Professional Documents
Culture Documents
CHs (e.g. P=0.05) current round, and G is the set of nodes Where in this equation P = the desired percentage of CHs
that have not been CH in the last 1/P rounds, r is the (e.g. P=0.05) the current round, and En_current is the current
number of the current round. energy and En_max the initial energy of the node, with r s as
For each node, a random number between 0 and 1 the number of consecutive rounds in which a node has not
is generated. If this random number is less than T(n ) , this been CH. Thus, the chance of node n to become cluster head
sensor node will become a cluster head in this round and increases because of a higher threshold. A possible blockade
broadcast an advertisement message to other sensor of the network is solved. Additionally, r s is reset to 0 when a
node becomes CH. Thus, we ensure that data is transmitted
nodes near it.
to the base station as long as nodes are alive [6].
When each node has elected as cluster head itself for the
current round broadcasts an advertisement message to the Our clustering model is based on confidence value
rest of the nodes in the network. All the non-cluster head associated with broadcast from CHs. Confidence value of a
nodes, after receiving this advertisement message, decide on CH is a function of some parameters (1) distance between
the cluster to which they will belong for this round. This the CH, the node and (2) the CH current battery power and
decision is based on the received signal strength of the (3) number of nodes already were a member of this CH.
advertisement messages. After cluster head receives all the Basically, our model checks first if, with the current battery
messages from the nodes that would like to be included in power the CH has, it would be able to support the current
members at maximum data broadcast rate. A node decides
the cluster and based on the number of nodes in the cluster,
to join a CH if the head can still support the node with its
the cluster head creates a TDMA schedule and assigns each
rest power. Confidence value given by:
node a time slot when it can transmit [3].
Despite many advantages in using of the LEACH protocol
for cluster organization, CH selection and incising network Cv (i) = Bp
(3)
lifetime, there are a few features that the protocol does not Cm* Dc
support. LEACH assumes nodes power energies Where in this equation BP is the battery power of given
homogeneously. In a real, wireless sensor networks node, Cm is number of nodes already a member of given CH,
scenario, sensor nodes energy spread in heterogeneous Dc is distance between the CH and the node.
manner. Like LEACH, in order to reduce the probability of
collision among joint-REQ messages during the setup phase,
3. The New Protocol CSMA (Carrier Sense Multiple Access) is utilized as the
In this section, the details of PEAP are introduced. The MAC layer protocol. When a cluster head has data to send,
major application of a wireless sensor network is to it must sense the channel to see if anyone else is
monitoring of a remote environment. Data of individual transmitting using the BS spreading code. If so, the cluster
nodes are usually not very important. Since the data of head waits to transmit the data. Otherwise, the cluster head
sensor nodes are correlated with their neighbor nodes, data sends the data using the BS spreading code [3].
aggregation can increase reliability of the measured
parameter and decrease the amount of traffic to the base 4. Simulation Results
station. PEAP uses this observation to increase the efficiency
of the network. In order to develop the PEAP, some In order to evaluate the performance of the PEAP protocol,
assumptions are made about sensor nodes and the the simulator, specific to the needs of our model, was coded
underlying network model. For sensor nodes, it is assumed in PHP with Apache HTTP server version 2.2 and uses
that all nodes are able to transmit with enough power to PHP/SWF Charts for its graphical needs.
reach the BS if needed, that the nodes can adjust the amount We assume a simple model for the radio hardware energy
of transmit power, and each node can support different dissipation where the transmitter dissipates energy to run
Medium Access Control (MAC) protocols and perform the radio electronics and the power amplifier, and the
signal processing functions. These assumptions are receiver dissipates energy to run the radio electronics, as
reasonable due to the technological advances in radio shown in Fig. 1. For the experiments described here, both
hardware and low-power computing [3]. For the network, it the free space (d2 power loss) and the multi path fading (d4
is assumed that nodes have always data to send to the end power loss) channel models were used, depending on the
user and the nodes located close to each other have distance between the transmitter and receiver [7]. Power
correlated data. control can be used to invert this loss by appropriately
Such as LEACH, in first phase, PEAP chooses a node setting the power amplifier. If the distance is less than a
stochastically, , the principal will be explained in the threshold do, the free space (fs) model is used; otherwise, the
following: all sensor nodes compute a value T(n ) multi path (mp) model is used. Thus, to transmit l-bit
according to the following formula at the beginning of all message a distance, the radio expends
rounds.
lEelec +lεfsd 2 , d <do
E En _ current ETx(l,d) = ETx-elec (l ) + ETx-amp (l, d ) = (3)
n _ current lEelec +lεmp d ,
4
d ≥do
T(n) = p* * 1 − (2)
E E n _ max
n _ max
And to receive this message, the radio expends:
40 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010