J. Basic. Appl. Sci. Res., 7(5)12-17, 2017 | ISSN 2090-4304 |
Journal of Basic and Applied | |
© 2017, TextRoad Publication | Scientific Research |
www.textroad.com |
Department of Computer Science PIEAS University Islamabad Pakistan
Received: February 13, 2017 Accepted: April 21, 2017
The Wireless Sensor Network (WSN) is very diverse area of research in current era. WSN is attracting researchers due to its massive usage in several daily application as well as specific applications such as disaster sensing, battle zone perception and harm occurrence. The WSN uses nodes to sense certain physical events. Due to advent of smart systems for sensors’ data manipulation and connectivity, WSN offers better flexibility and become key technology for military applications. WSN plays an important role in security of military operations. The WSN’s Low-energy adaptive clustering hierarchy(LEACH)protocol has some issues to sense the security operations for military such as Battlefield Surveillance, Reconnaissance of opposing forces and physical object tracking and targeting. Therefore WSN network deployment for military security sensing needs more sophisticated protocols, modified system architecture to perform the military security sensing. KEYWORDS: WSN Leach Protocol, Military Operations, Leach Operations.
The WSN network is vast area of research in today’s time. Researchers are moving toward it due to its application in the areas where the human can’t reach. The WSN used as key to measure the different environmental conditions such as Temperature, Object tracking, Security sensing and control, disaster sensing and Military Operations Battlefield surveillance and monitoring, guiding systems of intelligent missiles and detection of attack by weapons of mass destruction. Reconnaissance of opposing [1, 2]. The WSN is a group of transducers with a communication infrastructure to monitoring and recording conditions at different Locations. Wireless Sensor Network used to monitor an environment and record Data[1]. The WSN sense the events with the employ of tiny size Nodes. These nodes need battery power to sense the event and do apposite action. The battery power is an issue in the WSN network. In WSN different protocols used for the battery power saving and sensing event [2]. LEACH protocol is one of all these protocols. LEACH can used for military security operations such as such as Battlefield surveillance and monitoring, guiding systems of intelligent missiles and detection of attack by weapons of mass destruction, , Reconnaissance of opposing forces and physical object tracking and targeting etc. but LEAHC has some drawbacks such as cycle creation, energy consumption, protocol’s deployment, CH finalizing for next round. LEACH is a routing protocol and used for the WSN network longspan [5].
Due to which it is not ingenious for the military security operations.
II LEACH (Low-Energy Adaptive Clustering Hierarchy): LEACH (Low-Energy Adaptive Clustering Hierarchy) is one of the WSN protocols used for the energy efficiency.
LEACH is a clustering routing protocol. The LEACH protocol is TDMA based MAC protocol. The basic intention of use of the protocol is to enhance the lifespan of the WSN network by lowering energy consumption. In the clustering framework their should be a Cluster Head (CH) and Cluster Members (CM), these cluster members are Sensor Nodes. The CH collects the data from the other CM and sends it to Base station. CH allocates energy to nodes in the network to organize the energy but CH itself takes more energy than the nodes. CH elects after the voting of the nodes and it happens in every round because if one CH takes position for long time then it will die. In the LEACH when the cluster formed then the CH generate TDMA schedule for its CM in cluster and choose CSMA code. CH then sends the TDMA schedule table to its cluster members [3, 4, 5].
Corresponding Author: Shariq Aziz Butt, Department of Computer Science PIEAS University Islamabad Pakistan 12
Jamal and Butt, 2017
Figure 1 LEACH Protocol [LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey]
The operation of the LEACH protocol consists of two rounds Set-Up phase and Steady Phase [4, 6, 8].
A. Set-Up Phase:
The Set-Up phase is the one round cycle of LEACH protocol. In this phase time span is less than the Steady Phase. For the performing of the phase it has three steps [7]:
The cluster head sends the advertisement packets to CM to inform them that they can also become CH. The CH sends the advertisement with the use of CSMA MAC protocol. All CM in the round keep on their receivers for receive the advertisement from the cluster head [6, 7, 8].
After the receiving of the massage the CM response to the CH in the form of join request to inform the CH that it is also member of the cluster. When the one round complete then the next CH is decided on the basis of the high signal strength, if there is tie between the two CM then the random CH decide. All CH have to keep on there receivers for receive the join request from CM [7, 8, 10].
The transmission of data is done by TDMA schedule, CH creates schedule. The schedule is created according to the number of nodes in the cluster. Each node sends data to the CH within the allocated time by the CH to node. In the remaining time the node keep its receiver off to save energy for network long lifespan [6, 7, 8].
B. Steady Phase
The steady phase of LEACH is longer than the Set-up phase. Ultimately it results in the form of less or unnecessary cost of the network. In the steady phase the all CM sends data to CH and CH aggregates data and decrease the amount of data to minimize the load and save energy in network. The CM sends data via a single hop. After the receiving and reducing the size of data the CH directly sends data to base station or send via a neighbor CH. The purpose of transmission of data via neighbor CH is to find the shortest route to base station for save energy. After a decided time the network again goes back into the Ste-Up state for new cluster, CH and CM [4, 7, 10].
The entire operation of the LEACH protocol is explained via the diagrams shown below.
The Figure 2 shows that the CH send Advertisements message to all CM via CSMA protocol in the cluster and invites them to become next CH in the new cluster.
The Figure 3 is explaining the creation of the cluster. The CM sends join request to CH to become part of the cluster.
J. Basic. Appl. Sci. Res., 7(5)12-17, 2017
Figure 2 CH Advertisement Message to CM in Cluster
Figure 3 CM Sending Request to CH for joining Cluster
The Figure 4 is explaining the sending of data of one cluster’s CH via neighbor CH to save the energy. As in the diagram the CH has two routes to send information to base station route 1 and route 2. The CH has to decide that which one is the shortest path
Jamal and Butt, 2017
and can save energy. The CH needs time to find out the shortest path and location of its neighbor CH therefore the CH can send data proficiently.
The Figure 5 is explaining that how the CH distributes the time slots between the CM in the cluster for sending data. The time and energy is equally divided between CM in cluster. CH gathers data from CM and then sends to base station.
J. Basic. Appl. Sci. Res., 7(5)12-17, 2017
Figure 5 Cluster Member Send Data with Allocated Time Slot
IV LEACH FORMILITARY OPERATIONS
Military operations necessitate some WSN protocol to track and target the operations such as Battlefield surveillance and monitoring, guiding systems of intelligent missiles and detection of attack by weapons of mass destruction, tracking suspicious things, equipments sensing and tracking, in the battle field target the enemies etc. In the military environment the protocol has to be on job all the time to sense the environment with the less used of the energy. For these operations LEACH is not pertinent protocol due to following drawbacks [5, 7, 13, 14]:
the next CH selection or take action with the current CH?
If the LEACH protocol completes CH selection process and then takes action therefore possible that the event trigger and complete before the elect of next CH and disaster occur.
Jamal and Butt, 2017
CH will receive the empty data packets from the other CM, aggregate data and send to base station.
In both these two situation the energy will waste, delay in apposite action and low resource management.
Therefore due to all these issues in the LEACH protocol it is nor suitable protocol for the military security sensing.
WSN network is the well-liked area of interest. Many researchers are moving to it. LEACH is one of protocol in WSN network. LEACH is a routing protocol and used for the energy efficiency but it has some drawbacks due to which it is not applicable for the military security operations. These draw backs are related to CH selection, time distribution, distance of CM from CH, CH data aggregation and then sending to base station. The LEACH protocol needs some modification for military security deployment.
The future directions for the LEACH protocol:
[1] Chunyao FU1, Zhifang JIANG, Wei WEI and Ang WEI “An Energy Balanced Algorithm of LEACH Protocol in WSN” International journal of computer science 2013.
[2] Shariq Aziz Butt, “Energy Efficient Protocols and Environment Based Protocol Issues in WSN” International Journal of Electronics Communications and Electrical Engineering 2015.
[3] Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad and Manije Keshtgary, “Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks” Ijcsit 2010.
[4] Nutan Sindhwani and Rohit Vaid, “V LEACH: AN ENERGY EFFICIENT COMMUNICATION PROTOCOL FOR WSN” Nutan Sindhwani, Rohit Vaid 2013.
[5] Alakesh Braman and Umapathi G. R, “A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey” International Journal of Advanced Research in Computer and Communication Engineering 2014.
[6] Lalita Yadav and Ch. Sunitha, “Low Energy Adaptive Clustering Hierarchy in Wireless Sensor Network (LEACH)” International journal of computer science and information technology 2014.
[7] Reenkamal Kaur Gill, Priya Chawla and Monika Sachdeva, “Study of LEACH Routing Protocol for Wireless Sensor Networks” Ijcsit 2014.
[8] Amandeep Kaur and Amit Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey” International Journal of Computer Applications 2015.
[9] Leonardo B. Oliveira, “SecLEACH—On the security of clustered sensor networks” ELSEVIER Signal processing 2007.
[10] M.Shankar, Dr.M. Sridar and Dr.M. Rajani, “Performance Evaluation of LEACH Protocol in Wireless Network” International Journal of Scientific & Engineering Research 2012.
[11] Xuxun Liu, “A Survey on Clustering Routing Protocols in Wireless Sensor Networks” journal sensors 2012.
[12] NidhiSharma, “Security Enhancement in Leach Protocol” International Journal of Emerging Research in Management &Technology 2015.
[13] Fuzhe Zhao, You Xu, and Ru Li, “Improved LEACH Routing Communication Protocol for a Wireless Sensor Network” International Journal of Distributed Sensor Networks 2012.
[14] Ravneet Kaur, Deepika Sharma and Navdeep kaur, “Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network” International Journal of P2P Network Trends and Technology 2013.