LEACH-VD: A Hybrid and Energy-Saving Approach for Wireless Cooperative Sensor Networks

LEACH-VD: A Hybrid and Energy-Saving Approach for Wireless Cooperative Sensor Networks

Proshikshya Mukherjee (KIIT University (Deemed), India)
DOI: 10.4018/978-1-5225-9004-0.ch005


Wireless sensor networks act as an important role in the wireless communication area because of its properties, its intelligence, cheaper costs, and its smaller size. Multiple nodes are required for coperative communication, the low energy adaptive clustering hierarchy and LEACH-Vector Quantization are used for cluster and active cluster headformation. Further, Dijkstra Algorithm is used to find the shortest path between the active CHs and high-energy utilization, respectively. The main issue of inter-cluster communication is carried out in earlier work using LEACH and LEACH-V protocols. The chapter illustrates the LEACH-Vector Quantization Dijkstra protocol for shortest path active CH communication in a cooperative communication network. In the application point of view, LEACH-VD performs the lowest energy path. LEACH-V provides the intra-cluster communication between the cluster head, and using Dijkstra Algorithm, the minimum distance is calculated connecting the active cluster heads, which creates the shortest path results using an energy-efficient technique.
Chapter Preview

Overview Of Leach

LEACH is an energy conserving cluster based routing protocol. The whole networks are divided into several clusters. In several round clusters are broken in the run time. In each and every round cluster head (CH) is made by their predefine criteria. Every node has equal probability to make a cluster head (CH) (Fu et. al, 2013).

Figure 1.



Figure 1 shows that the several numbers of nodes. The nodes have created a group of cluster. Every cluster has a head node called cluster head. All cluster heads are directly connected to the base station. In LEACH protocol each round has two stages i.e. steady state and setup state. Steady stages always larger than the setup stage. Figure 2 shows the LEACH TDMA procedure.

Figure 2.



Complete Chapter List

Search this Book: