WSN Clustering
WSN Clustering
WSN Clustering
I. I NTRODUCTION
With the introduction of low-cost processor, memory, and
radio technologies, it becomes possible to build inexpensive
wireless micro-sensor nodes. Although these sensors are not so
powerful compared to their expensive macro-sensor counterparts, by using hundreds or thousands of them it is possible to
build a high quality, fault-tolerant sensor network. These networks can be used to collect useful information from an area
of interest, especially where the physical environment is so
harsh that the macro-sensor counterparts cannot be deployed.
They have a wide range of applications, from military to civil,
that may be realized by using different type of sensor devices
with different capabilities for different kinds of environments
[1].
The main constraint of sensor nodes is their very low finite
battery energy, which limits the lifetime and the quality of
the network. For that reason, the protocols running on sensor
networks must consume the resources of the nodes efficiently
in order to achieve a longer network lifetime. There is an ongoing research on power management issues in order to reduce
the power consumption when the nodes become idle [2]. When
power efficient communication is considered, it is important to
(3)
Ci0 (k) =
(4)
or
Eelec k + Eamp k d2ib
(1)
(2)
This information can be entered manually to the base station, or the base
station can get the coordinates from the nodes if the nodes are equipped with
GPS, or alternatively techniques like triangulation can be used.
Eelec k + Eamp k d2
Eelec k
Fig. 1.
with link costs Cij (given in Equation 3) among the nodes and
Ci0 (given in Equation 4) between the nodes and base station.
The data packets are then routed to the base station over the
edges of the computed minimum spanning tree. We call this
routing strategy as PEDAP (Power Efficient Data gathering
and Aggregation Protocol). Figure 2 illustrates the idea on a
sample network. Although PEDAP does not take the balancing
issue into account, it always achieves a good lifetime for the
last node. This is because, until the time the first node dies, the
minimum possible energy is expended from the whole system.
So the total remaining energy is optimum for the rest of the
nodes. This is true for each death, thus after each node death
the remaining energy in the system is maximum. So PEDAP
protocol achieves almost the optimum lifetime for the last node
in the system, while providing a good lifetime for the first
node.
In order to achieve the second part of the idea, balancing the
load (henceforth the energy consumption) among the nodes,
we can use the information about the remaining energy of each
node. When the base station is far away from the nodes, the
node that dies first is usually the one that sends aggregated and
fused data to the base station. So, a node with low remaining
energy would not want to send to the base station. That node
would like to expend its remaining energy by sending to a
nearby neighbor and thus try to maximize its lifetime. Also a
low-energy node would not like to receive many packets from
others, since receiving is a high cost operation too. Its tendency
would be only to send its data and not to receive anything from
others. In order to achieve these, a slight change in the cost
functions helps us. The new cost functions will be as follows:
2 Eelec k + Eamp k d2ij
(5)
ei
Eelec k + Eamp k d2ib
Ci0 (k) =
,
(6)
ei
where ei is the remaining energy of node i, which is normalized with respect to the maximum possible energy in the
battery (i.e. 0 ei 1).
As it can be noticed, now the cost of communication
between the nodes is not symmetric. According to Equation 5,
the cost of sending a message from a node i to its neighbors increases as the remaining energy of node i decreases. Although
this new formula usually does not change the selection of the
neighbor which a node sends, it postpones the inclusion of
Cij (k) =
3000
3000
direct
leach
pedap
pegasis
pedappa
2500
2500
2000
Time (rounds)
Time (rounds)
2000
1500
1500
1000
1000
500
500
direct
leach
pedap
pegasis
pedappa
10
20
30
40
50
60
Number of Node Deaths
70
80
90
100
10
20
30
40
50
60
Number of Node Deaths
70
80
90
100
5000
5000
direct
leach
pedap
pegasis
pedappa
4000
4000
3500
3500
3000
3000
2500
2500
2000
2000
1500
1500
1000
1000
500
500
10
direct
leach
pedap
pegasis
pedappa
4500
Time (rounds)
Time (rounds)
4500
20
30
40
50
60
Number of Node Death
70
80
90
100
10
20
30
40
50
60
Number of Node Deaths
70
80
90
100
TABLE I
T IMINGS OF NODE DEATHS . BASE STATION IS IN THE CENTER
TABLE II
T IMINGS OF NODE DEATHS . BASE STATION IS DISTANT FROM THE FIELD
Energy(J)
Protocol
FND
HND
LND
0.25
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
596
297
439
1228
2177
1147
1247
2259
2334
2352
4836
2223
2667
4836
4836
0.50
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
1192
1036
774
2455
4353
2293
2927
4496
4668
4688
9672
4362
5175
9672
9672
1.00
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
2383
2627
1428
4910
8705
4586
5603
9036
9336
9378
19343
7747
10443
19343
19343
Energy(J)
Protocol
FND
HND
LND
0.25
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
61
60
184
213
998
104
255
1856
2135
2103
223
632
2190
2674
2217
0.50
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
121
123
1070
426
2897
208
661
3767
4271
4067
445
2134
4344
5337
4272
1.00
DIRECT
LEACH
PEGASIS
PEDAP
PEDAP-PA
242
351
1332
851
6899
416
1983
7309
8544
7763
889
3961
8536
10665
8438
and LND stand for the times at which the first and the last
node die. HND stands for the time at which half of the nodes
die. Note that the performance of LEACH is very close to
direct communication in all simulations. This is because we
recompute the routing information every 100 rounds, which
is a reasonable number. So, LEACH protocol consumes too
much energy until 100th round.
Also it is worth to note that doubling initial energy level
almost doubles the lifetimes in all protocols as expected. In
PEDAP-PA, however, when the initial energy is doubled, the
lifetime of first node increases about 2.5 times. We believe that
this is because PEDAP-PA finds more chance to recompute
the routing information with increasing initial energy. As
the number of re-computations increases, more energy saving
routing paths are achieved, since PEDAP-PA is power-aware
unlike others.
V. I MPLEMENTATION
In this section, we consider firstly the basic environment
for implementing our algorithms in a real-life situation. After
that, we discuss other environments where our algorithms are
also feasible to implement. First of all, for our algorithms to
work, every node should be able to communicate with base
station and with each other. The locations of nodes must be
known by the base station a priori, which can be done either
by manually entering coordinates, or by means of methods
such as triangulation, or by using GPS. We do not consider
the length of a round. This is reasonable for applications where
the measurements are taken infrequently such as periodic
measurements of average temperature in an area of interest.
We divided each round into stages whose length is equal
to the time to send a message multiplied by the maximum of
the in-degrees of the nodes in the minimum spanning tree. The
number of stages is determined by the depth of the tree. In the
first stage, all leaf nodes at maximum depth send their data
to their parents. The parents apply TDMA multiple access
scheme among their children. Each node sends its message
with its parents CDMA code, in order to prevent collisions
with the messages of other nodes sending to different parents
at the same time. In the next stages, the procedure climbs one
level up until it reaches the root, the base station. After 100
such rounds all nodes stop sending their data, and turn on their
receivers to get the information about the new routing paths
computed by the base station.
Our algorithms can also work in environments where all the
nodes and the base station are not in direct communication
range of each other. In this case, a distributed minimum
spanning tree algorithm [13] can work. However, this method
increases set-up cost dramatically. On the other hand, if
the base station can still transmit to all the nodes directly,
the scheme can be efficiently computed at the base station
assumming the visibility graph is given.
VI. C ONCLUSION AND F UTURE W ORK
In this work, we present PEDAP and PEDAP-PA, two power
efficient data gathering and aggregation protocols based on