special issue comparison of cluster based routing...

14
Comparison of Cluster Based Routing Protocols in Wireless Sensor Network: A Recent Survey Murugaanandam.S 1, Karthika Sundaran 2 and Ganapathy.v 3 Department of Information Technology, SRM University, Chennai [email protected], [email protected], [email protected] Abstract The applications of Wireless Sensor Networks (WSNs) have grown tremendously over the past few years. The cluster mechanism extends the life of a network and supplies additional economical functioning procedures in WSNs. A method to subdivide the field into groups of sensors is defined as clustering. A Cluster Head (CH) is elected either by the Base Station (BS) or by the specific protocol within a cluster. Optimized clusters can save certain amount of energy in the WSN. Based on the parameters like cluster count, cluster size, cluster density, message count, node selection, heterogeneity of nodes, location awareness and CH selection methods, we have surveyed and compared ten varied consistent cluster protocols for WSNs. The comparison highlights the advantages and disadvantages of these protocols. Routing method, clustering method, algorithm complexity, node deployment, scalability, location awareness, load balancing, network life time and energy efficiency have been considered as a few important characteristics for comparing the protocols. Factors such as network types, mobility and topology of various protocols are also surveyed in this paper. Based on the survey of the network protocols, we propose a brief outline of a new clustering algorithm, which will be more efficient than the existing ones. Keywords: Cluster count, cluster size, cluster density, lifetime 1. INTRODUCTION A system of nodes connected to one or more sensors is the basic layout of a wireless sensor network. The network nodes in such International Journal of Pure and Applied Mathematics Volume 114 No. 7 2017, 559-571 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 559

Upload: others

Post on 02-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

Comparison of Cluster Based Routing Protocols in

Wireless Sensor Network: A Recent Survey

Murugaanandam.S

1, Karthika Sundaran

2 and Ganapathy.v

3

Department of Information Technology, SRM University, Chennai

[email protected], [email protected],

[email protected]

Abstract

The applications of Wireless Sensor Networks (WSNs) have

grown tremendously over the past few years. The cluster

mechanism extends the life of a network and supplies

additional economical functioning procedures in WSNs. A

method to subdivide the field into groups of sensors is defined

as clustering. A Cluster Head (CH) is elected either by the Base

Station (BS) or by the specific protocol within a cluster.

Optimized clusters can save certain amount of energy in the

WSN. Based on the parameters like cluster count, cluster size,

cluster density, message count, node selection, heterogeneity of

nodes, location awareness and CH selection methods, we have

surveyed and compared ten varied consistent cluster protocols

for WSNs. The comparison highlights the advantages and

disadvantages of these protocols. Routing method, clustering

method, algorithm complexity, node deployment, scalability,

location awareness, load balancing, network life time and

energy efficiency have been considered as a few important

characteristics for comparing the protocols. Factors such as

network types, mobility and topology of various protocols are

also surveyed in this paper. Based on the survey of the network

protocols, we propose a brief outline of a new clustering

algorithm, which will be more efficient than the existing ones.

Keywords: Cluster count, cluster size, cluster density,

lifetime

1. INTRODUCTION A system of nodes connected to one or more sensors is the basic

layout of a wireless sensor network. The network nodes in such

International Journal of Pure and Applied MathematicsVolume 114 No. 7 2017, 559-571ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

559

Page 2: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

devices have various components: a microcontroller, an electronic

circuit to interface with the sensors, a radio transceiver attached to an

exterior antenna and finally a battery to supply energy to the system of

nodes. To convey the physical or environmental conditions such as

temperature, sound, pressure etc., a wireless network of spatially

distributed sensors are deployed.

Dimension of a node may vary from a smaller to a larger size.

Depending on the quality of the individual sensor nodes the price of

sensor nodes may vary. Therefore, size and cost of the node are

related to the constraints on resources like memory, processing speed

and measure of communication information and energy.

The topology of WSNs may either be complicated or simple. The

propagation technique between the hops of the network may be

routing or flooding. Fig. 1.1 gives the schematic diagram of

components of a sensor node within the WSN. In all WSNs sensing,

processing, position finding, mobilizing and locating Base Station

(BS) are the various functionalities.

Fig. 1.1 Components of a sensor node in WSN [1]

The WSN can be applied in the field of trespasses detection in

forest spaces, paddy field environmental management, process

observation management in the industry, machine condition

observations, many military applications etc. In this paper ten different

clustering protocols based on numerous factors such as the various

clustering properties, the network type, mobility, WSN characteristics

and topologies are compared. Based on these comparisons, we

propose the best clustering algorithm which will be more energy

efficient and hence have a prolonged network life time.

1.1 Features and General characteristics of Wireless Sensor Networks

Wireless sensor networks customize the routing power

management, knowledge dissemination and protocol management.

Depending on the number of applications and their respective

specifications, the focus is given to the routing protocols [1].

International Journal of Pure and Applied Mathematics Special Issue

560

Page 3: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

Nodes have constraints on the consumption of power because of

poor quality batteries or more energy utilization for specific

applications. They have to deal with the failure of nodes and also have

to be mobile. Nodes are scattered around and are scalable. These

nodes should be capable of withstanding any environmental changes.

The nodes are easy to use and are mostly employed in Cross-

layer style. Node deployment is easy because of smaller node size.

1.1.1 Kinds of Sensors employed in WSN

The various sensors employed in WSNs are thermal, magnetic,

visual, infrared, acoustics and microwave radar. Sensors capable of

measuring temperature, humidity, noise level, vehicular movements,

presence and absence of ups and downs of objects, mechanical stress

levels, speed and direction are also employed.

1.1.2 Communication problems in WSN Communication in WSNs requires prescribed bandwidth and

sharing among all nodes within the WSN. Spatial application and

information measure used in the native state are the required

constraints. The sensing, processing and transmission are done by the

sensor nodes which consume a large amount of energy. In order to

make the communication efficient in WSN, energy efficient protocols

have to be used.

2. ROUTING PROTOCOL CLASSIFICATION

Routing protocols provide the measures needed for

communication between the sensor nodes and BS. Different routing

protocols used in WSN are enhanced by various routing techniques

.

3. CLUSTERING PROTOCOLS FOR WSN The clustering protocols can be categorized based on the process

of selecting the CH. The algorithms are classified as probabilistic or

non-probabilistic.

3.1 LEACH [Low Energy Adaptive Clustering

Hierarchy] LEACH is a simple and efficient routing protocol used for creating

clusters. As shown in Fig. 1.2, LEACH uses time division

multiplexing (TDMA) for assigning slots for individual nodes to avoid

network traffic, minimal power consumption and to improve

substantial lifetime of the cluster. Generally LEACH protocol is used

to increase the life time of the network and decrease the energy usage.

International Journal of Pure and Applied Mathematics Special Issue

561

Page 4: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

There are two phases in each round of LEACH protocol called set-up

phase and steady state phase .

Each cluster has many sensor nodes, the protocol elects a node

called as CH and the remaining available nodes are called member

nodes. Each of the member nodes collects data from the dependent

region and sends this information directly to the CH. The CH receives

the copy of redundant information. The received redundant

information is aggregated then compressed by the CH and is sent

directly to the BS. A stochastic algorithm helps LEACH protocol to

decide which sensor node is to be elected as CH in each round.

LEACH protocol believes that the energy consumption of each and

every node close to the BS is very low and the node with the longest

distance from the BS is very high. But nodes which are always on

active condition would waste more energy unnecessarily. To reduce

the interference between clusters, LEACH protocol uses CDMA based

method for communication.

Fig. 1.2-Round and phases of a clustering protocol [11]

3.2 LEACH –T [Threshold Based Low Energy Adaptive Clustering Hierarchy]

T-LEACH is a threshold based CH replacement method in WSN.

It is a hierarchical routing protocol. In T-LEACH, the CHs are

selected randomly. It is an intra-cluster protocol which supports

homogeneous network. The cluster size is dynamic and cluster density

and the cluster coverage are limited. T-LEACH does not provide

information on the nodes locations. Cluster scalability and energy

efficiency are low when compared to other protocols.

CH selection is done by T-LEACH using a threshold value of its

residual energy to minimize the number of CH selections. The

network lifetime is increased and the replacement cost is reduced

because of the number of reductions in the CH selections. Compared

with the other clustering protocols, T-LEACH is found to be an

efficient protocol .

3.3 LEACH-C [Centralized Low Energy Adaptive Cluster Hierarchy]

Centralized approach is used for CH selection and LEACH-C also

utilizes the steady state protocol as in LEACH. Similar to LEACH,

LEACH-C also uses two phases. In the setup phase, location

information and energy level information of each node are received by

the BS. Clusters are configured by the BS and it identifies the CHs

International Journal of Pure and Applied Mathematics Special Issue

562

Page 5: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

within the cluster by the scheduled manner [13]. CH selection and

cluster formation are decided by the BS. CHs are selected randomly

and number of CHs is limited. BS selects CHs based on the nodes

energy levels. Large scale network cannot use LEACH-C protocol

since far-distant nodes find it difficult to send their status information

to the BS. LEACH-C protocol increases the latency and delay because

the CH role changes frequently. Frequent exchange of messages is not

feasible to transfer information between cluster nodes in LEACH-C.

3.4 HEED [Hybrid Energy Economical Distributed] Different CH selections based on the amount of its residual energy

is done by HEED protocol [32, 33]. The primary objectives of HEED

are to extend the survival period of network by distributing power

utilization, restricting the clustering process within the number of

iterations or rounds, avoiding or minimizing the communication and

routing problems, and constructing optimized clusters with powerful

CHs without any special node capability like location awareness.

There are two basic limitations to select CHs.

The first limitation is the restricted power level of individual

sensor nodes. The second limitation is, if the node densities are high

within a cluster the communication between the nodes will be

reduced. HEED is not capable of fixing the cluster count in each round

and it does not have the aware of heterogeneity. Node distribution is

not based on assumptions, even though the nodes are not

synchronized, communication continues. Created clusters are well

distributed and termination process is in constant/fixed time. HEED

requires communication only within the clusters. Using HEED we can

decrease the utilization of energy by decreasing the communication

load, thereby increasing the survival period of the network. Due to the

random selection of CH, higher communication overhead is caused.

Communication established between a CH and its member nodes,

between different CHs and between a CH and a BS, causes various

CH communication issues such as limited resource and bandwidth

usage, sensor energy constraints, less feasibility to rechargeable and

replacement nodes in clusters. To obviate some of the communication

limitations, energy-conserving protocols may be used.

3.5 EECS [Energy Efficient Cluster Scheme] Energy Efficient Cluster Scheme (EECS) is a periodical

knowledge gathering applications in WSNs. The periodic data

collection process within the WSN is done by a new protocol called

Energy Efficient Clustering Scheme (EECS). In this protocol there are

two phases used to form a cluster. In the first phase called CH

election, CHs are selected among the multiple nominee nodes. This

nomination results in choosing better quality energy back-up CHs.

International Journal of Pure and Applied Mathematics Special Issue

563

Page 6: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

This type of selection process differs from other protocols like

LEACH and HEED.

In the second phase, the member nodes are included within the

cluster by choosing its communication metrics while communication

is established between the CHs as well as BS. EECS protocols are

mostly self-manageable, energy efficient and extend the survival

period of the network when compared to all other clustering protocols.

BS sends a simple, ‘keep alive kind of hello message’ to its cluster

nodes to ensure the connectivity between them in the network

deployment phase. The distances between the nodes and the BS are

calculated based on the received signal strengths which ensure the

power level utilization when communication happens. In the cluster

creation phase the loads among the CHs are balanced by the respective

distances between the nodes and the BS. There is a slight control

overhead while selecting the well distributed CH. To balance the load

in the cluster, a novel method namely TEEN is introduced.

3.6 TEEN [Threshold sensitive Energy Efficient sensor Network]

Threshold sensitive Energy Efficient sensor Network is the first

protocol created for a reactive network [16]. This protocol is mainly

used in networks where the sensors respond to sudden changes in their

sensing area. In TEEN protocol, every time a cluster changes, the CH

sends a message to all its member nodes. This message contains

information regarding the attributes of the network and also carries

information about the Hard Threshold and the Soft Threshold values

of the parameters being sensed.

In the Soft Threshold function, a minute difference noted in the

threshold value would activate the sensors and they transmit this

difference value to the CH. This information is saved as a variable

named the Sensed Value (SV). On the other hand, in the Hard

Threshold function, when the value of the sensed parameter exceeds

its threshold value, the sensor nodes become active and start

transmitting the data to their CH.

The transmission of data occurs again only when the next SV

exceeds the Hard Threshold value or when it differs from the value

saved in the variable SV. For every data transmission made by the

sensors, the SV is considered as the current value. Therefore the

number of transmissions made by a sensor is less in the Soft

Threshold function when compared to that of the Hard Threshold.

International Journal of Pure and Applied Mathematics Special Issue

564

Page 7: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

Fig. 1.3 Clustering Topology in TEEN

Fig. 1.3 depicts the clustering topology in TEEN protocol. Nodes

are grouped into clusters with a CH which is responsible for routing

information from the cluster to the other CHs or BS. Data travels from

a lower cluster level to a higher cluster level. As it hops from one level

to another, it covers larger distances. This moves the data faster to the

BS. Clustering provides inherent optimization capabilities at the CH.

3.7 APTEEN [Adaptive Periodic Threshold-sensitive Energy Efficient sensor Network]

It is a protocol which has the characteristics of both proactive and

reactive networks. Every time when clusters are formed, CHs are

selected and these CHs initially send a keep alive message to the BS

which contain information such as the value of the sensing parameter,

the Hard and Soft Threshold values, the type of scheduling scheme

used to allot slots for every nodes and the information regarding the

maximum time taken between the two consecutive transmissions from

a node to the BS [14].

APTEEN is a protocol which provides a complete but precise data

recovery. The sensors deployed in such a network not only react to

time-critical situations, but also give an overall picture of the network

at periodic intervals. Thus the historic, current and information for

prediction can be demanded from the network in the form of

historical, on-time and persistent queries respectively. A TDMA

schedule assigns a transmission slot to each cluster and is shown in

Fig. 1.4.

Fig. 1.4 Time Line for APTEEN [14]

3.8 PEGASIS [Power-Efficient GAthering in Sensor Information Systems]

The aim of the protocol is to make the communication successful

to the nearest neighbour nodes by the CH to the BS. This process

enables the sensor nodes to equally distribute their energy within the

cluster network. The selection of first CH from the region is by a

random process i.e. the ith

node available in the region is selected. At

International Journal of Pure and Applied Mathematics Special Issue

565

Page 8: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

first the selection process to make a ‘chain like link ’ as shown in Fig.

1.5 is formed by the sensor nodes themselves with the help of greedy

algorithm. Otherwise the BS directly computes this chain link and

broadcasts it to all the nodes available in the network. For constructing

the chain links all available nodes should have complete knowledge of

the network and have the capability of utilizing greedy algorithm [6].

Fig. 1.5 – Data flow Chain to BS.

3.9 CCS [Concentric Clustering Scheme] The Concentric Clustering Scheme (CCS) is a protocol proposed

to avoid the loopholes in PEGASIS. In this protocol, importance is

given to the BS location in order to improve its performance and

stretch the life time of the network. In CCS, a large network is split

into concentric circular tracks which represent multiple clusters. The

first track which is the closest to the BS node is called level 1. The

level numbers are increased based on the distance between the BS and

the tracks accordingly. Each level maintains the node positions,

similar to the chains created by PEGASIS in these tracks. One of the

nodes becomes CH within the chain at each level.

PEGASIS protocol is responsible for communication or data

transmission in CCS. After the CH selection, the lower and upper

level layers would receive the data from the CH that is available

within the same level in a single round. Using the chain, initially, the

available nodes in each level transmit the data themselves to the

nearest nodes in the process of data transmission. After receiving the

data, node fuses with its own data and forwards the data to the next

node. Because of this action, CH node receives a minimum of two

data, after which, CH of each level sends data to the next level CHs.

Finally the level 1 CH submits the data to the BS. The data

transmission process is shown in Fig. 1.6.

In CCS, if the space between the BS and CH is very small when

relates to distances used by all other protocols, the data transfer is

efficient and energy utilization is very small. The concentric circles

split the network into more segments or tracks and the data flow in the

reverse direction is also reduced. The CCS also has its own

drawbacks. The allocation of nodes in each level is uneven and

therefore the levels which contain less number of nodes will soon

exhaust their energy. The residual energy is not considered during the

selection process of CH as it may lead to uneven energy utilization

International Journal of Pure and Applied Mathematics Special Issue

566

Page 9: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

among all nodes. PEGASIS and CCS protocols use chains for their

communication with the neighbour nodes using their least

broadcasting power. The long chains use high broadcasting power.

The subsequent CH selection is based on the nearest node presented

within the area rather than their available energy. So they exhaust their

energy quickly and created energy hole within the region of interest.

Fig. 1.6 Data Transmission

Scheme in CCS

3.10 MOCA [Multi-hopping Overlapping Clustering Algorithm]

Data transmission between existing groups is enhanced by this

algorithm known as Multi-hopping Overlapping Clustering Algorithm

(MOC). This MOC algorithm is completely different from the

available ones in which clusters are allowed to overlap. A node

existing in middle between two clusters may perform as a relay node

for CH data transmission as depicted in Fig. 1.7.

Fig. 1.7 MOCA- Overlapping Cluster [16]

MOCA protocol uses the hierarchical routing method and its

network type is homogeneous. The cluster formation is self -managed.

The nodes in this protocol are deployed randomly and do not provide

information regarding its location. Though the network life time is

high, scalability and energy efficiency achieved using this protocol are

very low. The cluster count is variable whereas the cluster size and

density are limited.

Table 1 gives the details of the various parameters used in WSNs.

Based on these parameters different protocols have been classified and

their merits and demerits highlighted. WSN characteristics are routing

method, clustering method, algorithm complexity, node deployment,

scalability, location awareness, load balancing, network life time and

energy efficiency and are listed in Table 1. The network types

depending on the various protocols are mentioned, i.e., whether the

International Journal of Pure and Applied Mathematics Special Issue

567

Page 10: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

protocol is homogeneous or heterogeneous. The protocols are

differentiated depending on the mobility of the member nodes, CHs

and BS. Various clustering properties have been reviewed such as

cluster count, cluster size, cluster density, message count, cluster

stability, range of nodes, cluster overlap, connectivity of CH to BS

and the type of data delivered and are given in Table 1. The topology

of every protocol is different depending on the parameters such as

energy, connectivity, threshold value, pre-set value etc. Roles of CH

and CH rotation are the two important characteristics of the CH in

every protocol. The protocols listed in this paper have been classified

based on the above mentioned parameters.

Table 1.0. Comparison of Clustering Limitations & Properties

Based Routing Protocols in Wireless Sensor Network.

4. FUTURE WORK Based on the above study, a consolidated report has been prepared

and given in Table 1. All parameters pertaining to the protocols have

been listed. This Table will be a useful tool to select an appropriate

protocol for a specific application. From the study, we propose to

develop a protocol combining the important favourable features of the

various protocols given in the Table 1. We intend to consider LEACH

protocol as the base for our future research. Thorough analyses of the

proposed protocol are highlighted and brought out the important

advantages over the existing protocols. Mainly extending the life time,

improving the efficiency, minimizing the energy consumption and

optimizing the data transmission will be considered in our further

research. Our Research proposal is suitable for Agricultural,

Environmental and Military based Applications.

5. CONCLUSION

International Journal of Pure and Applied Mathematics Special Issue

568

Page 11: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

From the detailed study of the various hierarchical routing protocols

based on their energy and functionality, we conclude that before any

protocol is implemented in WSNs, it is necessary to consider the

power utilization of each node [1]. In this paper, we have surveyed

and compared the various protocols used in WSNs. Based on this

comparison, the best protocol to use with respect to the clustering

methodologies, node deployment, energy efficiency, algorithm

complexity, network lifetime, mobility, various clustering properties

and characteristics can be determined. Though, these routing protocols

show continuous developments over time, still there is a possibility for

further enhancements in WSNs.

6. REFERENCES [1] Jamal N. Al-Karakil- ICUBE initiative of Iowa State University ,

Ames, 2003- Ahmed E. Kama Routing Techniques in Wireless Sensor Networks: A Survey

[2] Ashok Kumar and Narottam Chand, 2011. Location Based Clustering in Wireless Sensor Network, World Academy of Science, Engineering and Technology.

[3] L. Qing, Q. Zhu, M. Wang, 2006. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks, In ELSEVIER, Computer Communications.

[4] Jinchul Choi and Chaewoo Lee, 2011. Energy consumption and lifetime analysis in clustered multi-hop wireless sensor networks using the probabilistic cluster-head selection method, EURASIP Journal on Wireless Communications and Networking.

[5] Changmin Duan, 2007. A Distributed Energy Balance Clustering Protocol for Heterogeneous Wireless Sensor Networks, IEEE WiCon.

[6] Mehrani, M., 2010. FEED: Fault tolerant, energy efficient, distributed Clustering for WSN, IEEE, and Advanced Communication Technology (ICACT).

[7] Farruh Ishmanov and Sung Won Kim, 2009. Distributed Clustering Algorithm with Load Balancing in Wireless Sensor Network, EEE World Congress on Computer Science and Information Engineering.

[8] Mehdi Saeid manesh and Montalba Haji Mohammad, 2009. Energy and Distance Based Clustering: An Energy Efficient Clustering Method for Wireless Sensor Networks, World Academy of Science, Engineering and Technology.

[9] Yan Zhang, Laurence T. Yang & Jiming Chen, 2010, RFID and Sensor Networks, auerbach publication, International Standard Book Number: 978-1-4200-7777-3

[10] Sanjeev Kumar Gupta, Neeraj Jain and Poonam Sinha, 2012.

International Journal of Pure and Applied Mathematics Special Issue

569

Page 12: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

Node Degree Based Clustering for WSN, International Journal of Computer Applications (IJCA).

[11] Jiman Hong & Joongjin Kook & SangjunLee & Dungeon Kwon & SanghoYiT- Springer Science + Business Media, LLC 2008LEACH: The method of threshold-based CH replacement for wireless sensor networks.

[12] W. B. Heinemann, A. P. Chandrakasan, and H.Balakrishnan, “An Application Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Commun., vol. 1,no. 4, Oct. 2002, pp. 660–70. Bergli, V.(2003). Smart RF CC2420: 2.4 GHzIEEE802.15.4/Zigbee RF Transceiver. Retrieved GHz IEEE802.15.4/ Zigbee RF Transceiver. Retrieved from http://focus.ti.com/docs/prod/folders/print/cc2420.html.

[13] Sivad. Muruganathan, Danielc.f. ma, rollyi. Bhasin, and abrahamo. Fapojuwo, University of calgary- IEEE Radio Communications • March 2005. “A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks”

[14] Arati Manjeshwar and Dharma P. Agrawal Proceedings “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks” International Parallel and Distributed Processing Symposium 2002 IEEE.

[15] Vijay Kr. Chaurasiya and S. Rahul Kumar, 2008.Traffic Based Clustering in Wireless Sensor Network, IEEE WCSN.

[16] B. Baranidharan and B.Shanthi- December 2011 “A New Graph Theory based Routing Protocol for Wireless Sensor Networks “International journal on applications of graph theory in wireless ad hoc networks and sensor networks”.

International Journal of Pure and Applied Mathematics Special Issue

570

Page 13: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

571

Page 14: Special Issue Comparison of Cluster Based Routing ...acadpubl.eu/jsi/2017-114-7-ICPCIT-2017/articles/7/50.pdf · clustering properties, the network type, mobility, WSN characteristics

572