.3.1 WSNs Node Types . . . . . . . . . . . . . . . . . . . . . 12
2.3.2 Node Specification . . . . . . . . . . . . . . . . . . . . . 13
2.4 Types of WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5 Routing Categories . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.5.1 Why LEACH and VRS . . . . . . . . . . . . . . . . . . . 15
2.6 WSNs Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.6.1 Why Grid Topology . . . . . . . . . . . . . . . . . . . . . 19
2.7 Characteristics of WSNs . . . . . . . . . . . . . . . . . . . . . . 19
iv
2.8 WSNs Advantages . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.9 WSNs Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4 Proposed Protocol 42
4.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.1.1 WSN Creation . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.2 WSN Route . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
References 72
v
List of Tables
List of Figures
vi
3.6 Low Energy Adaptive Clustering Hierarchy (LEACH)[11]. . . . . 30
3.7 LEACH Equation. . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.8 Time line Showing Operation of LEACH[48]. . . . . . . . . . . . 34
3.9 Flow Chart for Cluster Head Formation[46]. . . . . . . . . . . . . 35
3.10 LEACH Process[49]. . . . . . . . . . . . . . . . . . . . . . . . . 36
3.11 Flow Chart for LEACH Operation[67]. . . . . . . . . . . . . . . . 37
3.12 Simplified Schematic for Directed Diffusion[57]. . . . . . . . . . 38
vii
ACRONYMS
viii
ملخص الدراسة
ع بل المعتشب اا المةتشباع ةبم عبلع مةبت تمتلك الشبكات السلبلا ) (WSNsمجموعب مبع د
رعببت ا لجمببا الك تتببت قماااكتتببت قتعببج لتت قالتببم رماببع اعتكتهمببت تتببت متم ب ةببم مةببت
اإلتعتن الوصول إل تت .ال لهع الختص لتذه الشبكات ذبذ ا الكبتن ع للهالبتتتت ت تبوا بكات
)(WSNsعلى تةع نبا قت تمبل علبى الشبكات السلبلا علبى ك تتبت التا م ب قنجمتبت
الصغ ا الذا تم ال وه عل ه ةم ت ك ت متةوع .
قالاصبل قالة ب قالصبةتع تعت ا أن تاى أمم قذود ) (WSNsةم الاعتر الص
قاألتمتب قالماااكب ت قت تببوا ) (WSNsعلببى ال لرببل مببع الم ببلدا قالت ببلرت م ب الببذا اع
ت بوه ) ) WSNsعلربلعت التبلا الاس عبم مبو قالتتسك ال تا قالتة ت ق تلتتلم ةإن مجت
ال متظ على ال تا قنمظتت إل تل عمبا الشبكا .قمبع الصب و مابتن إ تلب عمبا الشبكا عبع
ار ت ل التتسك ال تا ةم المعتش اا ن ث رتم ت ل توظ ف ال تا تلبتخلا انةب ع مبع
الم تةظ ع على ال تاب مبا ابواهتم ت ع قانبلع لتبوة ا ال تاب قاألاباى لت عب ع الكاقتو و
اتت تل الك تتت ع المعتش اا .
رتم التخلا اواهتم ) (VRSلكاقتو بول ا تتشبته الموذبه ) (DDالم باقا امبت ع البتخلا
الم تةظ ب علببى ال تا ب يببمع اقتو ببو الكة ب ال تا ب قكلببك وتببه انببل أمببم الكاقتو ببو
قاواهتم الت ع ع ما LEACHلت لرل ال لد األم لمعتش اا المة ب الوانبلع المع
المعببتعلع ةببم عمل ب تببوة ا ال تاب للشببكا ملتببت .ب كلببك رببتم مببع اببسل دهالب تمصب ل لب
)(LEACHق ) (DDق )( VRSقالت عب ع علببى ) (LEACHللوصببول ألة ب ار ب
لل صول على تا أ ا ةم الشكا ت تعتم ل مع الخواهتم ب ةبم ت عب ع ابلهع (LEACHةبم
نمظ ال تا قالتخلا VRSلل صول على م زع المواا مبا الكاقتو بول التامبم الم عبعت رم بل
مواا المعتش اا مع اسل م اة موا ه قموابا المعتشب اا الم ب لم اةب م ب الت تمب
تعت ا التواص عكب عل قذود تا ة تبت .رة عبم ما الك تتت إكا تن مةتك أا معتش اا
الةموكج الم تاح الجلرل إلى ذزأرع األقل رتةتقل عمل ب نعبتا ال تاب قا لتشب ته لبتخااج
أتمببت الك تتببت ل ببتم الببتخلامتت ةببم الك ببث عببع الم لومببت الم لو ب ت الجببز ال ببتتم مببو الجببز
الببلرةتم ام عةببلمت ت بباه الشببكا أا اقتو ببول ر م ب قة يببت لام ب الك تتببت الم لو ب .إكا تتببا
الك تتت م لقدع ةتبذا ر ةبم أن )( DDتك بث ةبم أتمبت الك تتبت التبم تبم ذم تبت إكا بتن نجبم
الك تتت يخ يمت ن ث ت م الشكا على تشغ ) (LEACHإلتشت أتمت تتبت ذلربلع ل مل ب
ث ذلرل.
تمبا م ت بتع الكاقتو بول البلرةتم ام الجلربل قتمبا دهالب أداسبه تلبتخلا ) (NS3تبم البتخلا
اقتو ول ) (DD,LEACHسم ااتكته لت م األدا .تظتبا تتبتسا الم ت بتع أن الكاقتو بول
الببلرةتم ام لببه أدا أة ب مببع الببتخلا اقتو ببول )LEACH,DDب علببى نببله مببع ن ببث
ال تا قال ما.
Abstract
Wireless sensor networks (WSNs) hold a group of spatial sensor nodes circulated
to collect, monitor, record data which can be considered as an important data in
critical areas that human cannot reach.
The special ability for these networks attracted a respectable amount of study.
WSNs have unrestrained figuration, and they depend on the wireless networks,
for their adaptive nature and tiny size WSNs found in various applications.
We are using Volcano Routing Scheme (VRS) for the Directed Diffusion (DD)
protocol which is known as an energy efficient that helps flat structure protocols
to conserve energy, and the optimization algorithm with the LEACH to select the
optimal number of sink nodes that will help the process of saving energy for the
whole network.
All of that is done starting with a detailed study of the LEACH, DD, VRS and
the enhancement on the LEACH to see if there is anything advanced to save the
network energy.
We make use of the optimization algorithm to enhance the LEACH and use the
VRS to have the location advantage with the optimized hierarchical protocol. The
location benefits the nodes by knowing its location and the neighbor’s location to
know how to deal with the data if there are any dead nodes.
The new proposed protocol is divided into two parts the first one is manual, deal-
ing with the energy computation and sensing operation to extract the data patterns
to make the lookup tables. The second part is the dynamic part when the network
decides which protocol to operate according to the needed amount of data.
If the data is limited, it means the DD is searching in the lookup tables if the data
1
LIST OF FIGURES 2
amount is huge the network is operating the LEACH to construct a new lookup
table.
The newly dynamic protocol has been simulated and its performance has been
studied using NS3 simulator. The LEACH protocol has been used as a benching
mark to evaluate the performance.
Simulation results show that the dynamic protocol has better performance than
LEACH standing alone in terms of energy and lifetime and we can see it as a
percentage ranges from (20-25percent).
Keywords: Energy Efficient, Dynamic Routing, VRS, WSNs, LEACH, DD.
Chapter 1
Introduction
3
1.2 Problem Statement 4
WSNs allow the ability to observe the previously unobserved at a fine resolution
over large spatiotemporal scales.
So we can keep an eye on the environment in every second in the day WSNs pro-
cessors in various modes (sleep, idle, active), power source (AA battery or Coin
batteries, Solar Panels), memory used for the program code and for in-memory
buffering, radio used for transmitting the acquired data to some storage site, sen-
sors for temperature, humidity and light [1].
Attractive functionality of sensor nodes in a WSNs include effortlessness instal-
lation, fault indication, energy level diagnosis, high reliability, easy coordination
with other nodes in the network, control protocols and simple network interfaces
with other smart devices [15]. Therefore there are so many routing protocols to
do the data transmission and the computation needed to deliver the data from the
source to the destination the protocols are divided into two categories based on
the network structure and the route determination and some of them: SPIN[14],
DD[56], LEACH[49], PEGASIS[20], SPAN[21], GEAR[22], GAF[19].
In this thesis, a new dynamic routing protocol is proposed to prolong the network
lifetime. Which enhance the performance of the network to deliver the needed
data to the destination and we can see that in the metrics which give us a view of
the energy consumption and the throughput and the data transmission process.
• Nodes with high and low energy have the identical priority to be a CH.
• Once CH dies the gathered information would ne’er reach the destination.
1.3 Motivation
WSNs are small devices that are used to collect data from critical locations which
cannot be arrived by humans and they depend on limited energy sources like bat-
tery and there is so many research that discussed the energy-efficient protocols
previous researches handled just one protocol at a time to save the energy.
So we proposed a new approach to use two protocols in a dynamic way using two
energy-efficient protocols from two categories using the right network structure
according to specific conditions such as the amount of data, the network state also
the node state from the point of view of energy.
• Propose a new protocol using two structures for the WSNs instead of one
protocol with one structure each time, which is not used with this kind of
networks due to energy consumption problems.
• Make use of the location of the nodes to sense and collect data from the
needed nodes, with that we do not operate the whole network while the data
is in a known location, which saves the nodes energy while harvesting data.
Chapter 3 proposes a review of the existing routing protocols and their types
according to the structure, route destination and location. Some of the improve-
ments on LEACH protocol as an energy efficient protocol in addition to the DD
are also presented.
and it has a description of the dynamic routing using VRS to be implemented on
the proposed protocol using the DD protocol as a second energy efficient protocol
to switch it with the LEACH for our newly proposed protocol.
Chapter 4 presents the methodology of the network proposed protocol solving the
optimizing problem with LEACH protocol and operating VRS with the DD to
help the network prolong its lifetime.
1.7 Summary 7
Chapter 5 presents the empirical side of the thesis. Chapter6 presents the analysis
for the simulation comparing my results with the LEACH and DD each one stands
alone. Chapter 7 presents the thesis summary, conclusion, and recommendations.
1.7 Summary
This chapter is about the problem statement, the objectives of the thesis studying
this specific problem and benefits, then the thesis structure, and main contributions
that we are going to present.
The next chapter is discussing the background of the WSNs.
Chapter 2
Background
8
2.1 WSNs Overview 9
high bandwidth sensing node, and gateway node. We can see the typical scenario
for the WSN in Fig(2.1)
levels [7][5][1].
Sensor nodes can be used for event detection, event ID, location sensing and local
control of actuators the main idea of micro-sensing and wireless connection to
provide new application area such as [8][5]:
1.Environmental Monitoring:
Sensor network can be deployed to monitor the environmental parameters where
this might have an effect on whatever needs to be controlled and this includes
tracking the movement of birds, small animals and insects, earth and environmen-
tal monitoring in the marine, soil and atmospheric contexts.
2.Health Application:
The application for sensor networks provides interfaces for the disabled integrated
patient monitoring, diagnostics, drugs administration in hospitals and for blood
flow, respiratory rate.
3.Military Application:
WSNs can be used for sensing intruders on basis detection of enemy unit move-
ments on land and sea and can work as an integral part of the military command,
control, surveillance, computing communications and reconnaissance and target-
ing systems.
4.Home Application:
Provide a smart environment to adapt to the needs of the end users in terms of
input-output capabilities.
5.Other Commercial Applications:
The commercial applications monitoring material fatigue, building virtual key
monitoring product quality, constructing smart office spaces, robot control and
guidance in the automatic manufacturing environment [3].
system.
4. Power Unit: normally it uses batteries, sometimes those batteries are sup-
ported with a power scavenging like solar cells to employ the energy-harvesting
technologies [6] besides that there are some additional components significant to
be in the sensor node because most of the routing techniques and sensing tasks
demand a location finding system to find locations with high accuracy and a mo-
bilizer, sometimes may be needed to move sensor nodes, when it is required to do
the tasks assigned[9]. Which we can see it in details with Fig(2.2)
1. Star Network:
It is called a single point to multi-point. The topology structure of the star network
communicates with a single base station that sends and receives the messages [31],
it is a simple network that has the ability to remote nodes power consumption to
the minimal rate which allows communication with low latency between the sink
node and the base station [33][34]. The dependency on the single node to manage
the network is one of the disadvantages of this topology also it has to be within the
range of radio transition for all the nodes and it is not robust enough [39]. Which
appears in Fig(2.5).
2. Mesh Network:
A mesh network allows transmitting data from one node to another node in the
network that is within its radio transmission range. Which allows a multi-hop
communication that is if a node wants to send a message to another node which
is out of radio communications range it can use an intermediate node to forward
the message to the desired node [31]. A mesh network allows the redundancy and
scalability.
In this topology, a node failure does not affect the whole network, a remote node
can communicate with any other node in its range which can forward the message
to the desired location and we can extend the network range by adding more nodes
2.6 WSNs Structure 17
[33].
The drawbacks of this topology that the nodes with the multi-hop communication
are high power consumption compared to other nodes also the time to deliver the
message to the destination increases according to the number of communication
hops [34]. Which we can see it in Fig(2.6).
3. Tree Network:
A tree network joins multiple star topology into a bus topology in a hybrid ap-
proach to upgrade the network scalability [33]. The network is set up as a hier-
archy with at least three levels. Only hub devices connect directly to the tree-bus
and every hub function as the root of a tree of devices [34]. Which is shown in
Fig(2.7).
4. Grid Topology:
The grid topology is modeled as a 2D network with n*n fixed nodes. Also, we
can accept 3D hexahedral, tetrahedral pyramid and wedge cells to be used, the
grid points are used to maintain contact between adjacent cells [34].
In grid network communications can only occur between nodes that are linked.
Neighbors with a separation distance of d. The main idea is to divide the grids.
Network area is partitioned into the non-overlapping square grid with the same
size, so it has to be at least one node only in working state in each grid at any time
[37].
The nodes in a grid should work in turn to prolong the network lifetime. In every
2.6 WSNs Structure 18
single grid, there is one node selected to be the grid head, which is responsible
for forwarding routing information and transmitting data packets routing is per-
formed in a grid by grid manner. The grid topology configuration plays an impor-
tant role for damping transient frequency-power oscillations during fault events
[41]. Which appears in Fig(2.8).
• Mobility of nodes.
2.8 WSNs Advantages 20
• Communication failure.
• Heterogeneity of nodes.
• Unattended operation.
• It reaches several places that are hard to reach like mountains, oceans,
forests.
• Reliability.
• Power Consumption.
• Node Size.
• Mobility.
2.10 Summary
In this chapter we are discussing the WSNs what are those, and how they are
working, discussing the applications they used in, types, routing protocols, advan-
tages and challenges in WSNs.
This is the overview of the WSNs to move on to the next chapter to present the
literature review.
Chapter 3
Literature Review of Routing
Protocols
In this chapter, we are presenting the details of the routing protocols for the
WSN according to their categories, and then we are discussing the detailed studies
of LEACH and DD and VRS.
22
3.1 Existing Routing Protocols for WSN 23
a. Flat Network: all the sensor nodes have the same level of functionality and
responsibilities [10], each node plays the same role and sensor nodes collaborate
together to perform the sensing task [13]. The information is distributed in the flat
routing as needed to any reachable sensor node within the sensor cloud, and there
is no effort is made to organize the networks, and traffic only discovering the best
route hop by hop [1]. Which is seen in Fig(3.1)
In this protocol data, elimination and negotiation can be used to save energy in the
network, and the route discovery process can be initiated by flooding or broadcast-
ing data to all neighbor nodes without paying attention to the topology updates and
it has three sub-categories:
Flooding protocol it is the most basic flat routing protocol, it can be easily im-
plemented over WSN, without considering the topology or the structure of the
networks, there is no need for any complex algorithm programming, it simply
broadcasts data to all the neighbor nodes [4]. The data can be delivered to the des-
tination node by repeating the same process of broadcasting, it has some critical
problems, the first one is the generation of a duplicate message in large numbers
by many nodes and the second one occurs when a certain node receives the same
3.1 Existing Routing Protocols for WSN 24
pends on the application, some of them require the shortest path and some the
lowest energy consuming path[6]. The communication in directed diffusion is
neighbor to neighbor, so all the nodes have the ability to carry out data aggrega-
tion and caching, so it is not suitable for applications that need continuous data
delivery [1]. DD consists of several elements:
1. Interests (a query or an interrogation which specifies what a user wants (named
data)).
2. Data Messages (can be an event ).
3. Gradients (it is created in each node that receives interest, and we can deal with
it as a direction state)
4. Reinforcements (it is one or a small number of the network paths) Diffusion
is data-centric and all communication is neighbor to neighbor, so every node is
an end. Moreover, there are no routes in a sensor network. So each sensor node
can interpret data and interest messages. Gossiping this protocol is proposed to
address the problems of the flooding scheme instead of broadcasting, it sends the
packet to a single neighbor chosen randomly from a random table, which avoids
the implosion problem, but the overlap problem is not resolved, these protocols
squander energy at a slow rate due to the slow information distribution [8][18].
Which is seen in Fig(3.3)
b. Location Based: these protocols take advantage of the location of the wire-
less sensor nodes, in data routing the node address is determined according to the
3.1 Existing Routing Protocols for WSN 26
wireless ad hoc network but it is suitable for WSN, it is concerned with energy
awareness in which it saves energy without affecting the routing dependability,
the protocol main idea is to divide the sensors field into fixed virtual grid zones,
it works in three stages the first one is discovering stage, in which each node can
discover its neighbors [22].
The active stage is the second phase, in which the nodes participate in routing data
and the sleep stage which holds the process of turning off the node’s transmitter
and setting the node to sleep mode is the last stage, which saves more power [1].
The protocol reliability on the GPS technique makes it not always available espe-
cially for indoor application, and it costs extra overhead on the memory unit. It’s
the goal to optimize the performance by identifying equivalent nodes by consid-
ering the forwarded packets.
Geographical and Energy-Aware Routing Protocol(GEAR) it is popular in data-
centric WSN applications, it endeavors to hand over the data to all the nodes inside
a target area, the main concept of (GEAR) is reducing the number of interests in
direct diffusion by sending the interest packets to assured area or direction in the
network, this protocol keeps two values [5][14][16]:
The first one is an estimated cost, which is the combination of distance to the tar-
get region and the remaining energy and the second one is the learned cost, which
3.1 Existing Routing Protocols for WSN 27
is the change in the estimated cost caused by routing around network holes, these
holes are created when the nodes do not have any other nearby nodes, the network
is hole free when the estimated cost is equal to the learned cost [8].
The GEAR protocol has two phases the first one is to forward packets, which the
target region, and the second one is disseminating the packets within the target
region [6]. We can see it in Fig(3.4)
node from the sink, to enhance the robustness of the network nodes at random
locations must die to reconstruct the chain since it depends on distance in this
protocol [11]. The energy load evenly will be distributed among the sensor nodes
in the network.
We initially place the nodes randomly in the, therefore, the i-th node is at a ran-
dom location.
The nodes will be organized to form a chain which can be accomplished by the
sensor nodes themselves using a greedy algorithm or the BS can compute this
chain.
Switched Port Analyzer protocol(SPAN) the protocol goal is to make nodes more
energy efficient [1], so the main idea of this protocol is to switch the radio off when
the node is neither receiving or transmitting data, the sensors in SPAN works as
coordinator [6].
SPAN is an efficient, high-performance traffic monitoring system. It duplicates
network traffic to one or more monitor interfaces as it transverse the switch. It
is used for troubleshooting connectivity issues and calculating network utilization
and performance. It examines other ports or segments without taking the network
out of service [20]. Which is seen in table(3.1)(3.2)(3.3).
Protocol SPIN DD
classification flat flat
mobility supported limited
Power management limited limited
Network life time Good Good
scalability limited limited
Resource awareness Yes Yes
Query based Yes Yes
Data delivery model Event driven Demand driven
1. Malik et al. in [1] Researchers examined the energy efficiency and perfor-
mance of LEACH protocol using own set of parameters. the lifetime and data
delivery characteristics are being compared with the help of analytic comparison
and from the simulation results. From this work, they find that LEACH provides
better results for the number of cluster heads as 3 and 4. This paper has covered
the performance of LEACH protocol only.
2. Yadav et al. [2] The researchers proposed a new amended cluster algorithm
of LEACH protocol which is supposed to balance the energy consumption of the
whole network and extend the lifetime of the network the proposed clustered rout-
ing technique offers when compared to the non-clustered routing and they found
that the improved algorithm is more energy efficient than the original.
3.2 Improvements of LEACH Protocol 30
3. FU et al. [3] The paper submit a new amended algorithm of LEACH protocol
(LEACH-TLCH) that is suggested to balance the energy consumption of the net-
work entirely and to extend the network lifetime by using the concept of balancing
the energy consumption of the cluster heads. That was elected in a random way
for the LEACH which causes the energy stream of some cluster heads to be less
or the distances from the base station are far, because of the heavy energy burden,
these cluster heads will soon die.
4.Ebadi. [4] This paper submits a multi-hop clustering algorithm (MHC) to save
the energy of the wireless sensor networks. The cluster heads in MHC are be-
ing selected according to two parameters the remaining energy and node degree.
Also, cluster heads select their members according to the two parameters of the
sensor the remaining energy and the distance to its cluster head.
3.2 Improvements of LEACH Protocol 31
5. MarhoonP et al. [5] Propose a new algorithm that enhances the LEACH algo-
rithm to upgrade the network coverage. This algorithm is called Extended Area
Coverage Enhancement (EACE) and the researchers find that the number of nodes
that worked at each round in the new algorithm is increased compared to that in
LEACH, this provide more covered areas and gather more information in parts of
the network that could not send their data in LEACH since there is no near node
that acts as cluster head and provides a gateway to communicate with the sink.
6. In Sharma et al. [6] a protocol is suggested, that is heterogeneous in energy. the
researchers first analyze the basic distributed clustering routing protocol LEACH
(Low Energy Adaptive Clustering Hierarchy), which is a homogeneous system,
then the impact of heterogeneity in the energy of nodes was being studied to ex-
tend the lifetime of WSN. Shows that the proposed Leach-heterogeneous system
significantly reduces energy consumption and increase the total lifetime of the
wireless sensor network.
7. Salim et al. [7] They propose a clustering routing protocol named intra-
balanced LEACH (IBLEACH), which extends the LEACH protocol by balancing
the energy consumption in the network. Which shows that IBLEACH outperforms
LEACH and the existing improvements of LEACH in terms of network lifetime
and energy consumption minimization.
8. Zhao et al. [8] The researchers established a vice cluster head through the com-
munication process for each cluster, that targets to minimize the energy consumed
on the re-clustering process and to extend the time of being in a steady-state phase.
the enhanced protocol performs better than the LEACH and the LEACH-C.
9. Xiangning et al. [9] LEACH protocol was improved by means of energy-
LEACH and multihop-LEACH protocols. Energy-LEACH protocol enhances the
method of choosing the cluster head, the nodes with more residual energy will
be selected as cluster heads in turn. Multihop-LEACH protocol enhances the
communication mode between cluster head and sink. So we can say that energy-
LEACH and multihop-LEACH protocols perform better than LEACH protocols.
10. Yassein et al. [10] The researchers behold LEAH protocol that is the most
serious protocol in a wireless sensor network that uses cluster based broadcasting
technique. They proposed a new version of LEACH protocol called V-LEACH
protocol. The number of messages formed by the V-LEACH is less than the
messages created by the original LEACH, and the new version messages are
less.Which means the remaining energy on the network using V-LEACH is more
than the remaining energy on the network using the original LEACH.
11. Intanagonwiwat et al. [11] The researchers characterized the directed-diffusion
model for the design of divided sensing algorithms. And we can see that directed
diffusion has the potential for significant energy efficiency. Even with compar-
atively non-optimized path picking, it executes superior if it is idealized as a
traditional data dissemination approach such as omniscient and multicast. The
3.3 Detailed Study of LEACH, DD, VRS 32
diffusion techniques are constant with the considered range of network dynamics.
To make full potential you have to take patronage of the sensor radio MAC layers
design.
12. Mirnabibaboli et al. [12] The goal of the study are limiting the flood problem
to increase the network lifetime. interests are classified based on their content, and
the network is divided geographically. A counter is assigned to each Geographi-
cal location that will determine the use of Flooding for a potential existence of a
source and to use Rumor for elsewhere. Using the above-mentioned recommenda-
tions, energy consumption would decrease due to the reduction in Flooding; and
consequently, network lifetime would increase.
routing impractical and delivering the packets to their destination is hard [44][45].
So the solution is to use the alternative approach which is the one phase routing.
The purpose of this alternative is to eliminate the explicit discovery of the routes
so the algorithm can find a path in the changing network and the algorithm for that
is volcano routing scheme (VRS) [42][59].
The fact that cluster heads can compress data arriving from member nodes and
send an aggregated packet to the base station in order to reduce the amount of
information that must be transmitted to the base station which reduces the inter
and intra-cluster interface.
Hence, reduction in energy waste over a factor of 7x and 8x is achieved by LEACH
compared with the direct communication and the transmission energy is reduced
over a factor of 4x and 8x compared with the minimum energy transmitted [46].
The significant characteristics for the LEACH protocol can be concluded as [46]:
1. Balanced energy consumption can be achieved by rotating the cluster head ran-
domized.
2. The start of a new cycle is known because we assume that we have synchro-
nized sensors, so the location and distance information is not required for LEACH
sensors.
By using the idea of dynamic clustering leads to extra overhead due to cluster
head changes, advertisements, also the protocol assumes that all nodes are hav-
ing the same amount of energy and that the cluster head consumes approximately
the same amount of energy for each node. all these facts tell us that the LEACH
protocol is not suitable for large networks and it is the most suitor for constant
3.4 Energy-Efficient Routing Protocols 35
[55].
Usually, sensor network collects the data or process the information of a phe-
nomenon that matches a requested interest from a user. We can call the requested
data an event which expresses a short characterization of the sensed phenomenon
[59]. Directed Diffusion uses reinforcement mechanisms to choose a high-quality
rout among the several access routes to transmit the data. But one of the main
problems of this protocol is the implementation of flooding diffusion used to for-
ward interest and discover the routing map that reduces network lifetime through
high energy consumption.
However we can solve this problem by data-centric protocols which are query
based and dependent on proper data naming [57]. In directed diffusion data is
named using attribute-value pairs. Which appears in Fig(3.12)
The distribution of a sensing task throughout the WSN is considered as an interest
in the named data [54], the distribution helps to set up gradients during the styling
of the network to draw events. Particularly the gradient shows the creation of the
direction state in each node which receives an interest. The neighboring node that
receives the interest represents the gradient direction. Event start flowing toward
the originators of interests along multiple gradient paths. The sensor network re-
3.4 Energy-Efficient Routing Protocols 37
space during name resolution and simplify name specifiers for better understand-
ing [54].
2. Interests and Gradients The named task description is usually injected into
the network at some node (the sink). The sink node creates a task state which will
be erased after the time indicated by the duration attribute [54].
For every active task, the sink broadcasts an interest to all its neighbors. The initial
interest also contains the attributes which intended to determine if there are any
sensor nodes that detect the phenomenon. The initial exploratory interest specifies
a low data rate [56].
, In general, there are several choices for neighbors to resend the interest the sim-
plest one is to rebroadcast the interest to all neighbors which are equivalent to
flooding the interest. But there is a reasonable alternative in the absence of infor-
mation about the sensor nodes that can satisfy the interest [56] after the interest
was flooded all node establish gradients and each pair of neighboring nodes estab-
lishes a gradient toward each other as a result of a local interactions and it contains
a value and a direction in which to send events.
3. Data Aggregation After a node in the specified region receives an interest the
node tasks its local sensor to collect samples, to save power. All sensors are off
until the node is tasked [54] a source generates data once certain conditions are
satisfied. Data can be classified into two types exploratory and non-exploratory.
An event is marked as exploratory if the source has no data gradient or the source
has generated no exploratory events within a window of time. Exploratory events
are sent along all outgoing gradients whereas non-exploratory events are sent
along only data gradients the node that receives an event from its neighbors searches
it interests cache for a matching interest entry if no match exists the event is
dropped.
If a match exists the node searches the data cache for a matching data entry to de-
tect and to prevent a data loop. If a received event matches a data entry, the event
is dropped otherwise, the received event is added to the data cache and resents to
3.4 Energy-Efficient Routing Protocols 39
• Completely distributed.
• Low complexity.
• Stable system.
• Fixed topology.
3.6 Summary
This chapter has discussed the details of LEACH, DD, and VRS. The features
and advantages of each one and how to avoid the disadvantages to have the best
optimal way to discover the route, and to deliver the packets to their destination.
Which is the reason why I have chosen these protocols instead of the other routing
protocols used in the WSN? From what I am going to the next chapter to present
the basic model of the new network.
Chapter 4
Proposed Protocol
This technology is increasingly dominating every aspect of our lives the tech-
nology and communication part are used to ease our lives; Hence, we are going to
solve the problem of the WSNs energy. Which is demonstrating and will have a
very powerful future in the next few years.
4.1 Methodology
We have done a survey to start, that describes the LEACH and VRS which we
are using for the new proposed protocol. We described every detail that helps
to reproduce a new routing protocol that involves two different kinds of protocol
with two different structures. We are using two protocols for the dynamic routing
with two algorithms VRS protocol and optimization algorithm for the LEACH
protocol and that is making the network topology energy efficient without a high
cost for the whole network, doing that will prolong the network lifetime.
The simulation is used to measure the performance of the WSNs after proposing
the dynamic protocol. Which gives the network the option to choose the protocol
to operate according to the residual energy of the network and the nodes.
The network is preserving the energy by operating the VRS protocol on the
lookup tables, so the nodes are on sleep mode until they are needed to operate a
new task of harvesting information.
The lookup table saves the location of the nodes with (X, Y) pairs and a number
as a name for the node to distinguish it from other nodes. Also, it saves the initial
42
4.1 Methodology 43
energy(REC) for the network which we start with and the energy after every ex-
ecution. Additionally, the efficient data aggregation (AGG) which makes use of
the distance and position of nodes to send data in the most efficient way.
Those two parameters show the efficient utilization of energy for our newly pro-
posed protocol which prolongs the WSNs lifetime since the power source is the
most precious one for the WSNs.
Our dynamic protocol alternate using the LEACH protocol and VRS protocol dy-
namically. The BS has the choice of what to operate at a specific moment.
The network is divided into grids and every node belongs to a known location.
The nodes took their position in the grids and memorized their location and the
neighbors’ location inside the grid they belong to and their assigned sink node that
will communicate and send the data to the BS. Which is seen in Fig (4.2).
The elected sink nodes gather the collected data from the normal nodes in order
4.1 Methodology 44
to pass it through the data mining algorithm to build the data pattern to be saved.
Which is seen in Fig (4.3).
The central server request specific data from the BS then it searches for the
data on the lookup tables using VRS algorithm to look for the patterns constructed
using the data mining algorithm with the decimal normalization.
If the data is founded in the lookup tables the data is sent to the BS to the final
destination (central server) without searching the whole network, if not the BS
is sending the request to the sink node to operate LEACH protocol to sense and
collect new data needed for the central server.
The BS determines which sink node to send the data to using the location that the
BS knows the data is in it.
In the network we have 4 sink nodes which send the data sensed from the normal
nodes; Hence, the sensed data is remarked with their location.
So every node takes readings which are put in the lookup tables and the readings
are arranged using data mining algorithm with decimal normalization to produce
patterns of the data coming from the sink node to be sent and saved to the BS.
After being divided into ranges so we can search the area(X, Y) which has the
readings using the specific range and location.
location and energy are the main content in the lookup tables. The network grid
structure has no influence on the constructed patterns from the data mining algo-
rithm.
The tables are divided into groups according to the data source location.
4.1 Methodology 47
LEACH protocol is used when we need to know the whole state of the network,
and we need to collect data from all the node in a specific area belonging to one
grid or many grids.
Starting with the clustering our protocol using the clustering characteristics and
the distance between nodes by solving the optimization problem for the network.
Hence, our protocol initializing a small world of sensors which are arranged ran-
domly and the adjacency matrix is constructed by using the distance formula [65].
q
D = [(X2 − X1)2 + (Y 2 − Y 1)2 ] (4.1)
The distance formula is used to determine the optimal number of nodes that will
be chosen as sink nodes by using the clustering analysis to share the resemblance
of the centric communication function. Hence, to implement it, the hierarchical
clustering analysis is used to build a series of sensor nodes from the lowest level
to the highest with the consideration of the nodes communication distance. The
cluster analysis needs the appropriate number of sink nodes to be identified and
it is scaled through the lifetime of the network. Sink node cost and the premier
energy for the network. To achieve that we need a median node called key nodes
linked directly to the sink and those key nodes deliver the data from the sensor to
sink and this data has to pass from(N-K)/K sensors.
Where (N) is the total number of the network nodes, while (K) demonstrating the
number of key nodes that link with the BS.
To put a limit for the increasing number of sink nodes we define the network cost
as C=N.Cn+n.Cs and the appropriate number of sinks will be computed by[65].
s
Cn ∗ (Et + Er)
n=N [ ] (4.2)
Cs ∗ K(E0 − Er)
Where (Cn) is the sensor node cost, while (Cs) is the BS cost, (Et) is the trans-
mitted energy for communication per node pairs, (Er) is the received energy for
communication per node pairs, (E0) energy consumption while there is no com-
munication between nodes.
According to that if we had two grids having the needed data the nearest to the BS
will communicate.
In DD, The VRS is used to send the data to the location that needed the data not
the nodes that requested it and with that, we will handle the flooding problem that
causes overlapping and duplication of the messages. The computation for which
protocol to chose is done on the BS also the grid division the BS will save a look-
up table for the network behavior so it doesn’t have to do the computation all over
again every time when there is a need for information from the nodes.
4.1 Methodology 48
The BS of the network is the node with full energy, which is dividing the net-
work into ten equal grids every sensor in these grids is collecting data in it until it
is needed.
Every node knows its location and distance to the BS in LEACH protocol we have
sink nodes that connect the normal nodes with the BS. Sink nodes communicate
directly with the BS. The packet is sent from the node to the sink node towards
the BS in the same path back and forth. The path with the LEACH protocol is
determined by the optimization algorithm.
The BS requires the needed data and before that no data is sent. BS sends the
request to the specific location that knows it can find the data required in, and
not for the whole network and that save the energy for the unrelated nodes from
recollecting and computation.
Table 4.1: Nodes Communication Model.
The VRS has a great advantage, that it doesn’t have a restricted route discovery
phase and a high tolerance for the rapid changes. So if one node dies the neigh-
bors of this node are going to handle the data request and communicate according
to the time slots.
The advantage of not having a restricted route path for the VRS is helping with
operating the optimization algorithm used in LEACH to handle the DD as well.
So when the network energy is suitable and the amount of data is big(harvested
from each sensor) and has a known location, we can use the LEACH protocol and
use the optimization algorithm.
If the amount of data is small(in the lookup tables) we can use DD. The nodes
collect the data and save it until it is needed, the BS is going to send a request
according to the location and distance to a specific node and that is going to be the
reply path for the data to go back to BS.
The optimization algorithm is used to measure the distance and the location for
each node and VRS collects the data from nodes and save them till needed.
Transforming data between the nodes and BS for the DD and LEACH the BS will
take the location information for every node into consideration and the packet will
be delivered to the location which needs the information and it will be requested
based on the location of the nodes and that will give us so many advantages about
energy conservation because the nodes have not to store the information tables for
the routes and the data packet arrival is based on the location and the distance of
4.1 Methodology 49
the nodes using LEACH. Data collection from all the cluster heads will be done
by CH and it will check the redundancy of the data to recognize the occurred pat-
tern, which is beneficial for the sensor readings[63][64].
This is focusing on energy conservation on WSN and with this way we make just
the cluster head communicates with the BS.
S=U 1, U 2, ..U n
Do
CHi is the cluster head of Ci if E(OiI) is high unisenses the inf ormation
and passes the messages to CHi
while(E(uiI)) (E(uij))
For the maintenance, if the BS sent a request and that node is dead and has no
energy the network sends an error message and the closest neighbor node that has
almost the same location is going to handle the request after sending the error
message and for the new request or accepting the reply that is sent from the neigh-
bor.
A network with (100) sensors have been built and those sensors are going to col-
lect data from their environment according to their location in a distributed way
so it is distributing the workload in a resilient way that can prolong the network
lifetime.
Hence, the distributed way will control the amount of communication between
nodes and forbid heavy traffic from happening in the limited bandwidth of the
wireless channels and that is a source preserving because in that way we con-
trol the power used in computation and communication process and to avoid any
effects or unusual values in our information some normalization is going to be
done on the data and decimal scaling is the used technique by moving the decimal
points.
To do so distributed data algorithm is used in order to cope with the nodes lim-
itations (power, computation, memory). The distributed algorithm is going to
process the data locally then the results are aggregated in this way the energy for
the communication process is reduced and at the same time, the number of mes-
sages during the process of data transfer to the central data is reduced.
The option of distributed data mining algorithm helps the WSNs to live longer
and controls the huge data flow that can cause bottleneck and wastage of commu-
nication bandwidth because its collecting a huge data to analyze.
Initialize network
if If data in BS then
search using DD in look up tables
else
End if
Go to step 2
end if
end if
4.2 Summary
Chapter four is the most important one, because it is describing the basic pro-
posed protocol and how to use the two protocols to gather. And that is preparing
us to see the end results of the proposed protocol and how it is working and how
efficient it is.
4.2 Summary 52
In this chapter, the proposed protocol is coming to life with the simulation re-
sults. The network initializing all the way through to the results of the proposed
protocol.
5.1 Assumptions
For this proposed protocol, we make some assumptions as follows:
• The nodes can use power control to vary the amount of power transmitted
to reach the BS.
Our main concern is measuring the performance of WSN in terms of energy suf-
ficiency we are using metrics that have an influence on energy consumption. In
WSN, the matrices are used to evaluate the performance of a WSN as a whole.
These metrics are:[51][46][48][57]
• Packet Delivery Rate: help us to know the ratio of the delivered packets to
their destination with the packets sent from the source.
54
5.2 Simulation Environment of The Experiment 55
NS3 is executed using C++; Hence, the memory management functions are
obtainable and they are free, It is de-allocating the nodes by pursuing the number
of pointers which can be helpful with dealing with the packets.
NS3 is scalable, controlled and provides a cost-efficient substitute for running the
system without putting it in real experiments.
There are several simulators to use but the most suitable simulator is NS3 for its
advantages[69][68]:
1. Scales to thousands of nodes
2. It holds the complete system
3. It is Fidel and holds all the interactions in the network sequentially.
4. Allows driving, monitor, debug simulation.
5.3 The Environment 57
equation (Fig 4.7 the sink node formula, in page 35), the best number of cluster
heads are 4 because the cluster heads are energy consuming due to the communi-
cation and the transition with the BS[65]; Hence, less of cluster heads are better.
The network is communicating with the BS without exhausting the network en-
5.4 Conducted Experiments 59
The source selection and the destination selection in our WSN and assigning
the nodes to the nearest cluster head without losing energy from the nodes them-
selves. The nodes were divided into 4 large clusters to communicate with the BS;
So, the sensors nodes collect the sensed data and send it to the destination through
the route in Fig (5.4).
Finding the best route between the source and destination according to the
optimization algorithm that is used with the LEACH protocol to select the shortest
best path to save the energy by visiting the lowest number of nodes to save their
energy while harvesting the data from the environment.
Being in the sleep mood is saving a lot for each node to prolong the network
lifetime in Fig(5.5).
Data transmission (packet delivery) between nodes to the destination nodes to
the BS. Each packet sent is going the same path as the request, and each packet
is containing its location and the data needed. Moreover, the location where it is
directed in Fig (5.6).
The data for each node is saved in the lookup tables, these lookup tables are
built using decentralized mining algorithm using decimal normalization to save
the needed information about the environment they are planted in.
When the central server is requesting any information from the BS the first step
is to search using the DD protocol in the lookup tables for the data. The data is
delivered to the central server from the look-up tables if not the WSN is going to
5.4 Conducted Experiments 60
start the clustering process with the LEACH protocol to sense new data.
In this table, we can see the startup energy (REC) for the BS and the computation
for the nodes as well. The presented proposed protocol shows an efficient data
forwarding (AGG) in the network due to the region based energy aware cluster
5.5 Proposed Protocol Evaluation 61
The experiment is performed to present a new proposed protocol for routing us-
ing two different protocols to preserve the energy for the WSN in order to prolong
the network lifetime because of the power limitations that occur with the WSN.
1.The End-to-End Delay Versus The Node Number
End-to-End delay means the packet arrival time to their destination. Which in-
clude the route discovery operation delay and the packets transmission queue.
The packets that are counted only that have successfully reached the destination.
We run the simulation to calculate the average delay for 100 (samples) nodes. So
when the packet arrives to the destination we record the arrival time to calculate
the current delay. The same operation is done with every packet and we increment
the samples one by one then we can get the total delay for the whole network.
Fig (5.9) presents the rate of the data arriving at their destination, it increases
by the number of nodes participating in sending the required information. How-
ever, the increase is due to the new route discovery which is done by the nodes
trying to compete to reach the wireless channel and not to be dropped or lost.
Fig (5.9) represents that the end-to-end delay for the proposed protocol gradually
starts in a smooth way from 0.6 second for the 1 node of the transmission process.
Which means that always the network has routes to the destination and available
all the time.
5.5 Proposed Protocol Evaluation 63
Then the proposed protocol starts stabilizing at node no. 70 tell the last node par-
ticipating in the network.
Due to the new route discovery operated by LEACH the delayed packets are in-
creased to 1.3 second for node no.1 comparing with the same node in the proposed
protocol and starts stabilizing at node no. 50.
For the VRS it starts from 2.3 second for node no. 1 and increases steadily then
stabilize at node no 80.
2.Energy Consumption Versus The Number Of Nodes
Energy consumption means how much energy the WSN consumes while operat-
ing. The main concern is the efficiency of the WSN. Hence, presenting the energy
consumption with the number of nodes. In order to the high energy consumption
of the cluster head formation.
The energy consumption in each sensor is the sum of the transmission energy con-
sumption and the received energy consumption multiplied with the time. Ec=(Et+Er)*t
.
Where Ec is the consumed energy, Et transmission energy consumption, Er re-
ceived energy consumption, t is the time.
Fig (5.10) presents energy consumed by the activated nodes through the network
while harvesting data to find the required information which increases with the
5.5 Proposed Protocol Evaluation 64
ter than the packet delivery for the LEACH on its own. The packet delivery ratio
for the proposed protocol gradually starts from 15 at the 1 second of the transmis-
sion process then stabilize at second 7. However, the LEACH start from 11 at the
1 second, which indicates that the proposed protocol is delivering the packet to
the destination effectively.
For the VRS starts from 36 at the 1 second the decreases gradually then stabilize
at second 6.The protocols indicates that every packet sent arrives to the destination
and the best one is VRS because it depends on the location.
4.The Throughput Versus The Number Of Nodes
Throughput is the maximum infallible packets delivered to the destination during
the communication process, and how fast sending the packet through the commu-
nication channel is without having congestion.
Fig (5.12) presents that more nodes are delivering more packets. Which indicates
a good performance for the WSN.
Throughput for the proposed protocol starts gradually from 23 Mbps for the first
node then starts stabilizing when node no.60 is activated.
LEACH throughput depicts that it might have some energy lost dealing with the
congestion problem. Furthermore the packets are delivered effectively to their
destination through the communication process.
5.5 Proposed Protocol Evaluation 66
For VRS it decreases from 48 Mbps the stabilizes at the node no. 70.
5.The Packet Routing Load vs Simulation Time
The packet routing load expresses the total number of transmitted packets over
the successful transmission. In which the router chooses the best low-cost route
to the destination, and in this case with low energy consumption.
Fig (5.13) shows that that more packets are sent to their destinations at the first
few minutes and after that, it stabilizes, which means that the proposed protocol
saves the energy for the nodes that transmit data. Because it delivers 160 packets
in less than 15 seconds then stabilize at this range of packet delivery
Fig (5.13) represents LEACH routing load gradually increases which depicts that
the increasing packet routing load with time consumes more energy from the
nodes which reduce the network performance.
However, VRS starts from 50 packets then stabilizes at node no. 50 with 90 packet
delivered.
5.6 Summary 67
5.6 Summary
This chapter shows the results of the newly proposed protocol how it operates
and the WSN behavior during the communication process. How they deliver the
packets. Moreover, the best route and the computation inside the network.
What makes the new proposed protocol better than using one protocol at a time
that I am making benefit of the advantages of the two protocols, to prolong the
network lifetime.
The newly proposed protocol proved that it can prolong the network lifetime by
improving the 5 metrics that we measured.
5.6 Summary 68
6.1 Conclusion
The whole idea is about creating a new way of dealing with WSN to overcome
the power limitations, and to prolong the network lifetime. This is done by using
two energy efficient protocols which are the LEACH and DD. We are using the
clustering process and the hierarchical structure of the LEACH and making use of
the cluster heads to do the communication process with the BS. Which saves the
energy for the nodes and consumes the energy from the limited number of cluster
heads. As for the benefits of the DD, the protocol is the location because the DD
deals with the VRS algorithm it makes use of the location of each node. So, it
helps to know the position for each node; Hence, if there any problem reaching
the specific node.
The proposed protocol is sending the packets to the location and the nearest node
is handling and processing the request and the data. From that, we deduced that
adopting a new thought in dealing with the WSN is going to make a breakthrough
in the networks industry. In this way, the network industry is avoiding a lot of
limitations starting with the power consumption to all other areas that need devel-
opment or override.
, Of course, using two protocols or even more. It is helping to have more benefits
and avoid the problems for each one when it is standing alone. It has its problem,
but we are avoiding these by using the right calculations and algorithms.
The creative way of thinking by using more than one protocol is not going to over-
head the network if we used the right protocols together. In addition to doing the
needed adjustment on each protocol to cope with the requirement and to overcome
the obstacles and limitation.
At the first we thought it is easy to make the network dynamic from a to z but in
reality, it is not. The first phase we had to put some specific commands to operate
69
6.2 Limitation 70
like sensing, the normal nodes are sensing the data and sending it to the sink node
which organizes the sensed information by their location and where they come
from which node and the energy status of the specific node to send them to the
BS. The BS is doing the computation and assign a pointer to the information. So
it is easy to trace them later when the data is needed.
The data pointer is saved in the lookup tables which are organized according to
the residual energy computed by BS and the pointer(packet number). All this is
done by using data mining algorithm; So it can create and save lookup tables,
remarked with the source location and the amount of energy at each node; More-
over, observing the network behavior and making patterns of the most important
parameters and features to save them. So it is easy to take the data from the tables
without operating the network.
All of that needs a normalization process using the decimal technique. In order to
avoid the up normal value because we depend on location.
When the central server communicates the BS for some data. BS is operating the
DD on the lookup tables saved in it and searching the patterns collected using the
mining data. If the data is found it is going to be sent to the central server without
operating LEACH on the whole network. If not the network is operating LEACH
to harvest new data as requested. finally, the last phase is the dynamic selection
of the protocols, choosing which one to operate based on its presence or absence
on the lookup tables.
Using the newly proposed protocol in WSN are better in the network lifetime mat-
ter, it improved the network lifetime by enhancing the performance of the nodes
through the communication process and in the way of using the energy in each
node and it was measured to show how well it did in the energy consumption
matter.
6.2 Limitation
The following section introduces the limitations of this study:
1. The first one is how to deal with two protocols with two different structures.
That coming with finding the right algorithm to avoid their cons and to be energy
efficient as well as the protocol.
2. The scalability problem that occurs when the nodes number increase; Hence,
it is beneficial to use a scalable simulator or adjust the scalability by adjusting the
protocol if needed.
6.3 Future Work 71
[1] Shuang-Hua Yang. Wireless Sensor Networks Principles, Design and Appli-
cation. Springer CH(1-2).
[4] Wireless Sensor Networks. SPIE, Vol 6357,6357-1, 2006. Chris Guy.
https://www.spiedigitallibrary.org/conference
proceedings of spie
72
[9] A Generalized Framework for Energy Conservation in Wireless Sensor Net-
work. IJCSI, Vol 8, No 1, January 2011. V.S.Anita Sofia, Dr.s.Arockiasang.
[11] An Energy Efficient Cluster Based Routing Algorithms for Wireless Sen-
sor Network. International Journal of Engineering Science and Computing
(IJESC), Vol 6, No 7, July 2016. Suman Bara, Silki Baghlal.
[16] Geographical and Energy Aware Routing are Cursive Data Dissemination
Protocols for Wireless Sensor Network. 2001. Yan Yu, Remesh Govindon.
http://graphics.stanford.edu/courses/cs428-05-spring/Lectures/GEAR
73
[20] Lan Switching First-Step,CH1, Swich Port Analyzer.
http://etutorials.org
[24] http://shodhganga.inflibnet.ac.in/bitstream/10603/22912/7/
[07c hapter0 1.pdf ]accessedin2018
74
[33] Network Structure or Topology.India International [Journal
of Advanced research In Computer Science and
Management Studies] Vol 1, No 2, July 2013, ISSN 2321-7782.
Kartik Pandya, (S.M.V).
[37] Analyzing Rotational Intertia, Grid Topoligy and their Role for Power
System Stability.Elsevier, https://doi.org/10.1016/j.ifacol.2015.12.436,IFAC
2405-8963, 2015. Andreas Vlibig, Theodors Borsch, Goran Andersson.
[41] Energy Efficient Routing for Wireless Sensor Networks with Grid Topology.
International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006. Pro-
ceedings. Hoch Guan, Goh, Mou LimSim, Houg Tat Ewe.
75
[44] Effective Local Dynamic Routing Strategy for Air Route networks. Chinese
Journal of Aeronautics, 21 July 2015, 28(6):1709-1717. Wu Wenjun, Zhao
Lingxi.
[45] Dynamic Routing.
http://WWW.techopedia.comaccessed in 2018
[46] Energy Efficient LEACH Protocol for Wireless Sensor Network.International
Journal of Information and Network Security (IJINS), Vol 2, No 4, August
2013, ISSN: 2089-3299. Nishi Sharma, Vandna Verma.
[47] Improvement on LEACH protocol of Wireless Sensor Network. International
conference on Sensor Technologies and Application, DOI 10.1109,2007 . Fan
Xianguing, Song Yulin.
[48] Low Energy Adaptive Clustering Hierarch in Wireless Sensor Network
(LEACH).
International Journal of Computer Science and Information Technologies
(IJCSIT), Vol 5, No3, 2014, ISSN:0975-9646 . Lalita Yadav, Ch.Sunitha.
[49] LEACH Protocol In Wireless Sensor Network: A Survey.
International Journal of Computer Science and Information Technologies
(IJCSIT), Vol 7(4), P 1894-1896, 2016, ISSN 0975-9646 . Reshma I.Tandel.
[50] IBLEACH: Intra-balanced LEACH Protocol for Wireless Sensors Networks.
Springer 2014, 20:1515-1525, DOI 10.1007/s11276-014-0691-4 . Ahmad
Salim, Walid Osamy, Amed M.Khedr.
[51] LEACH-B: An Improved LEACH protocol for wireless sensor network.
IEEE, 2010, 978-1-4244-3709-2. Mu-Tong, Minghao Tang.
[52] Improvement on LEACH Protocol of Wireless Sensor Network(V-LEACH).
January 2009, Research Gate, DOI: 10.1109. M.Baniyassein, A.AlZoubi,
Y.Khamayseh, W.Mardini.
[53] Protocols and Architectures for Wireless Sensor Network. WILEY.com. Hol-
ger Kaurl, Andreas Willig.
[54] Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transac-
tions on networking, Vol 11(1), February 2003, 1663-6692. Chakrmek In-
tanagonwiwat, Ramesh Govindam, Deborah Estrin, John Heidemanm.
[55] Network Structure and Topology Based Routing Techniques in Wireless Sen-
sor Network A Survay. International Journal of Computer Application(0975-
8887), Vol 74(12), July 2013. Rajendra Singh Bisht, Shailendra Mishra.
76
[56] Directed Diffusion: An Application-Specific and Data-Centric Communica-
tion Paradigm for Wireless Sensor Network. University of Southern Califor-
nia, Doctor thesis, December 2002. Chalermek Intanagonwiwat.
[57] Improving the Directed Diffusion In order to Reduce the Average of Energy
Consumption in Wireless Sensor Network. The fifth International Conference
on Sensor Technologies and Application,IARIA, 2011, ISBN 9781-1-61208-
144-1. Miresmacil Mirnabibaboli, Mehdi Mirfattahi, Mher Markosyan.
[58] Ruoting,
http://WWW.en.WiKipedia.org/wiki/routingaccessed in 2018
[61] Survey on Single Path and Multi Path Energy Efficient Routing Protocols for
Wireless Sensor Networks. Journal of Computer and Communicatins, 2017,
5, 1-11, ISSN 2327-5227. Nimrah Saeed, Maryam Murad, Mehmood Nawaz,
Misbah Irum.
[65] Energy Effective Wireless Sensor Network Modeling Based on Complex Net-
works. Journal of sensors, vol 2016, article ID 3831810, hindawi publishing
corporation. lin xiao, fahui wu, digcheng yang, tiankui zhang, xiaoy zhn.
[66] Data mining techniques for wireless sensor network: a survey. International
Journal of Distributed Sensor Networks, https:doi.org 0.1155 2013 406316,
July 21,2013. Azhar Mahmood, Keshi, Shaheen Khatoon, Mi Xiao.
77
[67] Assisted-Leach (A-Leach) Energy Efficient Routing Protocol for Wireless
Sensor Networks. International Journal of Computer and Communication
Engineering. 420-424. 10.7763/IJCCE.2013.V2.218, 2013. Inodh Kumar,
Sunkara Pal, Ajit.
[68] A Survey of Network Simulation Tools: Current Status and Future Develop-
ments.
http://www.cse.wustl.edu/ jain/cse567-08/index.html.
accessed in 2018 Jianli Pan.
78