Grid Clustering and Routing Protocol in Heterogeneous Wireless Sensor Networks (Short Paper)

  • Zheng Zhang
  • Pei Hu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 268)


In wireless sensor network, sensor nodes usually use batteries to provide energy, and energy consumption have very strict restrictions. High demands about the efficient use of energy are put forward. However typical multi to one communication mode in the wireless sensor network will lead to the uneven consumption of sensor nodes in the whole network. So it will greatly shorten the lifecycle of the entire network. As for this problem this paper optimize the model of heterogeneous chessboard clustering of sensor network and propose a grid clustering mechanism and propose an effective node routing protocol to achieve the goal of prolonging the network lifecycle by balancing the energy consumption of nodes. Simulation experiments show that the grid clustering protocol greatly improves the lifecycle of wireless sensor networks and has better performance compared with LEACH and LRS.


Grid clustering Routing protocol Heterogeneous Sensor network 


  1. 1.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 52–61 (2003)Google Scholar
  2. 2.
    Jolly, G., Kuscu, M.C., Kokate P., et al.: A low-energy key management protocol for wireless sensor networks. In: Proceedings of the 8th IEEE Symposium on Computer and Communications, pp. 335–340 (2003)Google Scholar
  3. 3.
    Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Wireless Sensor Networks. In: IEEE International Conference on Performance Computing and Communications, pp. 813–818 (2004)Google Scholar
  4. 4.
    Li, J.H., Levy, R., Yu, M.: A scalable key management and clustering scheme for ad hoc networks. In: INFOSCALE 2006, pp. 1–10 (2006)Google Scholar
  5. 5.
    Cheng, B., Sungha, D.: Reduce radio energy consumption of key management protocol forwireless sensor networks. In: ISLPED 2004, Newport Beach, California, US. ACM Press (2004)Google Scholar
  6. 6.
    Benenson, Z., et al.: Realizing robust user anthentication in sensor networks. In: Workshop on Real-World Wireless Sensor Networks, Stockholm, pp. 135–142 (2005)Google Scholar
  7. 7.
    Wang, H., et al.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secure. Network. 1(3), 127–137 (2006)CrossRefGoogle Scholar
  8. 8.
    Li, X., Lin, Y., Yang, S., Yi, Y., Yu, J., Lu, X.: A key distribution scheme based on public key cryptography for sensor networks. In: Wang, Y., Cheung, Y.-M., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 725–732. Springer, Heidelberg (2007). Scholar
  9. 9.
    Wander, A., Gura, N., Eberle, H., Gupta, V., Chang, S.: Energy analysis for public key cryptography for wireless sensor networks. In: Proceedings of the IEEE PERCOM 2005, pp. 324-328 (2005)Google Scholar
  10. 10.
    Joux, A.: An one round protocol for tripartite Die-Hellman. In: Proceedings of the ANTS4. LNCS, vol. 1838, pp. 385–394 (2000)Google Scholar
  11. 11.
    Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing sensor networks with location based keys. In: IEEEWCNC05, pp. 1909–1914 (2005)Google Scholar
  12. 12.
    Syed, M.K.U.R.R., Lee, H., Lee, S., et al.: MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor network. Ann. Telecommun. 35(2), 101–116 (2010)CrossRefGoogle Scholar
  13. 13.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002). Scholar
  14. 14.
    Yarvis, M., Kushalnagar, N., Singh, H., et al.: Exploiting heterogeneity in sensor networks. In: Proceedings of the IEEE INFOCOM 2005, Miami, FL, March 2005Google Scholar
  15. 15.
    Savvides, A., Han, C., Strivastava, M.: Dynamic fine-grained localization in ad-hoc network of sensors. In: Proceedings of the ACM MOBICOM 2001, pp. 166–179 (2001)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Zheng Zhang
    • 1
  • Pei Hu
    • 1
  1. 1.College of SoftwareNanyang Institute of TechnologyNanyangChina

Personalised recommendations