1788
4. Cluster-based Protocols However, the use of a random cycle scheme to select the
CH made LEACH the basis for other protocols with very
In this section we present some well known clustering slight modifications like LEACH-C and LEACH-F. In the
protocols and highlight their characteristics, related to the first case, LEACH-C transfers the responsibility of the
phases identified in the previous section. Some of these cluster creation to the BS, which obligates the nodes to
protocols are routing protocols and some of them are initially perform a direct communication with the BS for it
general clustering protocols. Table 1 shows the main to have a global view of the WSN. On the other hand,
characteristics of the protocols and evidences where they LEACH-F uses the global clustering scheme of LEACH-C
can be currently used, but also shows some weaknesses in and also fixes the clusters once they are formed, which
the reviewed clustering protocols, which lead to the reduces the overhead of cluster formation in the network,
proposal for future work over those uncovered issues. but prevents the use of the protocol in WSN with any kind
of mobility.
4.1. Former Protocols
The initial clustering schemas proposed for WSN were
4.3. Protocols for Proactive Networks
based in some sort of manual formation of the clusters, a One of the assumptions on LEACH-based protocols is
consequence of the type of networks where the sensor were that the sensors always have data to send. That is the reason
being used. In cases like the Dynamic Clustering for for considering them all during the cluster formation. The
Acoustic Target Tracking [5], due to the manual location of same assumption is made for other protocols that combine
the sensors, it is possible to create a heterogeneous setting the sensor nodes’ “willingness” to send information, with
of the network. The more capable nodes can be located in the revision of specific attributes of special interest in the
strategic places to allow them to act as cluster heads, and at sensor field. Examples of this kind of protocols are:
the same time, lower capacity sensor can be placed around HEED[22], EECS[19], Sensor Aggregates[6], ACE[4],
that CH to sense the data and send it to the BS using the EEDC[11] and TASC[17].
backbone created. Mobility in these protocols in only HEED uses the node proximity to it neighbors or the
considered regarding the approach of the targets to the node degree as a base attribute for cluster creation. The
stationary sensor nodes. node’s residual energy is used as the attribute to select the
CH, same as in EECS where the nodes use
4.2. LEACH-Based Protocols COMPETE_HEAD_MSG messages to compare their own
LEACH (Low Energy Adaptive Clustering Hierarchy) power level with the other values received and if the power
[8], was probably the first dynamic cluster head protocol level is the greater, the SN becomes CH. This mechanism to
proposed specifically for WSN using homogeneous select the CH and form the clusters produces a uniform
stationary sensor nodes randomly deployed. distribution of cluster heads across the network through
In LEACH all nodes have a chance to become CH to localized communications with little overhead. However,
balance the energy spent per round by each sensor node. synchronization is required and the energy expended during
The CH for the cluster are selected randomly and in a rotary data transmission for far away cluster heads is significant,
scheme based on their energy load. After its election, each especially in large scale networks.
CH broadcasts an advertisement message to the other nodes, In [6] the authors propose three different algorithms to
which decide which cluster they want to belong to, based on create and manage the clusters: DAM (Distributed
the advertisement’s signal strength. The clusters are formed Aggregate Management), EBAM (Energy-Based Activity
dynamically in each round and the times to perform the Monitoring) and EMLAM (Expectation-Maximization Like
rounds are selected randomly. Activity Monitoring). They work using the concept of
The data collection in the cluster is centralized and it is sensor aggregates. Their final goal is to abstract the
performed periodically using a TDMA schedule created by collaboration patterns of the sensors into a set of generic
every CH. The sensor nodes send data to the CH according schemas to support a wide class of applications for sensor
to the schedule. After completing the schedule, the CH networks. A sensor aggregate comprises those nodes in a
fuses all the data and transmits it to the BS. network that satisfy a grouping predicate for a collaborative
Despite of the good performance of LEACH, it has some processing task. The clusters formation depends on the
drawbacks, i.e., it is possible that the elected CH will be peaks formed by the sensors sensed signal, which is
concentrated in one part of the network and some nodes will broadcasted by each sensor at the start of each protocol
not have any CH in their vicinity; LEACH clustering period. This value is used as a “qualification parameter” to
terminates in a constant number of iterations, but it does not create the sensors clusters, assuring that there is only one
guarantee good cluster head distribution and assumes peak per cluster. If after this exchange of information the
uniform energy consumption for CH; and, the cost of the sensor finds that its signal strength is higher than its
overhead to form the clusters is expensive. neighbours’ signal strength, it elects itself as a CH or cluster
leader. Each sensor joins the cluster defined by the highest
1789
Table 1: Clustering algorithms and protocols in wireless sensor networks
peak that can reach that sensor through a strictly descending CH by considering only density reachable nodes as
path in the landscape. nomination candidates. This effect pulls cluster leaders
In ACE the nodes initiate actions at random intervals to towards most dense groups in the cluster, but nomination
avoid collisions. The goal is to select the smallest set of among density reachable candidates is still based on
cluster heads such that all nodes in the network belong to a weights.
cluster. When a node is unclustered at the beginning of its As can be seen, all of the previous protocols use a
iteration, it assesses its surroundings and count the number specific parameter for cluster formation, but always based in
of loyal followers (nodes that can belong only to the cluster the assumption that the SN always have data to send to the
that would be formed by the current node sensing its signal) BS.
it would receive if it declared itself a CH of a new cluster. If
the number of loyal followers for the node is greater than or 4.4. Protocols for Reactive Networks
equal to its spawning threshold function, the node will span
Contrary to the protocols presented in the previous
a new cluster. This algorithm only covers the aspects related
section, this new group of protocols usually take advantage
to the clusters formation, and does not include aspect related
of the queries performed by the user about the sensed data
to data transmission after that.
or of a specific triggering event occurred in the WSN. In
EEDC proposes a dynamic clustering and scheduling
this case the main idea is to save energy by aggregating
approach, based on the overlaps of sensing ranges of
information at the same time that a data transmission path is
sensors and on the analysis of the surveillance data reported
created to supply the request for information. Protocols that
by the sensors. To minimize the number of clusters and
follow this patter include: TEEN[13], APTEEN[14],
therefore maximize the energy saving, EEDC models the
CAG[20] and Upgraded CAG [21].
cluster creation process as a clique-covering problem and
TEEN is a clustering protocol designed to be used in
uses the minimum number of cliques to cover all vertices in
reactive networks, where the nodes react immediately to
the graph. The sink dynamically adjusts the clusters based
sudden and drastic changes in the value of a sensed
on spatial correlation and the received data from the
attribute. This approach is useful for time-critical
sensors. However, in EEDC the number of clusters
applications, but not well suited for applications where the
increases over time, since there is only splitting operation in
users need to get data on a regular basis. In this protocol, all
the protocol, but not a clearly defined cluster
nodes take turns becoming the CH for a time interval T,
reconfiguration operation.
called the Cluster Period. TEEN main focus is in the
The Topology Adaptive Spatial Clustering (TASC)
information aggregation, thus the cluster formation is very
algorithm [17] is a distributed algorithm that partitions the
similar to LEACH. Sensor nodes sense the medium
network into a set of locally isotropic, non-overlapping
continuously, but the data transmission is done less
clusters without prior knowledge of the number of clusters,
frequently which favours the energy saving. However, it
cluster size and node coordinates. For the cluster formation,
has an important drawback: if the thresholds are not
two different parameters must be previously specified: the
reached, the nodes will never communicate.
required minimum cluster size and a density reachability
APTEEN is a variation of TEEN, designed as a hybrid
parameter. The latter parameter allows each node to further
protocol that changes the periodicity or threshold values
limit the number of nodes that it can potentially nominate as
used to provide a periodic state view of the network. Uses a
1790
combination of proactive and reactive network’s features. In this case, the CH keeps transmitting streams of response
The cluster head selection in APTEEN is based on the for a query that is issued just once, thus the tree does not
mechanism used in LEACH-C. The cluster exist for an have to be reconstructed and the network changes its
interval called the cluster period, and then the BS re-groups schema from reactive to proactive. This mode of operation
clusters, at a time called the cluster change time. APTEEN is appropriate when the environment does not change as
uses a modified TDMA, where each node in the cluster is frequently and the query remains valid for a certain period
assigned a transmission slot, to avoid collisions. For query of time. A node counting is performed within a cluster to
responses, APTEEN uses node pairs. This implies adjacent assign weights to the CH values. The count is updated only
nodes that sense similar data, but only one of them responds when cluster adjustments happen. In streaming mode, due
to a query; the other can go to “sleep” mode and don’t need to the CH are fixed throughout the duration of the query,
to receive the query. These two nodes can take the role of they can become an energy bottleneck. In this case, the
handling queries alternately, which helps them saving authors propose the use of CH rotation technique to
resources. The main drawbacks of the APTEEN approach maximize the network lifetime, like the mechanism used in
are the overhead and complexity associated with forming LEACH.
clusters at multiple levels, the method of implementing As can be seen, the idea in this group of protocols is to
threshold functions, and how to deal with attribute-based take advantage of the time and effort necessary to perform
naming of queries. other operations in the WSN, to perform the clustering
While monitoring environmental features in a sensor process.
field, nearby sensor nodes typically register similar values.
This relation between position and measures is called spatial 5. Summary
correlation. According to its authors, CAG (Clustered
Several clustering approaches have been proposed for
AGgregation technique) [20] is the first in-network
mobile sensor networks, due to the advantages of having a
aggregation algorithm exploiting spatial correlation, which
hierarchical structure to communicate the nodes and save
trades a negligible quality of result (precision) for a
energy in the WSN. Reviewing the protocols presented in
significant energy saving. CAG forms clusters of nodes
this paper is possible to observe that all of them are
sensing similar values. The CAG algorithm operates in two
concerned on how to prolong the WSN lifetime and how to
phases: query and response. During the query phase, CAG
make a more efficient use of the critical resources located at
forms clusters. During the response phase, CAG transmits
the sensor nodes, without decreasing the communication
the value of the aggregated data within the cluster to the BS.
functionalities, but creating more intelligent clusters,
CAG achieves efficient in-network storage and processing
minimizing the maximum number of nodes in a cluster, and
by allowing a unified mechanism between query routing
minimizing clusters with only a single node (the CH). In
(networking) and query processing (application). Instead of
this paper we provide a comparison between different
gathering and compressing all the data, CAG generates
clustering algorithms and protocols in WSN. This
synopsis by filtering out insignificant elements in data
comparison provides a classification that can be used when
streams to minimize response time, storage, computation,
deciding which clustering technique to use when
and communication costs. CAG is a lossy clustering
implementing other mechanisms, like routing, involved in
algorithm because it uses only sensor values from the
WSN.
cluster heads to compute the aggregates.
Updated CAG algorithm [21] is an improvement to the References
CAG algorithm, where the clusters are still formed from
nodes sensing similar values within a given threshold, but in [1] Akyildiz I.F., Su W., Sankarasubramanian, Cayirci E.,
this case, the clusters remain unchanged as long as the “Wireless Sensor Networks: A Survey”, Georgia Tech
sensor values stay within a given threshold over time Technical Report, December 2001.
(temporal correlation). This fixed range clustering ensures [2] Al-Karaki J.N., Kamal A.E., “Routing Techniques in
that the performance of CAG become independent of the Wireless Sensor Networks: A Survey”, Department of
magnitude of sensor readings and network topology. When Electrical and Computer Engineering, Iowa State
used in the interactive mode, the protocol alternates query University, December 2004.
and response phases. This is appropriate for scenarios [3] Aurenhammer F., “Voronoi Diagrams - A Survey Of A
Fundamental Geometric Data Structure”, ACM
where network topology and data change dynamically, or
Computing Surveys, col. 23, pp. 345- 405, September
the users change the approximation granularity or query
1991.
attributes over time. In this scenario, a new forwarding tree [4] Chan H., Perrig A., “ACE: An Emergent Algorithm for
is built each time a query is sent out. This frequently Highly Uniform Cluster Formation”, Proceedings of
rebuilding the tree can be wasteful if the sensed data is the First European Workshop on Sensor Networks
almost the same over time. The streaming mode adjusts the (EWSN), January 2004.
clusters locally as the data and topology change over time.
1791
[5] Chen WP., Hou J. C., Sha L. , “Dynamic Clustering [14] Manjeshwar A., Agrawal D.P., “APTEEN: A Hybrid
for Acoustic Target Tracking in Wireless Sensor Protocol for Efficient Routing and Comprehensive
Networks”, 11th IEEE International Conference on Information Retrieval in Wireless Sensor Networks”,
Network Protocols (ICNP'03), pp. 284-294, 2003. Proceedings of the International Parallel and
[6] Fang Q., Zhao F., Guibas L., “Lightweight Sensing and Distributed Processing Symposium, 2002.
Communication Protocols for Target Enumeration and [15] Raghavendra C.S., Sivalingham K.M., Znatti T.F.,
Aggregation”, Proceedings of the 4th ACM “Wireless Sensor Networks”, Kluwer Academic
International Symposium on Mobile Ad Hoc Publishers, 2004.
Networking and Computing (MOBIHOC), pp. 165-176, [16] Soro S., Heinzelman W.B., “Prolonging the Lifetime of
2003. Wireless Sensor Networks via Unequal Clustering”,
[7] Heinzelman W.B., “Application Specific Protocol Proceedings of the 5th International Workshop on
Architectures for Wireless Networks”, PhD Algorithms for Wireless, Mobile, Ad Hoc and Sensor
dissertation, Massachusetts Institute of Technology, Networks (IEEE WMAN '05), April 2005.
June 2000. [17] Virrankoski R., Savvides A., “TASC: Topology
[8] Heinzelman W., Chandrakasan A., Balakrishnan H., Adaptive Clustering for Sensor Networks”,
“Energy-Efficient Communication Protocol for Proceedings of the Second IEEE International
Wireless Microsensor Networks”, Proceedings of the Conference on Mobile Ad-Hoc and Sensor Systems,
33rd Hawaii International Conference on System (MASS 2005), Washington DC, November 2005.
Sciences, January 2000. [18] Wang K., Abu-Ayyash S., Little T.D.C., Basu P.,
[9] Ibriq J., Mahgoub I., “Cluster-Based Routing in “Attribute-Based Clustering for Information
Wireless Sensor Networks: Issues and Challenges”, Dissemination in Wireless Sensor Networks”, Proc.
Proceedings of the 2004 Symposium on Performance 2nd Annual IEEE Communications Society Conf. on
Evaluation of Computer Telecommunication Systems, Sensor and Ad Hoc Communications and Networks
2004. (SECON 2005), Santa Clara, CA, September 2005.
[10] Intanagonwiwat C., Govindan R., Estrin D., “Directed [19] Ye M., Li C., Chen G., Wu J., “EECS: An Energy
diffusion: A scalable and robust communication Efficient Clustering Scheme in Wireless Sensor
paradigm for sensor networks”, Proceedings of the Networks”, National Laboratory of Novel Software
Sixth Annual International Conference on Mobile Technology, Nanjing University – China, Department
Computing and Networking (MobiCOM '00), Boston, of Computer Science and Engineering, Florida Atlantic
Massachussetts, August 2000. University, USA, 2005.
[11] Liu C., Wu K., Pei J., “A Dynamic Clustering and [20] Yoon S., Shahabi C., “Exploiting Spatial Correlation
Scheduling Approach to Energy Saving in Data Towards an Energy Efficient Clustered AGgregation
Collection from Wireless Sensor Networks”, Second Technique (CAG)”, IEEE International Conference on
Annual IEEE Communications Society Conference on Communications, pp. 82-98, 2005.
Sensor and Ad Hoc Communications and Networks [21] Yoon S., Shahabi C., “An Experimental Study of the
(SECON 05), California, September 2005. Effectiveness of Clustered AGgregation (CAG)
[12] Luo J., Hubaux J-P., “Joint Mobility and Routing for Leveraging Spatial and Temporal Correlations in
Lifetime Elongation in Wireless Sensor Networks”, Wireless Sensor Networks", submitted to ACM
IEEE INFOCOM 2005, Miami, March 2005. Transactions on Sensor Networks. USC (University of
[13] Manjeshwar A., Agrawal D.P., “TEEN: A Routing Southern California) Computer Science Department
Protocol for Enhanced Efficiency in Wireless Sensor Technical Report 05-869, August 2005.
Networks”, Proceedings of the 15th International [22] Younis O., Fahmy S., “HEED: A hybrid, Energy-
Parallel and Distributed Processing Symposium, San Efficient, Distributed Clustering Approach for Ad Hoc
Francisco, 2001. Sensor Networks”, IEEE Transactions Mobile
Computing, vol. 3, pp. 366-379, June 2004.
1792