Analysis of LEACH protocol(s) using formal verification
WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our...
Saved in:
| Published in | 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) pp. 254 - 262 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.01.2015
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2151-1403 |
| DOI | 10.1109/IBCAST.2015.7058513 |
Cover
| Abstract | WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our matter is the LEACH protocol. The LEACH protocol is self-organizing and is characterized as an adaptive clustering protocol which uses randomly distributes energy load among nodes. By using cluster heads and data aggregation excessive energy consumption is avoided. In this paper we analyzed LEACH and its extensions like LEACH-C and LEACH-F using Formal modeling techniques. Formal modeling is often used by researchers these days to verify a variety of routing protocols. By using formal verification one can precisely confirm the authenticity of results and worst case scenarios, a solution not possible using computer simulations and hardware implementation. In this paper, we have applied formal verification to compare how efficient LEACH is as compared to its extensions in various WSN topologies. The paper is not about design improvement of LEACH but to formally verify its correctness, efficiency and performance as already stated. This work is novel as LEACH and its extensions according to our knowledge have not been analyzed using formal verification techniques. |
|---|---|
| AbstractList | WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our matter is the LEACH protocol. The LEACH protocol is self-organizing and is characterized as an adaptive clustering protocol which uses randomly distributes energy load among nodes. By using cluster heads and data aggregation excessive energy consumption is avoided. In this paper we analyzed LEACH and its extensions like LEACH-C and LEACH-F using Formal modeling techniques. Formal modeling is often used by researchers these days to verify a variety of routing protocols. By using formal verification one can precisely confirm the authenticity of results and worst case scenarios, a solution not possible using computer simulations and hardware implementation. In this paper, we have applied formal verification to compare how efficient LEACH is as compared to its extensions in various WSN topologies. The paper is not about design improvement of LEACH but to formally verify its correctness, efficiency and performance as already stated. This work is novel as LEACH and its extensions according to our knowledge have not been analyzed using formal verification techniques. |
| Author | Saghar, K. Ihsan, A. Fatima, T. |
| Author_xml | – sequence: 1 givenname: A. surname: Ihsan fullname: Ihsan, A. organization: NUST, Islamabad, Pakistan – sequence: 2 givenname: K. surname: Saghar fullname: Saghar, K. organization: CESAT, Islamabad, Pakistan – sequence: 3 givenname: T. surname: Fatima fullname: Fatima, T. organization: NUST, Islamabad, Pakistan |
| BookMark | eNotz71OwzAUQGEjFYm29Am6eIQh4d74fwxRSytFYqDMlZ3ayCiNqzgg9e0Z6HS2TzoLMhvS4AlZI5SIYF72r039cSgrQFEqEFoguyML5MoYyaSBGZlXKLBADuyBrHL-BgA0ArSBOVH1YPtrjpmmQNtN3ezoZUxT6lL_lJ_pT47DFw1pPNue_voxhtjZKabhkdwH22e_unVJPrebQ7Mr2ve3fVO3RUQlpqJizCgLzungbMc7G5g2jJvOOhSeaa_9KTDDpRJCOllVimvrg3dSCKXMiS3J-t-N3vvjZYxnO16Pt0_2B9ZqSA8 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/IBCAST.2015.7058513 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1479963690 9781479963690 |
| EndPage | 262 |
| ExternalDocumentID | 7058513 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-23397a0bb8fbac4caf389349cab15e38e8edf39467556b622748aefeb655779d3 |
| IEDL.DBID | RIE |
| ISSN | 2151-1403 |
| IngestDate | Wed Aug 27 02:09:47 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-23397a0bb8fbac4caf389349cab15e38e8edf39467556b622748aefeb655779d3 |
| PageCount | 9 |
| ParticipantIDs | ieee_primary_7058513 |
| PublicationCentury | 2000 |
| PublicationDate | 2015-Jan. |
| PublicationDateYYYYMMDD | 2015-01-01 |
| PublicationDate_xml | – month: 01 year: 2015 text: 2015-Jan. |
| PublicationDecade | 2010 |
| PublicationTitle | 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) |
| PublicationTitleAbbrev | IBCAST |
| PublicationYear | 2015 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001950890 ssj0001967859 |
| Score | 1.6542848 |
| Snippet | WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 254 |
| SubjectTerms | Formal Modeling Formal verification IP networks Protocol Verification Hierarchal Networks Routing Protocol Routing protocols Wireless sensor networks Wireless Sensor Networks (WSN) |
| Title | Analysis of LEACH protocol(s) using formal verification |
| URI | https://ieeexplore.ieee.org/document/7058513 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nWDho0V8ywMDSDhN6jhxxlK1KogiJFqpW2UnNkJFDYJ04dfjc9IWEANbkiFyciff8927dwAX9sxjPacjqLTwk4ZGcqp4IilTNrgHIfe1wjzk6CEaTsK7KZ_W4HrdC6O1duQz7eGlq-VnebrEVFk79rGIxepQj0VU9mpt8ik4zrSq-JT3dht2s9IwqFGUpatEhwI_ad_e9LpPY2R2ca9664_xKi66DHZgtFpXSSqZe8tCeennL8nG_y58F1qbPj7yuI5Qe1DTi33Y_iZB2IR4pUpCckPu-93ekKB0Q2794_LjiiAt_pk4YPtKrNcjscjZsgWTQX_cG9JqmAJ9sQihoB1mkYf0lRJGyTRMpUGoEiapVAHXTGihM8MSu29yHqmoY0-rQmqjVcR5HCcZO4DGIl_oQyAmkCxBGZ8oDUOeWcwZK4Fs5kwEQcrNETTxF8zeSr2MWfX1x38_PoEtNEOZ1jiFRvG-1Gc20Bfq3Fn4C2vhogU |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YMHTdzS0t0-jkggRYGYCAk3stvuEqOhRsvFX-9OW0CNB29tD822M9n5duabbwCuzJnHeE4zoMLAT8q04FTyUFBXmuDuMG4riXnIwdCLxux-wicVuF31wiilcvKZsvAyr-UnabzAVFnDt7GI5W7AJmeM8aJba51RwYGmZc2nuDcbcT4tDcMaRWG6UnbIscNG767dehoht4tb5Xt_DFjJ40t3FwbLlRW0khdrkUkr_vwl2vjfpe9Bfd3JRx5XMWofKmp-ADvfRAhr4C91SUiqSb_TakcExRtS4yHXHzcEifEzkkPbV2L8HqlFuTXrMO52Ru2IluMU6LPBCBltugZ7CFvKQEsRs1hoBCssjIV0uHIDFahEu6HZOTn3pNc059VAKK2kx7nvh4l7CNV5OldHQLQj3BCFfLzY2CExqNOXAfKZk8BxYq6PoYa_YPpWKGZMy68_-fvxJWxFo0F_2u8NH05hG01SJDnOoJq9L9S5CfuZvMit_QUfO6VS |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+12th+International+Bhurban+Conference+on+Applied+Sciences+and+Technology+%28IBCAST%29&rft.atitle=Analysis+of+LEACH+protocol%28s%29+using+formal+verification&rft.au=Ihsan%2C+A.&rft.au=Saghar%2C+K.&rft.au=Fatima%2C+T.&rft.date=2015-01-01&rft.pub=IEEE&rft.issn=2151-1403&rft.spage=254&rft.epage=262&rft_id=info:doi/10.1109%2FIBCAST.2015.7058513&rft.externalDocID=7058513 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2151-1403&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2151-1403&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2151-1403&client=summon |