SlideShare ist ein Scribd-Unternehmen logo
1 von 6
YOUNIS LAYOUT    5/3/06        2:24 PM         Page 20




                   Node Clustering in Wireless Sensor
                   Networks: Recent Developments and
                        Deployment Challenges
            Ossama Younis, Marwan Krunz, and Srinivasan Ramasubramanian, University of Arizona


                                                                                         Abstract
                                    The large-scale deployment of wireless sensor networks (WSNs) and the need for
                                    data aggregation necessitate efficient organization of the network topology for the
                                    purpose of balancing the load and prolonging the network lifetime. Clustering has
                                    proven to be an effective approach for organizing the network into a connected
                                    hierarchy. In this article, we highlight the challenges in clustering a WSN, discuss
                                    the design rationale of the different clustering approaches, and classify the pro-
                                    posed approaches based on their objectives and design principles. We further dis-
                                    cuss several key issues that affect the practical deployment of clustering techniques
                                    in sensor network applications.




      R
                 ecent years have witnessed an increasing interest in                               CHs. The CHs aggregate the data and send them to the cen-
                 using wireless sensor networks (WSNs) in many                                      tral base through other CHs. Because CHs often transmit
                 applications, including environmental monitoring and                               data over longer distances, they lose more energy compared
                 military field surveillance. In these applications, tiny                           to member nodes. The network may be reclustered periodical-
                 sensors are deployed and left unattended to continu-                               ly in order to select energy-abundant nodes to serve as CHs,
       ously report parameters such as temperature, pressure,                                       thus distributing the load uniformly on all the nodes. Besides
       humidity, light, and chemical activity. Reports transmitted by                               achieving energy efficiency, clustering reduces channel con-
       these sensors are collected by observers (e.g., base stations).                              tention and packet collisions, resulting in better network
       The dense deployment and unattended nature of WSNs make                                      throughput under high load.
       it quite difficult to recharge node batteries. Therefore, energy                                Clustering has been shown to improve network lifetime, a
       efficiency is a major design goal in these networks.                                         primary metric for evaluating the performance of a sensor
          Several WSN applications require only an aggregate value                                  network. Although there is no unified definition of “network
       to be reported to the observer. In this case, sensors in differ-                             lifetime,” as this concept depends on the objective of an appli-
       ent regions of the field can collaborate to aggregate their data                             cation, common definitions include the time until the first/last
       and provide more accurate reports about their local regions.                                 node in the network depletes its energy and the time until a
       For example, in a habitat monitoring application [1], the aver-                              node is disconnected from the base station. In studies where
       age reported humidity values may be sufficient for the observ-                               clustering techniques were primarily proposed for energy effi-
       er. In military fields where chemical activity or radiation is                               ciency purposes (e.g., [2, 3]), the network lifetime was signifi-
       measured, the maximum value may be required to alert the                                     cantly prolonged. An example is shown in Fig. 2 (extracted
       troops. In addition to improving the fidelity of the reported                                from [2]), where the number of nodes that remain alive using
       measurements, data aggregation reduces the communication                                     LEACH is significantly larger (four to eight times larger) than
       overhead in the network, leading to significant energy savings.                              that using static clustering or minimum transmission energy
          In order to support data aggregation through efficient net-                               (MTE) routing. Note that even though the objective of several
       work organization, nodes can be partitioned into a number of                                 protocols was not to maximize network lifetime, lifetime
       small groups called clusters. Each cluster has a coordinator,                                improvements can still be achieved if data aggregation is
       referred to as a cluster head, and a number of member nodes.                                 exploited and the network is reclustered periodically.
       Clustering results in a two-tier hierarchy in which cluster                                     Clustering has been extensively studied in the data process-
       heads (CHs) form the higher tier while member nodes form                                     ing and wired network literatures. The clustering approaches
       the lower tier. Figure 1 illustrates data flow in a clustered net-                           developed in these areas cannot be applied directly to WSNs
       work. The member nodes report their data to the respective                                   due to the unique deployment and operational characteristics
                                                                                                    of these networks. Specifically, WSNs are deployed in an ad
                                                                                                    hoc manner and have a large number of nodes. The nodes are
       This work was supported by NSF under grants ANT-0095626, ANT03                               typically unaware of their locations. Hence, distributed clus-
       13234, ANT-0325979, and ANT-0435490, by EEC-0333046, and by the                              tering protocols that rely only on neighborhood information
       Center for Low Power Electronics (CLPE) at the University of Arizona.                        are preferred for WSNs (however, most studies in this area
       Any opinions, findings, conclusions, and recommendations expressed in                        still assume that the network topology is known to a central-
       this material are those of the authors and do not reflect the views of NSF.                  ized controller). Furthermore, nodes in WSNs operate on bat-


       20                                               0890-8044/06/$20.00 © 2006 IEEE                                                             IEEE Network • May/June 2006
                 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
YOUNIS LAYOUT    5/3/06        2:24 PM         Page 21




                            Intercluster                         Intracluster
                          communication                        communication
                                                                                                    • Every node has a unique identifier.
                                                                                                    • These identifiers are uniformly assigned throughout the
                                                                                                       field.
                                                                                                    For example, the scheme in [4] favors nodes with lower identi-
                                                                                                    fiers to become CHs. This approach may not be suitable for
                                                                                                    energy-constrained sensor networks because it penalizes spe-
                                                                                                    cific nodes in the network irrespective of their battery life-
                                                                                                    times.
                                                                                Mobile
                                                                                                       Another class favors nodes with larger degrees (e.g., Kuhn
                                                                               observer             et al. [5] and Amis et al. [6]) in order to create dense clusters
                                                                                                    and elect the minimal dominating set of CHs (the degree of a
                                                                                                    node is the number of its neighbors within a prespecified
                                                                                                    transmision called the cluster range). This, however, may result
        I Figure 1. Illustration of data flow in a clustered network.                               in quickly draining the battery of larger-degree nodes. From
                                                                                                    an application perspective, balancing cluster sizes reduces the
                                                                                                    load on CHs. However, this comes at the expense of having
       tery power with limited energy. Hence, the employed cluster-                                 more clusters in the network and thus a larger routing overlay.
       ing approach must have low message overhead. Finally, harsh                                  A third class of techniques favors nodes with higher weights to
       environmental conditions result in unexpected failures of                                    become CHs. The weight of the node is used to define its sig-
       nodes. Hence, periodic reclustering is necessary in order to                                 nificance. For example, it can be the residual battery energy
       heal disconnected regions and distribute energy consumption                                  (as in the HEED protocol [3]), its degree (as in the ACE pro-
       across all nodes. Periodic reclustering is also necessary, as the                            tocol [7]), or a combination of parameters (e.g., remaining
       parameters used for clustering (e.g., the remaining energy,                                  energy, degree, mobility, and average distance to neighbors).
       node degree, etc.) are dynamic. The clustering techniques pro-                                  Some protocols, such as GAF [8] and SPAN [9], were pro-
       posed for data processing typically consider static parameters,                              posed for controlling the network topology by exploiting node
       such as the distance between the nodes, and assume that                                      redundancy. These protocols select certain nodes to be active
       nodes are more reliable.                                                                     (i.e., participate in sensing and data forwarding), while others
          The goal of this article is to introduce the reader to different                          are put to sleep to save their energy. In GAF [8], for example,
       classes of clustering approaches that have been proposed for                                 a node belongs to a region that is determined by its location.
       WSNs. We compare some representative protocols in terms of                                   A region in this context is defined as an area A in which any
       their design approach, clustering criteria, basic assumptions,                               node u can communicate via a single hop with any node v ∈
       and overhead. We consider clustering proposals that target the                               B, where B is a neighboring region to A. Thus, only one repre-
       general class of ad hoc networks and are also suitable for sen-                              sentative node in any region needs to participate in the rout-
       sor networks. This article focuses more on clustering “approach-                             ing infrastructure at any given time to ensure network
       es” than on “protocols.” A clustering “approach” in this context                             connectivity. In SPAN [9], a node decides whether to remain
       identifies the parameter(s) used for partitioning the network                                active or go to sleep according to its two-hop neighborhood
       and whether clustering is performed in a centralized or a dis-                               connectivity. Although these protocols are not clustering tech-
       tributed fashion. In addition, we highlight the basic challenges                             niques, their effect on the network topology is similar to that
       in deploying clustering techniques in WSNs.                                                  of clustering.
                                                                                                    Execution of a Clustering Algorithm
       Classification of Clustering Techniques in                                                   The execution of a clustering algorithm can be carried out at
                                                                                                    a centralized authority (e.g., a base station) or in a distributed
       Wireless Sensor Networks                                                                     way at local nodes. Centralized approaches require global
       Clustering in WSNs involves grouping nodes into clusters and
       electing a CH such that:
       • The members of a cluster can communicate with their CH                                                                 100
          directly.                                                                                                              90
       • A CH can forward the aggregated data to the central base                                                                                                            LEACH
          station through other CHs.                                                                                             80
       Thus, the collection of CHs in the network form a connected
                                                                                                                                 70                     MTE
       dominating set. Research on clustering in WSNs has focused
                                                                                                        Number of nodes alive




       on developing centralized and distributed algorithms to com-                                                              60
       pute connected dominating sets. We focus on distributed
       approaches in this article since they are more practical for                                                              50
       large-scale deployment scenarios. Since obtaining an optimal
                                                                                                                                 40
       dominating set is an NP-complete problem, the proposed
       algorithms are heuristic in nature.                                                                                                  Static                                   LEACH-C
                                                                                                                                 30
                                                                                                                                          clustering
          We classify the clustering techniques based on two criteria:
       • The parameter(s) used for electing CHs                                                                                  20
       • The execution nature of a clustering algorithm (probabilistic
                                                                                                                                 10
          or iterative)
                                                                                                                                 0
       Election of Cluster Heads                                                                                                      0   100   200    300    400   500    600   700   800     900 1000
       One class of clustering techniques uses the node identifier to                                                                                           Time (s)
       elect CHs. The success of this approach depends on two
       assumptions:                                                                                 I Figure 2. Number of nodes that remain alive over time [2].


       IEEE Network • May/June 2006                                                                                                                                                                   21
                 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
YOUNIS LAYOUT      5/3/06        2:24 PM         Page 22




       information about the network topology. The classic K-Means                                       The LEACH protocol [2] is an application-specific clus-
       clustering approach (proposed in the data processing litera-                                   tering protocol, which has been shown to significantly
       ture) may be applied if the number of desired clusters can be                                  improve the network lifetime. It assumes that every node is
       determined a priori and node locations are available. In this                                  reachable in a single hop and that load distribution is uni-
       case, an initial random set of clusters is selected and a node is                              form among all nodes. LEACH assigns a fixed probability to
       moved from one cluster to another if this move reduces the                                     every node so as to elect itself as a CH. The clustering pro-
       objective cost function of the entire system. Banerjee et al.                                  cess involves only one iteration, after which a node decides
       [10] proposed a centralized technique that does not require                                    whether to become a CH or not. Nodes take turns in carry-
       knowledge of node locations. Their technique is based on con-                                  ing the role of a CH.
       structing a spanning tree of clusters that is rooted at an                                        The HEED protocol [3] considers a multihop network
       observer and forcing a bound on the maximum and minimum                                        and assumes that all nodes are equally important. A node
       cluster size. A distributed protocol was also proposed in [10]                                 uses its residual energy as the primary parameter to proba-
       for constructing the spanning tree.                                                            bilistically elect itself to become a CH. In case of a tie
          The efficacy of centralized approaches is limited in large-                                 between two CHs, say u and v, u concedes to v (i.e., gives
       scale networks where collecting all the necessary information                                  up its CH candidacy) according to a secondary parameter,
       at the central authority is both time and energy consuming.                                    such as node degree or average distance to neighbors. This
       Distributed (localized) approaches are more suitable for                                       results in the uniformly distribution of the elected set of
       large-scale networks. In such approaches, a node decides to                                    CHs across the network. In HEED, each node executes a
       join a cluster or become a CH based on the information                                         constant number of iterations. An implementation of HEED
       obtained solely from its one-hop neighbors. Several distribut-                                 in TinyOS (the operating system for Berkeley motes)
       ed clustering techniques have been proposed in the literature.                                 showed that clustering and data aggregation at least double
       These techniques are either iterative or probabilistic in nature.                              the network lifetime.
                                                                                                         Kuhn et al. [5] proposed a probabilistic technique to elect
       Iterative Clustering Techniques — In iterative clustering tech-                                CHs, in which the probability is dependent on the node
       niques, a node waits for a specific event to occur or certain                                  degree. The convergence of their proposed technique, which
       nodes to decide their role (e.g., become CHs) before making                                    depends on the number of nodes in the network and the node
       a decision. For example, in the Distributed Clustering Algo-                                   degree, is much faster than iterative techniques. In addition,
       rithm (DCA) [11], before making a decision, a node waits for                                   this approach elects a dominating set of CHs that is asymptot-
       all its neighbors with higher weights to decide to be CHs or                                   ically optimal (minimal).
       join existing clusters. Nodes possessing the highest weights in                                   Table 1 compares representative examples of distributed
       their one-hop neighborhoods are elected as CHs. If a node                                      clustering techniques. (Note that several other techniques
       receives multiple CH announcements, it arbitrates among                                        were proposed in the literature but are not discussed here due
       these CHs using a preference condition (e.g., higher weight                                    to space limitations.) The table shows that all distributed clus-
       wins). If none of the higher-weight neighbors of a node                                        tering protocols have a constant message overhead per node.
       decides to become a CH, then this node decides to become a                                     This is an important advantage of the distributed techniques
       CH. The problem with most iterative approaches is that their                                   over the centralized ones, which involve significant message
       convergence speed is dependent on the network diameter                                         overhead. The processing overhead at each sensor, however,
       (path with the largest number of hops). In a two-dimensional                                   is negligible in a centralized approach compared to a dis-
       field with n deployed nodes, the DCA algorithm requires                                        tributed one (in which nodes participate in the computations).
                                                                                                      For example, in iterative approaches, a node has to check the
            O   ( n)                                                                                  received messages to decide how it should react. These mes-
                                                                                                      sages can be O(δ), where δ is the node degree. As energy con-
       iterations to terminate. The worst-case convergence speed can                                  sumption for data processing is typically lower than that for
       be as slow as n – 1 iterations in a 1D setting. The perfor-                                    communication, the message processing overhead may be
       mance of iterative techniques is also highly sensitive to packet                               ignored.
       losses. For example, if a node u discovers that one of its                                        As shown in Table 1, most of the distributed protocols have
       neighbors v has a higher weight, then u has to wait for v to                                   low overhead. This overhead is dependent on the frequency of
       decide before it makes a decision. If node v fails shortly after                               reclustering, which is small in typical applications. Throughput
       the neighborhood discovery phase, node u will wait indefinite-                                 is typically not negatively affected by clustering, as shown in
       ly for v to make a decision.                                                                   an implementation study of HEED [3]. In fact, throughput is
          To ameliorate the above problems, some protocols enforce                                    improved under high load because of the reduction in channel
       a bound on the number of iterations for each node. For exam-                                   contention. The performance of each clustering protocol
       ple, in ACE [7] when a node finishes executing a number of                                     depends on the network configuration, the system model, and
       iterations (e.g., 5), it makes a decision based on the available                               the application scenario.
       information. These iterations are enough to achieve a stable
       average cluster size. The protocol in [6] allows a cluster to
       include nodes that are D hops away from the CH. A node
                                                                                                      Open Issues
       executes 2D iterations before making a decision. This results                                  Clustering in WSNs faces several deployment challenges, such
       in a constant number of iterations for convergence.                                            as ensuring connectivity, selecting the optimal frequency of
                                                                                                      CH rotation, computing the optimal cluster sizes, and cluster-
       Probabilistic Clustering Techniques — The probabilistic (or ran-                               ing the network in the presence of a node duty cycle. 1
       domized) approach for node clustering ensures rapid conver-                                    Addressing these problems will require cross-layer design,
       gence while achieving some favorable properties, such as                                       especially with regard to the MAC and network layers.
       balanced cluster sizes. It enables every node to independently
       decide on its role in the clustered network while keeping the
       message overhead low. We now discuss a few examples of this                                    1 In a typical WSN, a sensor alternates between active and sleep states. The
       approach.                                                                                      ratio of the active time to the total time is referred to as the node duly cycle.



       22                                                                                                                                             IEEE Network • May/June 2006
                   Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
YOUNIS LAYOUT        5/3/06        2:24 PM         Page 23




                                                                                                                                                 Complexity (per node)
           Protocol               I/P     Cluster criteria           Objective                             Assumptions
                                                                                                                                                 Time (iter.)   Message

                                                                                                           Unique node identifiers
           Baker et al. [4]       I       Identifier                 Minimum dominating set                and uniform node                      O(Diam)        O(1)
                                                                                                           distribution

                                                                                                           Topology and field
           GAF [8]                I       Position                   Redundancy elimination                                                      O(1)           O(1)
                                                                                                           dimensions are known

                                          Two-hop                                                          Every node has a routing                             Routing protocol
           SPAN [9]               I                                  Redundancy elimination                                                      O(1)
                                          connectivity                                                     table                                                overhead

                                                                     Dominating set of high-               Unique, real value
           DCA [11]               I       Weight                                                                                                 O(Diam)        O(1)
                                                                     er-weight nodes                       weight for every node

           Max-Min                                                   D-hop cluster formation,              MAC layer provides
                                  I       Degree                                                                                                 O(D)           O(D)
           D-Cluster [6]                                             D is a constant                       collision avoidance

                                                                     Rapid convergence,                    Nonuniform load distru-
           ACE [7]                I       Degree                                                                                                 O(1)           O(1)
                                                                     denser cluster sizes                  bution

                                                                     Rapid convergence and                 Single-hop network and
           LEACH [2]              P       CH frequency               maximized network life-               uniform load distribu-                O(1)           O(1)
                                                                     time                                  tion

                                                                     Rapid convergence and
                                                                                                           Nonuniform load distri-
           HEED [3]               P       Residual energy            mazimized network life-                                                     O(1)           O(1)
                                                                                                           bution
                                                                     time

                                                                                                           Three independent com-
           Kuhn et al. [5]        P       Degree                     Minimum dominating set                                                      polylog(n)     polylog(n))
                                                                                                           munication channels

        I Table 1. Comparison of representative distributed clustering techniques. I/P denotes whether a protocol is iterative or probabilistic,
          Diam denotes the network diameter, and n denotes the number of nodes in the network.


       Connectivity                                                                                     MAC Layer Design
       An important objective of any clustering technique is network                                    Scheduling intracluster and intercluster transmissions is
       connectivity. For intracluster communication, a cluster mem-                                     another important design challenge. Since clustering is typical-
       ber communicates with its CH either directly (e.g., [2, 3, 7]) or                                ly employed in applications where data aggregation is per-
       via multiple hops (e.g., [6, 11]). Connectivity in this case is a                                formed, time division multiple access (TDMA) is best for
       result of the success of cluster formation. For intercluster com-                                intracluster transmissions. This is because a CH can set the
       munication, two approaches were adopted in order to maintain                                     TDMA schedule and inform its cluster members about it. The
       connectivity. In one approach (e.g., [6, 10, 11]), nodes on clus-                                problem is how to prevent the TDMA intracluster transmis-
       ter boundaries are used as gateways to relay data among CHs.                                     sions from colliding with transmissions in neighboring clusters
       This approach (depicted in Fig. 3a) is suitable in networks that                                 or with intercluster frames, especially when CHs use longer
       use a fixed transmission power. Network density has to be suf-                                   ranges for communicating with each other. One possible solu-
       ficiently high in order to ensure that enough gateways are pre-                                  tion is to use orthogonal frequency channels or different
       sent at the intersection areas between clusters. In another                                      CDMA codes to parallelize intracluster and intercluster trans-
       approach (e.g., [2, 3]), the CH overlay constitutes the routing                                  missions. It may not be cost effective, however, to equip cheap
       infrastructure, and intercluster routing proceeds only through                                   sensors with expensive radios in order to support orthogonal
       CHs. This approach (depicted in Fig. 3b) is appropriate if:                                      channels or codes. Enabling concurrent intracluster and inter-
       • A node can tune its transmission power 2 (e.g., Berkeley                                       cluster communications using a single radio channel is an
          motes).                                                                                       open research issue.
       • The CH density and intercluster transmission range satisfy
          the connectivity conditions specified by Gupta and Kumar                                      Rotating the Role of Cluster Heads
          [12].                                                                                         It is essential to rotate the role of CHs among nodes so as not
       An advantage of this approach is that it enables all non-CHs                                     to burden a few nodes with more duties than others. There
       to sleep while not sensing or transmitting. Selecting the opti-                                  are several possibilities for CH rotation. One way is to use a
       mal intracluster and intercluster transmission ranges to ensure                                  timer expiration to trigger the clustering algorithm, as
       connectivity and prolong the network lifetime is still an open                                   described in “Node Synchronization” below. Another way is
       issue.                                                                                           to use a dynamic parameter (e.g., remaining battery) for trig-
                                                                                                        gering the clustering algorithm at local regions. For example,
                                                                                                        a CH might trigger a new CH election process in its local
       2Note that power control in WSNs is used for switching between CH and                            region if its remaining battery lifetime goes below a prespeci-
       non-CH operation modes, and not on a per-packet basis, as proposed for                           fied threshold. The CH rotation mechanism is typically inde-
       more capable ad hoc networks.                                                                    pendent of the clustering protocol.


       IEEE Network • May/June 2006                                                                                                                                                23
                     Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
YOUNIS LAYOUT    5/3/06        2:24 PM        Page 24




                                                      +           +                                                                             +        +
                     +            +                                                                           +             +
                                            GN
                                            +                           +                                                             +                       +
                           +                               +                                                        +                               +
                                            GN
                 +       CH                                                                             +         CH
             Pressure                       +                           GN                          Pressure                          +             CH
                                                             CH
              sensor                                                    +                            sensor                                                   +
                            + GN                          + GN                                                        +                             +

                 +                          GN                                                            +
                                                                        +                                                                                     +
                                                                                     Base                                                                              Base
                            +               +                           GN          station                           +               +                               station
                                                          +                                                                                         +
                          CH                                                                                       CH
                +                                         CH                                             +                                          CH

                                 +                                  +                                                     +                               +
                                                      +                                                                                         +


                                                (a)                                                                                       (b)

        I Figure 3. Intercluster connectivity models: a) routing via gateway nodes; b) routing via CHs only. GN: gateway node.


          It is obvious that more frequent CH rotation results in                                  intercluster traffic and hence will deplete their batteries faster
       more clustering overhead and network interruption, while less                               than faraway CHs). In order to balance energy consumption
       frequent rotation may cause some nodes to die faster than                                   among CHs, both intracluster aggregation and the data for-
       others. The study of this trade-off is essential for achieving                              warding responsibilities of a CH have to be considered. Shu et
       optimal network lifetime. Currently, applications set this rota-                            al. [13] studied how to achieve this balance by assigning larger
       tion frequency heuristically, based on some intuitive factors                               cluster sizes to CHs that are responsible for less data forward-
       such as the expected battery lifetime and the node degree.                                  ing. An example is illustrated in Fig. 4, in which sensors are
                                                                                                   deployed in a circular region around a base station. This
       Node Duty Cycle                                                                             approach is constrained by the maximum possible sensor-
       A primary factor that prolongs the battery lifetime is allowing                             transmission range, and the supporting MAC layer. The read-
       sensors to sleep when not active. This is due to the following                              er is referred to [13] and the references therein for more
       three reasons. First, idle listening consumes significant energy                            information on load- and power-balanced clustering tech-
       that is comparable to transmission or reception. For example,                               niques in WSNs. Several issues are still open for research,
       in a Berkeley Mica2 mote, idle listening consumes energy                                    including how to optimally select cluster sizes without knowl-
       close to that of reception. In contrast, the energy drainage
       during sleep time is about three orders of magnitude less than
       the reception energy consumption. Second, battery discharge
       is nonlinear, and some of the unusable charges can be restored
       in the battery after the sleeping period. Third, sensors are typ-
       ically deployed redundantly, which implies that not all the
       nodes need to be awake simultaneously.
          Therefore, clustering techniques should incorporate the
       node’s duty cycle in their design. This can be done in one
       of two ways, depending on the type of the application.
       First, non-CH nodes can be allowed to sleep when they are
       not sensing or communicating with their CHs. This
       approach is suitable for applications where sensors are
       periodically sending reports. Second, if the application
       requires the sensors to continuously monitor the field for
       unexpected events, then a CH can determine which of its
       cluster members are redundant and advise them to turn
       themselves off. Thus, a CH maintains a minimal active set
       of nodes in the cluster. It is also possible to elect an active
       set of nodes to cover the field prior to cluster formation. In
       this case, the CH and all its members are active during the
       network operation cycle.

       Optimal Cluster Size
       Currently, most clustering protocols assume a fixed cluster-
       transmission range, which results in uniform cluster sizes.
       However, this results in a skewed load distribution on CHs                                   I Figure 4. Selecting cluster sizes to evenly distribute energy con-
       (e.g., CHs that are closer to the observer will carry more                                     sumption among CHs.


       24                                                                                                                                           IEEE Network • May/June 2006
                Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
YOUNIS LAYOUT     5/3/06       2:24 PM         Page 25




       edge of the node locations and how to exploit knowledge of                                   [5] F. Kuhn, T. Moscibroda, and R. Wattenhofer, “Initializing Newly Deployed Ad Hoc
       the locations of data sinks for efficient cluster formation.                                      and Sensor Networks,” Proc. ACM MOBICOM, Sept. 2004, pp. 260–74.
                                                                                                    [6] A. D. Amis et al., “Max-Min D-Cluster Formation in Wireless Ad Hoc Net-
                                                                                                         works,” Proc. IEEE INFOCOM, Mar. 2000, pp. 32–41.
       Node Synchronization                                                                         [7] H. Chan and A. Perrig, “ACE: An Emergent Algorithm for Highly Uniform Cluster
       Distributed clustering protocols achieve their best perfor-                                       Formation,” Proc. 1st Euro. Wksp. Sensor Networks, Jan. 2004, pp. 154–71.
       mance when sensor nodes are synchronized. Node synchro-                                      [8] Y. Xu, J. Heidemann, and D. Estrin, “Geography-Informed Energy Conserva-
                                                                                                         tion for Ad Hoc Routing,” Proc. ACM MOBICOM, Rome, Italy, July 2001,
       nization ensures that the clustering process starts                                               pp. 70–84.
       simultaneously throughout the network. Lack of synchroniza-                                  [9] B. Chen et al., “SPAN: An Energy-Efficient Coordination Algorithm for Topol-
       tion may result in a suboptimal choice of CHs, especially for                                     ogy Maintenance in Ad Hoc Wireless Networks,” ACM Wireless Networks,
       probabilistic approaches. However, the clustering process can                                     vol. 8, no. 5, Sept. 2002, pp. 481–94.
                                                                                                    [10] S. Banerjee and S. Khuller, “A Clustering Scheme for Hierarchical Control in Mul-
       be triggered by nodes with faster clocks. This happens when                                       tihop Wireless Networks,” Proc. IEEE INFOCOM, Apr. 2001, pp. 1028–37.
       such nodes start querying their neighbors for updated infor-                                 [11] S. Basagni, “Distributed Clustering Algorithm for Ad Hoc Networks,” Proc. Int’l.
       mation in order to start the clustering process. Received                                         Symp. Parallel Architectures, Algorithms, and Networks, 1999, pp. 310–15.
       queries trigger the clustering process at these neighbors, and                               [12] P. Gupta and P. R. Kumar, “Critical Power for Asymptotic Connectivity in
                                                                                                         Wireless Networks,” Stochastic Analysis, Control, Optimizations, and Appli-
       these neighbors in turn trigger their neighbors, and so on.                                       cations: A Volume in Honor of W. H. Fleming, W. M. McEneaney, G. Yin,
       Note that it is not essential that “all” the nodes in the network                                 and Q. Zhang, Eds., Birkhauser, 1998.
       start the clustering process simultaneously. In fact, it is suffi-                           [13] T. Shu, M. Krunz, and S. Vrudhula, “Power Balanced Coverage Time Opti-
       cient that the process starts in different regions (nodes within                                  mization for Clustered Wireless Sensor Networks,” Proc. ACM Int’l. Symp.
                                                                                                         Mobile and Ad Hoc Networking and Comp., May 2005, pp. 111–20.
       one or two hops) simultaneously. Probabilistic techniques that
       use a number of iterations (e.g., [3, 5]) are therefore less                                 Biographies
       impacted by the lack of synchronization than single-iteration                                OSSAMA YOUNIS [M] (younis@ece.arizona.edu) is an assistant research scientist
       techniques (e.g., [2]).                                                                      in computer engineering at the University of Arizona. He received B.S. and M.S.
                                                                                                    degrees with honors in computer science from Alexandria University, Egypt, in
                                                                                                    1995 and 1999, respectively, and his Ph.D. degree in computer science from
       Conclusions                                                                                  Purdue University in August 2005. He has served on the Technical Program
                                                                                                    Committee for several international conferences, such as AINA 2006, WoW-
       Node clustering is a useful topology-management approach to                                  MoM 2006, WWIC ’06, and ICWMC ’06. His research interests include wireless
       reduce the communication overhead and exploit data aggrega-                                  sensor network protocols and applications, Internet tomography, and video com-
       tion in sensor networks. We have classified the different clus-                              munication. He is a member of the ACM.
       tering approaches according to the clustering criteria and the                               MARWAN KRUNZ (krunz@ece.arizona.edu) is an associate professor of electrical
       entity responsible for carrying out the clustering process. We                               and computer engineering at the University of Arizona. He received a Ph.D.
       have focused on distributed clustering approaches, which are                                 degree in electrical engineering from Michigan State University in 1995. From
       more suitable for large-scale sensor networks. We highlighted                                1995 to 1997 he was a postdoctoral research associate with the Department of
                                                                                                    Computer Science, University of Maryland, College Park. He also held visiting
       some of the basic challenges that have hindered the use of                                   research positions at INRIA, Sophia Antipolis, France; HP Labs, Palo Alto, CA;
       clustering in current applications. We surmise that the most                                 and US West Advanced Technologies, Boulder, CO. His recent research interests
       compelling challenges are how to schedule concurrent intra-                                  include medium access and routing protocols for mobile ad hoc networks, quality
       cluster and intercluster transmissions, how to compute the                                   of service provisioning over wireless links, constraint-based routing, Web traffic
                                                                                                    modeling, and media streaming. He has published more than 100 journal articles
       optimal cluster size, and how to determine the optimal fre-                                  and refereed conference papers in these areas. He received the National Science
       quency for CH rotation in order to maximize the network life-                                Foundation CAREER Award (1998–2002). He currently serves on the editorial
       time.                                                                                        boards of IEEE/ACM Transactions on Networking, IEEE Transactions on Mobile
                                                                                                    Computing, and Computer Communications Journal. He has been a guest editor
                                                                                                    for special issues of IEEE Micro and IEEE Communications Magazine. He served
       References                                                                                   as technical program co-chair for IEEE INFOCOM 2004, IEEE SECON 2005,
       [1] “Habitat Monitoring on Great Duck Island,” http://www.greatduck                          IEEE WoWMom 2006, and the 2001 Hot Interconnects Symposium. He consults
           island.net/, 2006.                                                                       for a number of corporations in the telecommunications industry.
       [2] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-
           Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE                  SRINIVASAN RAMASUBRAMANIAN (srini@ece.arizona.edu) is an assistant professor
           Trans. Wireless Commun., vol. 1, no. 4, Oct. 2002, pp. 660–70.                           in the Department of Electrical and Computer Engineering at the University of
       [3] 0. Younis and S. Fahmy, “Distributed Clustering in Ad Hoc Sensor Networks:               Arizona. He received a B.E. (honors) degree in electrical and electronics engi-
           A Hybrid, Energy-Efficient Approach,” Proc. IEEE INFOCOM, Hong Kong,                     neering from Birla Institute of Technology and Science, Pilani, India, in 1997,
           Mar. 2004; an extended version appeared in IEEE Trans. Mobile Comp.,                     and a Ph.D. degree in computer engineering from Iowa State University, Ames,
           vol. 3, no. 4, Oct.–Dec. 2004, pp. 366–79.                                               in 2002. His research interests include architectures and algorithms for optical
       [4] D. J. Baker and A. Ephremides, “The Architectural Organization of a Mobile               networks, computer communication networks and protocols, fault tolerance, sys-
           Radio Network via a Distributed Algorithm,” IEEE Trans. Commun., vol. 29,                tem modeling, and performance analysis. He served as the TPC Co-Chair for
           no. 11, 1981, pp. 1694–701.                                                              BROADNETS 2005 and is an editor of Wireless Networks Journal.




       IEEE Network • May/June 2006                                                                                                                                                   25
                 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.

Weitere ähnliche Inhalte

Was ist angesagt?

Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveyM H
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Towards designing robust coupled networks
Towards designing robust coupled networksTowards designing robust coupled networks
Towards designing robust coupled networksaugustodefranco .
 
Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseIJMTST Journal
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksCSCJournals
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...ijassn
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...ijassn
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septianIAESIJEECS
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnGr Patel
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 

Was ist angesagt? (18)

Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Towards designing robust coupled networks
Towards designing robust coupled networksTowards designing robust coupled networks
Towards designing robust coupled networks
 
Joint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource ReuseJoint Interference Coordination and Spatial Resource Reuse
Joint Interference Coordination and Spatial Resource Reuse
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsn
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
G010433745
G010433745G010433745
G010433745
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 

Ähnlich wie Node clustering in wireless sensor

A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ijwmn
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...IJCSES Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...IJCSIS Research Publications
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...journalBEEI
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 

Ähnlich wie Node clustering in wireless sensor (20)

A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 

Mehr von ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 

Mehr von ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 

Kürzlich hochgeladen

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...liera silvan
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Kürzlich hochgeladen (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Node clustering in wireless sensor

  • 1. YOUNIS LAYOUT 5/3/06 2:24 PM Page 20 Node Clustering in Wireless Sensor Networks: Recent Developments and Deployment Challenges Ossama Younis, Marwan Krunz, and Srinivasan Ramasubramanian, University of Arizona Abstract The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for the purpose of balancing the load and prolonging the network lifetime. Clustering has proven to be an effective approach for organizing the network into a connected hierarchy. In this article, we highlight the challenges in clustering a WSN, discuss the design rationale of the different clustering approaches, and classify the pro- posed approaches based on their objectives and design principles. We further dis- cuss several key issues that affect the practical deployment of clustering techniques in sensor network applications. R ecent years have witnessed an increasing interest in CHs. The CHs aggregate the data and send them to the cen- using wireless sensor networks (WSNs) in many tral base through other CHs. Because CHs often transmit applications, including environmental monitoring and data over longer distances, they lose more energy compared military field surveillance. In these applications, tiny to member nodes. The network may be reclustered periodical- sensors are deployed and left unattended to continu- ly in order to select energy-abundant nodes to serve as CHs, ously report parameters such as temperature, pressure, thus distributing the load uniformly on all the nodes. Besides humidity, light, and chemical activity. Reports transmitted by achieving energy efficiency, clustering reduces channel con- these sensors are collected by observers (e.g., base stations). tention and packet collisions, resulting in better network The dense deployment and unattended nature of WSNs make throughput under high load. it quite difficult to recharge node batteries. Therefore, energy Clustering has been shown to improve network lifetime, a efficiency is a major design goal in these networks. primary metric for evaluating the performance of a sensor Several WSN applications require only an aggregate value network. Although there is no unified definition of “network to be reported to the observer. In this case, sensors in differ- lifetime,” as this concept depends on the objective of an appli- ent regions of the field can collaborate to aggregate their data cation, common definitions include the time until the first/last and provide more accurate reports about their local regions. node in the network depletes its energy and the time until a For example, in a habitat monitoring application [1], the aver- node is disconnected from the base station. In studies where age reported humidity values may be sufficient for the observ- clustering techniques were primarily proposed for energy effi- er. In military fields where chemical activity or radiation is ciency purposes (e.g., [2, 3]), the network lifetime was signifi- measured, the maximum value may be required to alert the cantly prolonged. An example is shown in Fig. 2 (extracted troops. In addition to improving the fidelity of the reported from [2]), where the number of nodes that remain alive using measurements, data aggregation reduces the communication LEACH is significantly larger (four to eight times larger) than overhead in the network, leading to significant energy savings. that using static clustering or minimum transmission energy In order to support data aggregation through efficient net- (MTE) routing. Note that even though the objective of several work organization, nodes can be partitioned into a number of protocols was not to maximize network lifetime, lifetime small groups called clusters. Each cluster has a coordinator, improvements can still be achieved if data aggregation is referred to as a cluster head, and a number of member nodes. exploited and the network is reclustered periodically. Clustering results in a two-tier hierarchy in which cluster Clustering has been extensively studied in the data process- heads (CHs) form the higher tier while member nodes form ing and wired network literatures. The clustering approaches the lower tier. Figure 1 illustrates data flow in a clustered net- developed in these areas cannot be applied directly to WSNs work. The member nodes report their data to the respective due to the unique deployment and operational characteristics of these networks. Specifically, WSNs are deployed in an ad hoc manner and have a large number of nodes. The nodes are This work was supported by NSF under grants ANT-0095626, ANT03 typically unaware of their locations. Hence, distributed clus- 13234, ANT-0325979, and ANT-0435490, by EEC-0333046, and by the tering protocols that rely only on neighborhood information Center for Low Power Electronics (CLPE) at the University of Arizona. are preferred for WSNs (however, most studies in this area Any opinions, findings, conclusions, and recommendations expressed in still assume that the network topology is known to a central- this material are those of the authors and do not reflect the views of NSF. ized controller). Furthermore, nodes in WSNs operate on bat- 20 0890-8044/06/$20.00 © 2006 IEEE IEEE Network • May/June 2006 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
  • 2. YOUNIS LAYOUT 5/3/06 2:24 PM Page 21 Intercluster Intracluster communication communication • Every node has a unique identifier. • These identifiers are uniformly assigned throughout the field. For example, the scheme in [4] favors nodes with lower identi- fiers to become CHs. This approach may not be suitable for energy-constrained sensor networks because it penalizes spe- cific nodes in the network irrespective of their battery life- times. Mobile Another class favors nodes with larger degrees (e.g., Kuhn observer et al. [5] and Amis et al. [6]) in order to create dense clusters and elect the minimal dominating set of CHs (the degree of a node is the number of its neighbors within a prespecified transmision called the cluster range). This, however, may result I Figure 1. Illustration of data flow in a clustered network. in quickly draining the battery of larger-degree nodes. From an application perspective, balancing cluster sizes reduces the load on CHs. However, this comes at the expense of having tery power with limited energy. Hence, the employed cluster- more clusters in the network and thus a larger routing overlay. ing approach must have low message overhead. Finally, harsh A third class of techniques favors nodes with higher weights to environmental conditions result in unexpected failures of become CHs. The weight of the node is used to define its sig- nodes. Hence, periodic reclustering is necessary in order to nificance. For example, it can be the residual battery energy heal disconnected regions and distribute energy consumption (as in the HEED protocol [3]), its degree (as in the ACE pro- across all nodes. Periodic reclustering is also necessary, as the tocol [7]), or a combination of parameters (e.g., remaining parameters used for clustering (e.g., the remaining energy, energy, degree, mobility, and average distance to neighbors). node degree, etc.) are dynamic. The clustering techniques pro- Some protocols, such as GAF [8] and SPAN [9], were pro- posed for data processing typically consider static parameters, posed for controlling the network topology by exploiting node such as the distance between the nodes, and assume that redundancy. These protocols select certain nodes to be active nodes are more reliable. (i.e., participate in sensing and data forwarding), while others The goal of this article is to introduce the reader to different are put to sleep to save their energy. In GAF [8], for example, classes of clustering approaches that have been proposed for a node belongs to a region that is determined by its location. WSNs. We compare some representative protocols in terms of A region in this context is defined as an area A in which any their design approach, clustering criteria, basic assumptions, node u can communicate via a single hop with any node v ∈ and overhead. We consider clustering proposals that target the B, where B is a neighboring region to A. Thus, only one repre- general class of ad hoc networks and are also suitable for sen- sentative node in any region needs to participate in the rout- sor networks. This article focuses more on clustering “approach- ing infrastructure at any given time to ensure network es” than on “protocols.” A clustering “approach” in this context connectivity. In SPAN [9], a node decides whether to remain identifies the parameter(s) used for partitioning the network active or go to sleep according to its two-hop neighborhood and whether clustering is performed in a centralized or a dis- connectivity. Although these protocols are not clustering tech- tributed fashion. In addition, we highlight the basic challenges niques, their effect on the network topology is similar to that in deploying clustering techniques in WSNs. of clustering. Execution of a Clustering Algorithm Classification of Clustering Techniques in The execution of a clustering algorithm can be carried out at a centralized authority (e.g., a base station) or in a distributed Wireless Sensor Networks way at local nodes. Centralized approaches require global Clustering in WSNs involves grouping nodes into clusters and electing a CH such that: • The members of a cluster can communicate with their CH 100 directly. 90 • A CH can forward the aggregated data to the central base LEACH station through other CHs. 80 Thus, the collection of CHs in the network form a connected 70 MTE dominating set. Research on clustering in WSNs has focused Number of nodes alive on developing centralized and distributed algorithms to com- 60 pute connected dominating sets. We focus on distributed approaches in this article since they are more practical for 50 large-scale deployment scenarios. Since obtaining an optimal 40 dominating set is an NP-complete problem, the proposed algorithms are heuristic in nature. Static LEACH-C 30 clustering We classify the clustering techniques based on two criteria: • The parameter(s) used for electing CHs 20 • The execution nature of a clustering algorithm (probabilistic 10 or iterative) 0 Election of Cluster Heads 0 100 200 300 400 500 600 700 800 900 1000 One class of clustering techniques uses the node identifier to Time (s) elect CHs. The success of this approach depends on two assumptions: I Figure 2. Number of nodes that remain alive over time [2]. IEEE Network • May/June 2006 21 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
  • 3. YOUNIS LAYOUT 5/3/06 2:24 PM Page 22 information about the network topology. The classic K-Means The LEACH protocol [2] is an application-specific clus- clustering approach (proposed in the data processing litera- tering protocol, which has been shown to significantly ture) may be applied if the number of desired clusters can be improve the network lifetime. It assumes that every node is determined a priori and node locations are available. In this reachable in a single hop and that load distribution is uni- case, an initial random set of clusters is selected and a node is form among all nodes. LEACH assigns a fixed probability to moved from one cluster to another if this move reduces the every node so as to elect itself as a CH. The clustering pro- objective cost function of the entire system. Banerjee et al. cess involves only one iteration, after which a node decides [10] proposed a centralized technique that does not require whether to become a CH or not. Nodes take turns in carry- knowledge of node locations. Their technique is based on con- ing the role of a CH. structing a spanning tree of clusters that is rooted at an The HEED protocol [3] considers a multihop network observer and forcing a bound on the maximum and minimum and assumes that all nodes are equally important. A node cluster size. A distributed protocol was also proposed in [10] uses its residual energy as the primary parameter to proba- for constructing the spanning tree. bilistically elect itself to become a CH. In case of a tie The efficacy of centralized approaches is limited in large- between two CHs, say u and v, u concedes to v (i.e., gives scale networks where collecting all the necessary information up its CH candidacy) according to a secondary parameter, at the central authority is both time and energy consuming. such as node degree or average distance to neighbors. This Distributed (localized) approaches are more suitable for results in the uniformly distribution of the elected set of large-scale networks. In such approaches, a node decides to CHs across the network. In HEED, each node executes a join a cluster or become a CH based on the information constant number of iterations. An implementation of HEED obtained solely from its one-hop neighbors. Several distribut- in TinyOS (the operating system for Berkeley motes) ed clustering techniques have been proposed in the literature. showed that clustering and data aggregation at least double These techniques are either iterative or probabilistic in nature. the network lifetime. Kuhn et al. [5] proposed a probabilistic technique to elect Iterative Clustering Techniques — In iterative clustering tech- CHs, in which the probability is dependent on the node niques, a node waits for a specific event to occur or certain degree. The convergence of their proposed technique, which nodes to decide their role (e.g., become CHs) before making depends on the number of nodes in the network and the node a decision. For example, in the Distributed Clustering Algo- degree, is much faster than iterative techniques. In addition, rithm (DCA) [11], before making a decision, a node waits for this approach elects a dominating set of CHs that is asymptot- all its neighbors with higher weights to decide to be CHs or ically optimal (minimal). join existing clusters. Nodes possessing the highest weights in Table 1 compares representative examples of distributed their one-hop neighborhoods are elected as CHs. If a node clustering techniques. (Note that several other techniques receives multiple CH announcements, it arbitrates among were proposed in the literature but are not discussed here due these CHs using a preference condition (e.g., higher weight to space limitations.) The table shows that all distributed clus- wins). If none of the higher-weight neighbors of a node tering protocols have a constant message overhead per node. decides to become a CH, then this node decides to become a This is an important advantage of the distributed techniques CH. The problem with most iterative approaches is that their over the centralized ones, which involve significant message convergence speed is dependent on the network diameter overhead. The processing overhead at each sensor, however, (path with the largest number of hops). In a two-dimensional is negligible in a centralized approach compared to a dis- field with n deployed nodes, the DCA algorithm requires tributed one (in which nodes participate in the computations). For example, in iterative approaches, a node has to check the O ( n) received messages to decide how it should react. These mes- sages can be O(δ), where δ is the node degree. As energy con- iterations to terminate. The worst-case convergence speed can sumption for data processing is typically lower than that for be as slow as n – 1 iterations in a 1D setting. The perfor- communication, the message processing overhead may be mance of iterative techniques is also highly sensitive to packet ignored. losses. For example, if a node u discovers that one of its As shown in Table 1, most of the distributed protocols have neighbors v has a higher weight, then u has to wait for v to low overhead. This overhead is dependent on the frequency of decide before it makes a decision. If node v fails shortly after reclustering, which is small in typical applications. Throughput the neighborhood discovery phase, node u will wait indefinite- is typically not negatively affected by clustering, as shown in ly for v to make a decision. an implementation study of HEED [3]. In fact, throughput is To ameliorate the above problems, some protocols enforce improved under high load because of the reduction in channel a bound on the number of iterations for each node. For exam- contention. The performance of each clustering protocol ple, in ACE [7] when a node finishes executing a number of depends on the network configuration, the system model, and iterations (e.g., 5), it makes a decision based on the available the application scenario. information. These iterations are enough to achieve a stable average cluster size. The protocol in [6] allows a cluster to include nodes that are D hops away from the CH. A node Open Issues executes 2D iterations before making a decision. This results Clustering in WSNs faces several deployment challenges, such in a constant number of iterations for convergence. as ensuring connectivity, selecting the optimal frequency of CH rotation, computing the optimal cluster sizes, and cluster- Probabilistic Clustering Techniques — The probabilistic (or ran- ing the network in the presence of a node duty cycle. 1 domized) approach for node clustering ensures rapid conver- Addressing these problems will require cross-layer design, gence while achieving some favorable properties, such as especially with regard to the MAC and network layers. balanced cluster sizes. It enables every node to independently decide on its role in the clustered network while keeping the message overhead low. We now discuss a few examples of this 1 In a typical WSN, a sensor alternates between active and sleep states. The approach. ratio of the active time to the total time is referred to as the node duly cycle. 22 IEEE Network • May/June 2006 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
  • 4. YOUNIS LAYOUT 5/3/06 2:24 PM Page 23 Complexity (per node) Protocol I/P Cluster criteria Objective Assumptions Time (iter.) Message Unique node identifiers Baker et al. [4] I Identifier Minimum dominating set and uniform node O(Diam) O(1) distribution Topology and field GAF [8] I Position Redundancy elimination O(1) O(1) dimensions are known Two-hop Every node has a routing Routing protocol SPAN [9] I Redundancy elimination O(1) connectivity table overhead Dominating set of high- Unique, real value DCA [11] I Weight O(Diam) O(1) er-weight nodes weight for every node Max-Min D-hop cluster formation, MAC layer provides I Degree O(D) O(D) D-Cluster [6] D is a constant collision avoidance Rapid convergence, Nonuniform load distru- ACE [7] I Degree O(1) O(1) denser cluster sizes bution Rapid convergence and Single-hop network and LEACH [2] P CH frequency maximized network life- uniform load distribu- O(1) O(1) time tion Rapid convergence and Nonuniform load distri- HEED [3] P Residual energy mazimized network life- O(1) O(1) bution time Three independent com- Kuhn et al. [5] P Degree Minimum dominating set polylog(n) polylog(n)) munication channels I Table 1. Comparison of representative distributed clustering techniques. I/P denotes whether a protocol is iterative or probabilistic, Diam denotes the network diameter, and n denotes the number of nodes in the network. Connectivity MAC Layer Design An important objective of any clustering technique is network Scheduling intracluster and intercluster transmissions is connectivity. For intracluster communication, a cluster mem- another important design challenge. Since clustering is typical- ber communicates with its CH either directly (e.g., [2, 3, 7]) or ly employed in applications where data aggregation is per- via multiple hops (e.g., [6, 11]). Connectivity in this case is a formed, time division multiple access (TDMA) is best for result of the success of cluster formation. For intercluster com- intracluster transmissions. This is because a CH can set the munication, two approaches were adopted in order to maintain TDMA schedule and inform its cluster members about it. The connectivity. In one approach (e.g., [6, 10, 11]), nodes on clus- problem is how to prevent the TDMA intracluster transmis- ter boundaries are used as gateways to relay data among CHs. sions from colliding with transmissions in neighboring clusters This approach (depicted in Fig. 3a) is suitable in networks that or with intercluster frames, especially when CHs use longer use a fixed transmission power. Network density has to be suf- ranges for communicating with each other. One possible solu- ficiently high in order to ensure that enough gateways are pre- tion is to use orthogonal frequency channels or different sent at the intersection areas between clusters. In another CDMA codes to parallelize intracluster and intercluster trans- approach (e.g., [2, 3]), the CH overlay constitutes the routing missions. It may not be cost effective, however, to equip cheap infrastructure, and intercluster routing proceeds only through sensors with expensive radios in order to support orthogonal CHs. This approach (depicted in Fig. 3b) is appropriate if: channels or codes. Enabling concurrent intracluster and inter- • A node can tune its transmission power 2 (e.g., Berkeley cluster communications using a single radio channel is an motes). open research issue. • The CH density and intercluster transmission range satisfy the connectivity conditions specified by Gupta and Kumar Rotating the Role of Cluster Heads [12]. It is essential to rotate the role of CHs among nodes so as not An advantage of this approach is that it enables all non-CHs to burden a few nodes with more duties than others. There to sleep while not sensing or transmitting. Selecting the opti- are several possibilities for CH rotation. One way is to use a mal intracluster and intercluster transmission ranges to ensure timer expiration to trigger the clustering algorithm, as connectivity and prolong the network lifetime is still an open described in “Node Synchronization” below. Another way is issue. to use a dynamic parameter (e.g., remaining battery) for trig- gering the clustering algorithm at local regions. For example, a CH might trigger a new CH election process in its local 2Note that power control in WSNs is used for switching between CH and region if its remaining battery lifetime goes below a prespeci- non-CH operation modes, and not on a per-packet basis, as proposed for fied threshold. The CH rotation mechanism is typically inde- more capable ad hoc networks. pendent of the clustering protocol. IEEE Network • May/June 2006 23 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
  • 5. YOUNIS LAYOUT 5/3/06 2:24 PM Page 24 + + + + + + + + GN + + + + + + + + GN + CH + CH Pressure + GN Pressure + CH CH sensor + sensor + + GN + GN + + + GN + + + Base Base + + GN station + + station + + CH CH + CH + CH + + + + + + (a) (b) I Figure 3. Intercluster connectivity models: a) routing via gateway nodes; b) routing via CHs only. GN: gateway node. It is obvious that more frequent CH rotation results in intercluster traffic and hence will deplete their batteries faster more clustering overhead and network interruption, while less than faraway CHs). In order to balance energy consumption frequent rotation may cause some nodes to die faster than among CHs, both intracluster aggregation and the data for- others. The study of this trade-off is essential for achieving warding responsibilities of a CH have to be considered. Shu et optimal network lifetime. Currently, applications set this rota- al. [13] studied how to achieve this balance by assigning larger tion frequency heuristically, based on some intuitive factors cluster sizes to CHs that are responsible for less data forward- such as the expected battery lifetime and the node degree. ing. An example is illustrated in Fig. 4, in which sensors are deployed in a circular region around a base station. This Node Duty Cycle approach is constrained by the maximum possible sensor- A primary factor that prolongs the battery lifetime is allowing transmission range, and the supporting MAC layer. The read- sensors to sleep when not active. This is due to the following er is referred to [13] and the references therein for more three reasons. First, idle listening consumes significant energy information on load- and power-balanced clustering tech- that is comparable to transmission or reception. For example, niques in WSNs. Several issues are still open for research, in a Berkeley Mica2 mote, idle listening consumes energy including how to optimally select cluster sizes without knowl- close to that of reception. In contrast, the energy drainage during sleep time is about three orders of magnitude less than the reception energy consumption. Second, battery discharge is nonlinear, and some of the unusable charges can be restored in the battery after the sleeping period. Third, sensors are typ- ically deployed redundantly, which implies that not all the nodes need to be awake simultaneously. Therefore, clustering techniques should incorporate the node’s duty cycle in their design. This can be done in one of two ways, depending on the type of the application. First, non-CH nodes can be allowed to sleep when they are not sensing or communicating with their CHs. This approach is suitable for applications where sensors are periodically sending reports. Second, if the application requires the sensors to continuously monitor the field for unexpected events, then a CH can determine which of its cluster members are redundant and advise them to turn themselves off. Thus, a CH maintains a minimal active set of nodes in the cluster. It is also possible to elect an active set of nodes to cover the field prior to cluster formation. In this case, the CH and all its members are active during the network operation cycle. Optimal Cluster Size Currently, most clustering protocols assume a fixed cluster- transmission range, which results in uniform cluster sizes. However, this results in a skewed load distribution on CHs I Figure 4. Selecting cluster sizes to evenly distribute energy con- (e.g., CHs that are closer to the observer will carry more sumption among CHs. 24 IEEE Network • May/June 2006 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.
  • 6. YOUNIS LAYOUT 5/3/06 2:24 PM Page 25 edge of the node locations and how to exploit knowledge of [5] F. Kuhn, T. Moscibroda, and R. Wattenhofer, “Initializing Newly Deployed Ad Hoc the locations of data sinks for efficient cluster formation. and Sensor Networks,” Proc. ACM MOBICOM, Sept. 2004, pp. 260–74. [6] A. D. Amis et al., “Max-Min D-Cluster Formation in Wireless Ad Hoc Net- works,” Proc. IEEE INFOCOM, Mar. 2000, pp. 32–41. Node Synchronization [7] H. Chan and A. Perrig, “ACE: An Emergent Algorithm for Highly Uniform Cluster Distributed clustering protocols achieve their best perfor- Formation,” Proc. 1st Euro. Wksp. Sensor Networks, Jan. 2004, pp. 154–71. mance when sensor nodes are synchronized. Node synchro- [8] Y. Xu, J. Heidemann, and D. Estrin, “Geography-Informed Energy Conserva- tion for Ad Hoc Routing,” Proc. ACM MOBICOM, Rome, Italy, July 2001, nization ensures that the clustering process starts pp. 70–84. simultaneously throughout the network. Lack of synchroniza- [9] B. Chen et al., “SPAN: An Energy-Efficient Coordination Algorithm for Topol- tion may result in a suboptimal choice of CHs, especially for ogy Maintenance in Ad Hoc Wireless Networks,” ACM Wireless Networks, probabilistic approaches. However, the clustering process can vol. 8, no. 5, Sept. 2002, pp. 481–94. [10] S. Banerjee and S. Khuller, “A Clustering Scheme for Hierarchical Control in Mul- be triggered by nodes with faster clocks. This happens when tihop Wireless Networks,” Proc. IEEE INFOCOM, Apr. 2001, pp. 1028–37. such nodes start querying their neighbors for updated infor- [11] S. Basagni, “Distributed Clustering Algorithm for Ad Hoc Networks,” Proc. Int’l. mation in order to start the clustering process. Received Symp. Parallel Architectures, Algorithms, and Networks, 1999, pp. 310–15. queries trigger the clustering process at these neighbors, and [12] P. Gupta and P. R. Kumar, “Critical Power for Asymptotic Connectivity in Wireless Networks,” Stochastic Analysis, Control, Optimizations, and Appli- these neighbors in turn trigger their neighbors, and so on. cations: A Volume in Honor of W. H. Fleming, W. M. McEneaney, G. Yin, Note that it is not essential that “all” the nodes in the network and Q. Zhang, Eds., Birkhauser, 1998. start the clustering process simultaneously. In fact, it is suffi- [13] T. Shu, M. Krunz, and S. Vrudhula, “Power Balanced Coverage Time Opti- cient that the process starts in different regions (nodes within mization for Clustered Wireless Sensor Networks,” Proc. ACM Int’l. Symp. Mobile and Ad Hoc Networking and Comp., May 2005, pp. 111–20. one or two hops) simultaneously. Probabilistic techniques that use a number of iterations (e.g., [3, 5]) are therefore less Biographies impacted by the lack of synchronization than single-iteration OSSAMA YOUNIS [M] (younis@ece.arizona.edu) is an assistant research scientist techniques (e.g., [2]). in computer engineering at the University of Arizona. He received B.S. and M.S. degrees with honors in computer science from Alexandria University, Egypt, in 1995 and 1999, respectively, and his Ph.D. degree in computer science from Conclusions Purdue University in August 2005. He has served on the Technical Program Committee for several international conferences, such as AINA 2006, WoW- Node clustering is a useful topology-management approach to MoM 2006, WWIC ’06, and ICWMC ’06. His research interests include wireless reduce the communication overhead and exploit data aggrega- sensor network protocols and applications, Internet tomography, and video com- tion in sensor networks. We have classified the different clus- munication. He is a member of the ACM. tering approaches according to the clustering criteria and the MARWAN KRUNZ (krunz@ece.arizona.edu) is an associate professor of electrical entity responsible for carrying out the clustering process. We and computer engineering at the University of Arizona. He received a Ph.D. have focused on distributed clustering approaches, which are degree in electrical engineering from Michigan State University in 1995. From more suitable for large-scale sensor networks. We highlighted 1995 to 1997 he was a postdoctoral research associate with the Department of Computer Science, University of Maryland, College Park. He also held visiting some of the basic challenges that have hindered the use of research positions at INRIA, Sophia Antipolis, France; HP Labs, Palo Alto, CA; clustering in current applications. We surmise that the most and US West Advanced Technologies, Boulder, CO. His recent research interests compelling challenges are how to schedule concurrent intra- include medium access and routing protocols for mobile ad hoc networks, quality cluster and intercluster transmissions, how to compute the of service provisioning over wireless links, constraint-based routing, Web traffic modeling, and media streaming. He has published more than 100 journal articles optimal cluster size, and how to determine the optimal fre- and refereed conference papers in these areas. He received the National Science quency for CH rotation in order to maximize the network life- Foundation CAREER Award (1998–2002). He currently serves on the editorial time. boards of IEEE/ACM Transactions on Networking, IEEE Transactions on Mobile Computing, and Computer Communications Journal. He has been a guest editor for special issues of IEEE Micro and IEEE Communications Magazine. He served References as technical program co-chair for IEEE INFOCOM 2004, IEEE SECON 2005, [1] “Habitat Monitoring on Great Duck Island,” http://www.greatduck IEEE WoWMom 2006, and the 2001 Hot Interconnects Symposium. He consults island.net/, 2006. for a number of corporations in the telecommunications industry. [2] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application- Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE SRINIVASAN RAMASUBRAMANIAN (srini@ece.arizona.edu) is an assistant professor Trans. Wireless Commun., vol. 1, no. 4, Oct. 2002, pp. 660–70. in the Department of Electrical and Computer Engineering at the University of [3] 0. Younis and S. Fahmy, “Distributed Clustering in Ad Hoc Sensor Networks: Arizona. He received a B.E. (honors) degree in electrical and electronics engi- A Hybrid, Energy-Efficient Approach,” Proc. IEEE INFOCOM, Hong Kong, neering from Birla Institute of Technology and Science, Pilani, India, in 1997, Mar. 2004; an extended version appeared in IEEE Trans. Mobile Comp., and a Ph.D. degree in computer engineering from Iowa State University, Ames, vol. 3, no. 4, Oct.–Dec. 2004, pp. 366–79. in 2002. His research interests include architectures and algorithms for optical [4] D. J. Baker and A. Ephremides, “The Architectural Organization of a Mobile networks, computer communication networks and protocols, fault tolerance, sys- Radio Network via a Distributed Algorithm,” IEEE Trans. Commun., vol. 29, tem modeling, and performance analysis. He served as the TPC Co-Chair for no. 11, 1981, pp. 1694–701. BROADNETS 2005 and is an editor of Wireless Networks Journal. IEEE Network • May/June 2006 25 Authorized licensed use limited to: Annamalai University. Downloaded on August 8, 2009 at 02:27 from IEEE Xplore. Restrictions apply.