incorporating fault tolerance in leach protocol

5
Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor Networks Rudranath Mitra 1 , Anurupa Biswas 2 Department of Information Technology Heritage Institute of Technology Anandapur,Kolkata-700107.INDIA. [email protected] Abstract Routing protocols have been a challenging issue in wireless sensor networks. WSN is one of the focussed are of research because of its multi- aspect applications. These networks are self- organized using clustering algorithms to conserve energy. LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol[1] is one of the significant protocols for routing in WSN. In LEACH, sensor nodes are organized in several small clusters where there are cluster heads in each cluster. These CHs gather data from their local clusters aggregate them & send them to the base station. On the LEACH many new schemes have been proposed to enhance its activity like its efficiency, security etc. In this paper the fault tolerance issue is being incorporated. Key words: Cluster-head, CH, BS, LEACH, fault tolerance. 1. Introduction A clustered architecture organizes the sensor nodes into clusters, where each cluster is governed by a cluster-head. The nodes in each cluster are involved in message exchanges with their respective cluster- heads & these CHs send messages to their respective BSs, which is usually an access point connected to a wired network. Fig. 1 represents a clustered architecture where any message can reach the BS by at most 2 hops. Clustering can be extended to greater depths hierarchically. Clustered architecture is specially useful for sensor networks because of its capability for data fusion. The data gathered together by all members of the cluster at the cluster-head and only the resulting information are sent to the BS. Hence sensor networks should be self-organizing as well as the cluster information & election of cluster- heads must be an autonomous, distributed process. This is achieved through LEACH. Fig.1 Fig. 1 represents a clustered architecture where any message can reach the BS by at most 2 hops. Clustering can be extended to greater depths hierarchically. Clustered architecture is specially useful for sensor networks because of its capability for data fusion. The data gathered together by all members of the cluster at the cluster-head and only the resulting information are sent to the BS. Hence sensor networks should be self-organizing as well as the cluster information & election of cluster- heads must be an autonomous, distributed process. This is achieved through LEACH. LEACH is a clustering-based protocol that minimizes energy dissipation in sensor networks. LEACH randomly selects nodes as cluster-heads & periodic reelection for CHs is performed. It helps in energy dissipation among nodes in the network instead of depending on only one node (cluster- Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384 380 ISSN:2249-5789

Upload: trantruc

Post on 14-Feb-2017

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Incorporating Fault Tolerance in LEACH Protocol

Incorporating Fault Tolerance in LEACH Protocol for Wireless Sensor

Networks

Rudranath Mitra

1, Anurupa Biswas

2

Department of Information Technology

Heritage Institute of Technology

Anandapur,Kolkata-700107.INDIA.

[email protected]

Abstract

Routing protocols have been a challenging

issue in wireless sensor networks. WSN is one of

the focussed are of research because of its multi-

aspect applications. These networks are self-

organized using clustering algorithms to conserve

energy. LEACH (Low-Energy Adaptive Clustering

Hierarchy) protocol[1] is one of the significant

protocols for routing in WSN. In LEACH, sensor

nodes are organized in several small clusters

where there are cluster heads in each cluster. These CHs gather data from their local clusters

aggregate them & send them to the base station.

On the LEACH many new schemes have been

proposed to enhance its activity like its efficiency,

security etc. In this paper the fault tolerance issue

is being incorporated.

Key words: Cluster-head, CH, BS, LEACH, fault

tolerance.

1. Introduction

A clustered architecture organizes the sensor nodes

into clusters, where each cluster is governed by a

cluster-head. The nodes in each cluster are involved

in message exchanges with their respective cluster-

heads & these CHs send messages to their

respective BSs, which is usually an access point

connected to a wired network.

Fig. 1 represents a clustered architecture where

any message can reach the BS by at most 2 hops.

Clustering can be extended to greater depths

hierarchically. Clustered architecture is specially

useful for sensor networks because of its capability

for data fusion. The data gathered together by all

members of the cluster at the cluster-head and only

the resulting information are sent to the BS. Hence

sensor networks should be self-organizing as well

as the cluster information & election of cluster-

heads must be an autonomous, distributed process.

This is achieved through LEACH.

Fig.1

Fig. 1 represents a clustered architecture where any

message can reach the BS by at most 2 hops.

Clustering can be extended to greater depths

hierarchically. Clustered architecture is specially

useful for sensor networks because of its capability

for data fusion. The data gathered together by all

members of the cluster at the cluster-head and only

the resulting information are sent to the BS. Hence

sensor networks should be self-organizing as well

as the cluster information & election of cluster-

heads must be an autonomous, distributed process.

This is achieved through LEACH.

LEACH is a clustering-based protocol that

minimizes energy dissipation in sensor networks.

LEACH randomly selects nodes as cluster-heads &

periodic reelection for CHs is performed. It helps in

energy dissipation among nodes in the network

instead of depending on only one node (cluster-

Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384

380

ISSN:2249-5789

Page 2: Incorporating Fault Tolerance in LEACH Protocol

head). Each iteration of selection of CHs is called a

round.

The operation of LEACH is split into two

phases: Set up & Steady.

During the set up phase, each sensor node

chooses a random number between 0 & 1. If it is

lower than the threshold for node n, T(n), the

sensor node becomes a cluster-head.

The threshold T(n) is calculated as [2]:

Where P is the desired percentage of

nodes which are CHs, r is the current

round, and G is the set of nodes that has

not been CHs in the past 1/P rounds. It

ensures that all nodes eventually spend

equal energy. After selection the CHs

advertise their selection to all other nodes.

All nodes chooses their nearest CH after

receiving advertisements based on the

received signal strength. The CHs then

assign a TDMA schedule for their cluster

members. This allows the sensor nodes of

the cluster to turn off their transceiver

except at the time slot allocated to them.

Therefore it is saving considerable energy.

During the steady phase, data transmission takes

place based on TDMA schedule and the CHs

perform data aggregation/ fusion through local

computation. The BS receives only aggregated data

from cluster-heads, leading to energy conservation.

After a certain period of time in the steady phase

CHs are again selected through the set-up phase.

LEACH has been come out to be primary

clustering protocol in the WSNs as well it has

shown energy efficiency & effectiveness [3][4][5].

Hence LEACH has been chosen as the plot for

implementation of fault tolerance.

2. Related Works

The idea proposed in LEACH has been an

inspiration for many hierarchical routing protocols,

although some protocols have been independently

developed. Since sensor nodes are often placed in

harsh zone [6], sensor nodes area prone to failure.

Supposed if a cluster-head is faulty it can leave a

cluster disconnected from the base station until the

network reorganizes again.

So we see fault tolerance problem is a

very big problem in WSN. Several works has been

done on fault tolerance over many clustering

algorithms. One fault tolerance approach has been

discussed in [7]. Here also the research work is

done on LEACH. Here fault recovery is suggested

in two ways: inter-cluster recovery & intra

cluster recovery.

Another research work on fault tolerance

is discussed in [8]. Here a Dynamical Jumping

Real-time Fault-tolerant Routing Protocol (DMRF)

has been proposed. Once node failure, network

congestion or void region occurs then the

transmission mode will switch to jumping

transmission mode leading to reduced transmission

delay and guarantees the data packet to be sent to

its desired destination within the specified time

limit. Each node can dynamically adjust the

jumping probabilities to increase the ratio of

successful data transmission by using feedback

mechanism. This mechanism results in reduced

effect of failure nodes, congestion and void region

and reduced transmission delay, reduced number of

control packets and higher ratio of successful

transmission.

One more fault tolerant work is discussed

in [9]. Basically, WSNs faces resource limitations,

high failure rates and fault caused by wireless

channels & wireless sensor nodes. It increases the

reliability & robustness of the network by creating

a backup path for every node on a main path of

data delivery. When a node gets failure it

immediately applies its backup path as the main

path for data delivery of next incoming packets.

This protocol reduces the number of dropped data packets and increases robustness of the entire

network by maintaining the continuity of data

packet transmission even in presence of faults.

3. Proposed Scheme

In this scheme, fault is detected in a general way

that if no response comes from the CH to BS or the

subordinates then it is considered that the cluster-

Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384

381

ISSN:2249-5789

Page 3: Incorporating Fault Tolerance in LEACH Protocol

head is faulty and is become unable to transfer

data.According to this scheme, there may be

tworecovery mechanisms:Replace the faulty

cluster-head by the next highest energy node in the

cluster.

Maintain two cluster-heads in each cluster by using

token.

3.1. Illustration

To avoid redundancy effect one token will be

passing in between the two cluster-heads. When

CH1 is active then the token will be kept by that

CH (means CH1) and CH2 will not hold any token

then. CH2 will have all the replica information

from the communicating nodes. Until CH1 gets

faulty, CH1 is responsible for gathering all the

information from the subordinates to fuse the data

& send to BS. So, until CH1 gets faulty i.e., CH1 is

working properly, CH2 gets all the data from the

nodes those are sending data to CH1 but CH2 is

receiving data only, not sending any reply to those

nodes.

To make all the nodes know that the CH2 is alive

i.e., not faulty, CH2 will periodically send a ping

message to all the nodes.

When CH1 gets faulty, then CH2 becomes

responsible for the same activities that CH1 was

doing. That means till then CH2 will be gathering

all the information from the subordinates to fuse

the data and send them to the BS.

In case if CH2 becomes faulty while CH1 was

working properly, then next highest energy node

will be selected as CH2 & will act as that

mentioned earlier.

When CH1 has already become faulty and CH2 is

playing the role of CH1, then also the next highest

energy node will be selected as CH2. The entire

procedure is pictorially well described in fig.2.

When both CH1 & CH2 will stop working

simultaneously by chance, then according to fig.2

the entire process has to be begun, that means from

the advertising phase.

If some of the subordinate nodes are

faulty, then we can implement redundancy of

subordinates. The expense to maintain this much of

redundant nodes will be greater than the

expenditure of maintaining two cluster-heads.

4. Fault Detection Algorithm

1. Initialize CH1 & CH2 & subordinates

2. IF no response comes within a TDMA slot

THEN

3. Set CH1 as Faulty

4. ELSE

5. For CH2

6. IF no ping message comes periodically

THEN

7. Set CH2 as Faulty

Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384

382

ISSN:2249-5789

Page 4: Incorporating Fault Tolerance in LEACH Protocol

5. Results

6. Comparative Study

LEACH Fault

Tolerant

LEACH

Network lifetime

Very Good

Near to LEACH

Fault Detection

Capability

No Yes

Fault Recovery

Capability

No Yes

7. Advantages

1. It is capable of avoiding incorporating

redundancy of sensor nodes and paths into

clusters in WSN.

2. By avoiding redundancy, it is capable of

incurring expenditure of maintenance of

the redundant nodes and paths.

3. Since LEACH is already a significant

protocol in WSN due to its several

applications, incorporating fault tolerance

in LEACH makes LEACH more

significantly tempting protocol in WSN

research issue.

8. Conclusion

Several new schemes for fault tolerance

have been proposed on clustering algorithms in

WSN because fault tolerance is one of the most

challenging issues in WSN. In some papers the

jumping transmission mode is explored to

guarantee real-time and fault tolerant

characteristics. Some feedback mechanisms are

used to enhance successful transmission ratio.

LEACH is one of the most important &

significant protocols for research issues in WSN.

Through simulation it is shown that significant

improvement is achieved in coverage and fault

tolerance with a minimal trade-off in terms of

reduced network lifetime.

8. Acknowledgements

We express our sincere gratitude to the Head of the

Dept. and the members of the Research Team,

Dept.-of-Information Technology,Heritage Institute

of Technology.We do also acknowledge Smt. Baby

Mitra,Sudeshna Chatterjee,Doel Mitra and Peali

Juva for constant support and encouragement.

9. References

[1] ZHANG Yu-quan*, WEI Lei * -“IMPROVING THE

LEACH PROTOCOL FOR WIRELESS SENSOR

NETWORKS” by School of Information and Electronics, Beijing Institute of Technology, Beijing 100081

Email:[email protected]

[2] Zamree Che-Aron†, Wajdi Al-Khateeb††, and Farhat

Anwar†††-“The Enhanced Fault-Tolerance Mechanism of AODV Routing Protocol for Wireless Sensor

Network” by, Department of Electrical and Computer

Engineering International Islamic University Malaysia Kuala Lumpur, Malaysia 50728

[3] Guowei Wu 1, Chi Lin 1, Feng Xia 1,*, Lin Yao

1,2,*, He Zhang 1 and Bing Liu 1-“Dynamical Jumping

Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks”, by 1 School of Software, Dalian

University of Technology, Dalian 116620, China; E-

Mails: [email protected] (G.W.); [email protected]

(C.L.); [email protected] (H.Z.); liubing [email protected] (B.L.) 2 School of Electronics & Information, Dalian

University of Technology, Dalian 116021, China

[4] Akshaye Dhawan and Stephan Hennion-“Fault-

Tolerant Clustering Models forWireless Sensor Networks”, Ursinus College Department of Mathematics

and Computer ScienceCollegeville, PA 19426 fadhawan,

[email protected]

[5] Farinaz Koushanfar1, Miodrag Potkonjak2, Alberto Sangiovanni-Vincentelli1-“FAULT TOLERANCE

INWIRELESS SENSOR NETWORKS”,by 1Department

of Electrical Engineering and Computer Science

Univeristy of California, Berkeley Berkeley, CA, US 947202Department of Computer Science Univeristy of

California, Los Angeles Los Angeles, CA, US 90095

[6] Rehana raj T, Maneesha V Ramesh, Sangeeth k-“

Fault Tolerant Clustering Approaches in Wireless Sensor

Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384

383

ISSN:2249-5789

Page 5: Incorporating Fault Tolerance in LEACH Protocol

Network for Landslide Area Monitoring”, by Rehana raj

T,Amrita University Amritapuri Campus College of Engineering [email protected] Maneesha V

Ramesh Amrita University Amritapuri Campus College

of Engineering [email protected]

Sangeeth k Amrita University Amritapuri Campus Collegeof Engineering [email protected]

[7] A. Mojoodi , M. Mehrani , F. Forootan , R.Farshidi-

“Redundancy Effect on Fault Tolerance in Wireless

Sensor Networks”, By Islamic Azad University. [8] Tsang-Yi Wang, Yunghsiang S. Han Pramod K.

Varshney, Po-Ning Chen-“Distributed Fault-Tolerant

Classification in Wireless Sensor Networks”, Tsang-Yi

Wang, Member, IEEE, Yunghsiang S. Han MemberIEEE, Pramod K. Varshney, Fellow, IEEE, and

Po-Ning Chen, Senior Member, IEEE.

[9] Skender Ben Attia1, André Cunha1, Anis Koubâa1,2,

Mário Alves1-“ Fault-Tolerance Mechanisms for Zigbee

Wireless Sensor Networks”, 1 IPP-HURRAY! Research

Al Imam Muhammad Ibn Saud University, Computer

Science Dept., 11681 Riyadh, Saudi Arabia

[email protected],[email protected],[email protected].

pt,[email protected]

Rudranath Mitra et al, International Journal of Computer Science & Communication Networks,Vol 2(3), 380-384

384

ISSN:2249-5789