scispace - formally typeset
Proceedings ArticleDOI

Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach

O. Younis, +1 more
- Vol. 1, pp 629-640
Reads0
Chats0
TLDR
A protocol is presented, HEED (hybrid energy-efficient distributed clustering), that periodically selects cluster heads according to a hybrid of their residual energy and a secondary parameter, such as node proximity to its neighbors or node degree, which outperforms weight-based clustering protocols in terms of several cluster characteristics.
Abstract
Prolonged network lifetime, scalability, and load balancing are important requirements for many ad-hoc sensor network applications. Clustering sensor nodes is an effective technique for achieving these goals. In this work, we propose a new energy-efficient approach for clustering nodes in ad-hoc sensor networks. Based on this approach, we present a protocol, HEED (hybrid energy-efficient distributed clustering), that periodically selects cluster heads according to a hybrid of their residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED does not make any assumptions about the distribution or density of nodes, or about node capabilities, e.g., location-awareness. The clustering process terminates in O(1) iterations, and does not depend on the network topology or size. The protocol incurs low overhead in terms of processing cycles and messages exchanged. It also achieves fairly uniform cluster head distribution across the network. A careful selection of the secondary clustering parameter can balance load among cluster heads. Our simulation results demonstrate that HEED outperforms weight-based clustering protocols in terms of several cluster characteristics. We also apply our approach to a simple application to demonstrate its effectiveness in prolonging the network lifetime and supporting data aggregation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks

TL;DR: A new Elliptic Curve based key selection and Hill Cipher based encryption scheme is proposed in which the keys are permuted to enhance the size of the key to suite thesize of the image matrix leading to a secured transmission by effective encryption of the images that are transmitted through wireless sensor networks.
Book ChapterDOI

FFMS: Fuzzy Based Fault Management Scheme in Wireless Sensor Networks

TL;DR: A fuzzy logic based fault detection and fault management scheme (FFMS) for efficient detection of different types of nodes named as normal node, traffic node, end node, and dead node is proposed.
Proceedings ArticleDOI

Energy-aware routing in sensor networks using dual membership clusters and data highways

TL;DR: Simulations show that using dual-membership clusters greatly decreases the message overhead for route discovery and helps in increasing the network lifetime.
Book ChapterDOI

Range-Free Localization Techniques

TL;DR: This chapter introduces the basic concepts of range-free localization, surveys a variety of state-of-the-art localization techniques, compares qualitatively the characteristics of these protocols, and discusses current research directions in range- free localization.
Proceedings ArticleDOI

State of the art and research challenges for USN traffic flow models

TL;DR: The traffic flow type impact to the USN life-time in the different intrusion conditions is proved and the self-similarity features are determined for telemetry, image and medical USN applications traffic flow models.
References
More filters
Journal ArticleDOI

Estimating the Dimension of a Model

TL;DR: In this paper, the problem of selecting one of a number of models of different dimensions is treated by finding its Bayes solution, and evaluating the leading terms of its asymptotic expansion.

Estimating the dimension of a model

TL;DR: In this paper, the problem of selecting one of a number of models of different dimensions is treated by finding its Bayes solution, and evaluating the leading terms of its asymptotic expansion.
Book

Data Mining: Concepts and Techniques

TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI

An application-specific protocol architecture for wireless microsensor networks

TL;DR: This work develops and analyzes low-energy adaptive clustering hierarchy (LEACH), a protocol architecture for microsensor networks that combines the ideas of energy-efficient cluster-based routing and media access together with application-specific data aggregation to achieve good performance in terms of system lifetime, latency, and application-perceived quality.
Related Papers (5)