Analysis of LEACH protocol(s) using formal verification

WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our...

Full description

Saved in:
Bibliographic Details
Published in2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) pp. 254 - 262
Main Authors Ihsan, A., Saghar, K., Fatima, T.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.01.2015
Subjects
Online AccessGet full text
ISSN2151-1403
DOI10.1109/IBCAST.2015.7058513

Cover

Abstract WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our matter is the LEACH protocol. The LEACH protocol is self-organizing and is characterized as an adaptive clustering protocol which uses randomly distributes energy load among nodes. By using cluster heads and data aggregation excessive energy consumption is avoided. In this paper we analyzed LEACH and its extensions like LEACH-C and LEACH-F using Formal modeling techniques. Formal modeling is often used by researchers these days to verify a variety of routing protocols. By using formal verification one can precisely confirm the authenticity of results and worst case scenarios, a solution not possible using computer simulations and hardware implementation. In this paper, we have applied formal verification to compare how efficient LEACH is as compared to its extensions in various WSN topologies. The paper is not about design improvement of LEACH but to formally verify its correctness, efficiency and performance as already stated. This work is novel as LEACH and its extensions according to our knowledge have not been analyzed using formal verification techniques.
AbstractList WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our matter is the LEACH protocol. The LEACH protocol is self-organizing and is characterized as an adaptive clustering protocol which uses randomly distributes energy load among nodes. By using cluster heads and data aggregation excessive energy consumption is avoided. In this paper we analyzed LEACH and its extensions like LEACH-C and LEACH-F using Formal modeling techniques. Formal modeling is often used by researchers these days to verify a variety of routing protocols. By using formal verification one can precisely confirm the authenticity of results and worst case scenarios, a solution not possible using computer simulations and hardware implementation. In this paper, we have applied formal verification to compare how efficient LEACH is as compared to its extensions in various WSN topologies. The paper is not about design improvement of LEACH but to formally verify its correctness, efficiency and performance as already stated. This work is novel as LEACH and its extensions according to our knowledge have not been analyzed using formal verification techniques.
Author Saghar, K.
Ihsan, A.
Fatima, T.
Author_xml – sequence: 1
  givenname: A.
  surname: Ihsan
  fullname: Ihsan, A.
  organization: NUST, Islamabad, Pakistan
– sequence: 2
  givenname: K.
  surname: Saghar
  fullname: Saghar, K.
  organization: CESAT, Islamabad, Pakistan
– sequence: 3
  givenname: T.
  surname: Fatima
  fullname: Fatima, T.
  organization: NUST, Islamabad, Pakistan
BookMark eNotz71OwzAUQGEjFYm29Am6eIQh4d74fwxRSytFYqDMlZ3ayCiNqzgg9e0Z6HS2TzoLMhvS4AlZI5SIYF72r039cSgrQFEqEFoguyML5MoYyaSBGZlXKLBADuyBrHL-BgA0ArSBOVH1YPtrjpmmQNtN3ezoZUxT6lL_lJ_pT47DFw1pPNue_voxhtjZKabhkdwH22e_unVJPrebQ7Mr2ve3fVO3RUQlpqJizCgLzungbMc7G5g2jJvOOhSeaa_9KTDDpRJCOllVimvrg3dSCKXMiS3J-t-N3vvjZYxnO16Pt0_2B9ZqSA8
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IBCAST.2015.7058513
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1479963690
9781479963690
EndPage 262
ExternalDocumentID 7058513
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-23397a0bb8fbac4caf389349cab15e38e8edf39467556b622748aefeb655779d3
IEDL.DBID RIE
ISSN 2151-1403
IngestDate Wed Aug 27 02:09:47 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-23397a0bb8fbac4caf389349cab15e38e8edf39467556b622748aefeb655779d3
PageCount 9
ParticipantIDs ieee_primary_7058513
PublicationCentury 2000
PublicationDate 2015-Jan.
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-Jan.
PublicationDecade 2010
PublicationTitle 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
PublicationTitleAbbrev IBCAST
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001950890
ssj0001967859
Score 1.6542848
Snippet WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize...
SourceID ieee
SourceType Publisher
StartPage 254
SubjectTerms Formal Modeling
Formal verification
IP networks
Protocol Verification Hierarchal Networks
Routing Protocol
Routing protocols
Wireless sensor networks
Wireless Sensor Networks (WSN)
Title Analysis of LEACH protocol(s) using formal verification
URI https://ieeexplore.ieee.org/document/7058513
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nWDho0V8ywMDSDhN6jhxxlK1KogiJFqpW2UnNkJFDYJ04dfjc9IWEANbkiFyciff8927dwAX9sxjPacjqLTwk4ZGcqp4IilTNrgHIfe1wjzk6CEaTsK7KZ_W4HrdC6O1duQz7eGlq-VnebrEVFk79rGIxepQj0VU9mpt8ik4zrSq-JT3dht2s9IwqFGUpatEhwI_ad_e9LpPY2R2ca9664_xKi66DHZgtFpXSSqZe8tCeennL8nG_y58F1qbPj7yuI5Qe1DTi33Y_iZB2IR4pUpCckPu-93ekKB0Q2794_LjiiAt_pk4YPtKrNcjscjZsgWTQX_cG9JqmAJ9sQihoB1mkYf0lRJGyTRMpUGoEiapVAHXTGihM8MSu29yHqmoY0-rQmqjVcR5HCcZO4DGIl_oQyAmkCxBGZ8oDUOeWcwZK4Fs5kwEQcrNETTxF8zeSr2MWfX1x38_PoEtNEOZ1jiFRvG-1Gc20Bfq3Fn4C2vhogU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YMHTdzS0t0-jkggRYGYCAk3stvuEqOhRsvFX-9OW0CNB29tD822M9n5duabbwCuzJnHeE4zoMLAT8q04FTyUFBXmuDuMG4riXnIwdCLxux-wicVuF31wiilcvKZsvAyr-UnabzAVFnDt7GI5W7AJmeM8aJba51RwYGmZc2nuDcbcT4tDcMaRWG6UnbIscNG767dehoht4tb5Xt_DFjJ40t3FwbLlRW0khdrkUkr_vwl2vjfpe9Bfd3JRx5XMWofKmp-ADvfRAhr4C91SUiqSb_TakcExRtS4yHXHzcEifEzkkPbV2L8HqlFuTXrMO52Ru2IluMU6LPBCBltugZ7CFvKQEsRs1hoBCssjIV0uHIDFahEu6HZOTn3pNc059VAKK2kx7nvh4l7CNV5OldHQLQj3BCFfLzY2CExqNOXAfKZk8BxYq6PoYa_YPpWKGZMy68_-fvxJWxFo0F_2u8NH05hG01SJDnOoJq9L9S5CfuZvMit_QUfO6VS
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+12th+International+Bhurban+Conference+on+Applied+Sciences+and+Technology+%28IBCAST%29&rft.atitle=Analysis+of+LEACH+protocol%28s%29+using+formal+verification&rft.au=Ihsan%2C+A.&rft.au=Saghar%2C+K.&rft.au=Fatima%2C+T.&rft.date=2015-01-01&rft.pub=IEEE&rft.issn=2151-1403&rft.spage=254&rft.epage=262&rft_id=info:doi/10.1109%2FIBCAST.2015.7058513&rft.externalDocID=7058513
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2151-1403&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2151-1403&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2151-1403&client=summon