Spanning tree based reliable data transmission in LEACH

Neeranjan Chitare*, M. Rashmi, Shalini R. Urs, Srinivas Sampalli

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless Sensor Networks are currently finding applications in various upcoming fields such as health care monitoring, environment monitoring, vehicular ad-hoc networks, and many more, even though they have limited power, computational and communication capabilities. Clustering protocols are crucial in wireless sensor networks as they optimize energy consumption. LEACH is a clustering protocol used for minimal consumption of energy. In this paper, we have proposed a scheme to enhance reliability in LEACH by making use of spanning trees generated at base station to achieve multipath and multi-hop data transmission. The assigned paths make use of only cluster heads. This scheme was validated through simulation exercises which highlight the effect of employing spanning trees on the average end to end delay in data transmission and total energy consumed by cluster heads.

Original languageEnglish
Title of host publicationAdvances in Computer Science and Information Technology. Computer Science and Information Technology
Subtitle of host publicationSecond International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012.
EditorsNatarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai
Place of PublicationBerlin
PublisherSpringer
Pages506-514
Number of pages9
ISBN (Electronic)9783642273179
ISBN (Print)9783642273162
DOIs
Publication statusPublished - Jan 2012
Externally publishedYes

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume86
ISSN (Print)1867-8211

Keywords

  • base station
  • clustering protocol
  • energy consumed
  • reliability
  • spanning trees
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Spanning tree based reliable data transmission in LEACH'. Together they form a unique fingerprint.

Cite this