SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7203 33
FUZZY BASED CLUSTERING AND ENERGY EFFICIENT
ROUTING FOR UNDERWATER WIRELESS SENSOR
NETWORKS
Sihem Souiki1
, Mourad Hadjila1
and Mohammed Feham1
1
Department of Telecommunication, Tlemcen University, Algeria.
ABSTRACT
Underwater Wireless Sensor Network (UWSN) is a particular kind of sensor networks which is
characterized by using acoustic channels for communication. UWSN is challenged by great issues specially
the energy supply of sensor node which can be wasted rapidly by several factors. The most proposed
routing protocols for terrestrial sensor networks are not adequate for UWSN, thus new design of routing
protocols must be adapted to this constrain. In this paper we propose two new clustering algorithms based
on Fuzzy C-Means mechanisms. In the first proposition, the cluster head is elected initially based on the
closeness to the center of the cluster, then the node having the higher residual energy elects itself as a
cluster head. All non-cluster head nodes transmit sensed data to the cluster head. This latter performs data
aggregation and transmits the data directly to the base station. The second algorithm uses the same
principle in forming clusters and electing cluster heads but operates in multi-hop mode to forward data
from cluster heads to the underwater sink (uw-sink). Furthermore the two proposed algorithms are tested
for static and dynamic deployment. Simulation results demonstrate the effectiveness of the proposed
algorithms resulting in an extension of the network lifetime.
KEYWORDS
UWSN, Routing, Clustering, Fuzzy C-Means, Energy efficiency
1.INTRODUCTION
In recent years, underwater wireless sensor network has emerged as a powerful technique in order
to discover and exploit this harsh environment. As over 70% of the earth’s surface is covered by
water, it is advantageous to deploy underwater sensor networks to support several categories of
applications such as oceanographic data collection, pollution monitoring, offshore exploration,
disaster prevention, assisted navigation and tactical surveillance applications [1]. To make these
applications viable, there is a need to enable underwater communications among underwater
devices. The underwater communication may include the transmission of information in three
forms (sound, electromagnetic (EM), or optical waves). Each of these techniques has advantages
and drawbacks. Electromagnetic signals deliver very poor performance underwater, providing
transmission ranges of only a few meters at the typical RF sensor transmission power. Optical
communication for underwater sensor networks using light waves has also been investigated;
however these methods either require high precision or high power if the distances between
sensor nodes are large. Consequently, acoustic networks enabled by sound waves become ideal
alternatives since acoustic signals propagate well through water and require much less power than
RF and light signals for the same communication range [2].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
34
An underwater sensor network is usually formed by several autonomous and individual sensor
nodes used to collect and forward data to the uw-sink. The most important challenges of
deploying such a network are the cost, the computational power, the memory, the communication
range and most of all the limited battery resources of each sensor node. The lifetime of UWSN is
largely restricted because the number of sensor nodes that stop working due to the energy wastage
increases with a deployment time. Then the high energy consumption is particularly significant
defy for researchers to achieve long operating time without affecting system performance.
Generally routing is the backbone for any network, and routing protocols are considered to be in
charge for discovering and maintaining the routes. Most of the proposed protocols for terrestrial
sensor networks cannot be immediately used in UWSN owing to the continuous exchange of
overhead messages applied (proactive ad hoc routing) or the route discovery process based on the
flooding technique (reactive ad hoc routing) although the major protocols are designed for a
stationary deployment, thus these solutions are ineffective in large scale UWSN because they
exhaust energy and bandwidth resources. Therefore new energy efficient protocols must be
designed for UWSN.
In this paper we present a hierarchical fuzzy based energy efficient routing algorithms where the
clusters are formed by the Fuzzy C-Means method. The nodes are deployed randomly in three
dimensional environments. The first proposed algorithm employs a single hop transmission
between cluster heads and the uw-sink. Whereas the second proposition uses the multihop
transmission between cluster heads and uw-sink; both algorithms are simulated for static and
dynamic topologies.
The remainder of the paper is organized as follows. In section 2, a related work on hierarchical
routing in both terrestrial and underwater wireless sensor networks are presented. Section 3 gives
a detail description of our routing algorithms simulated in static and dynamic topologies. Section
4 shows the simulations results. Finally, the last section concludes the paper.
2. RELATED WORKS
Energy saving is a primordial issue in UWSNs because sensor nodes are supplied by batteries,
which are difficult to replace or recharge in hostile underwater environments. Designing robust,
scalable and energy aware routing protocols in this kind of networks is a fundamental research
challenge. In the ground based wireless sensor networks, numerous routing protocols have been
developed which can be divided into following classes according to deployment: flat,
geographical, and hierarchal routing. In a flat topology, all nodes perform the same tasks and have
the same functionalities in the network. Data transmission is performed by flooding in hop by hop
manner. Flooding [3], Gossiping [4] and SPIN [5] are example of flat routing protocols. The
second class is based on the position information of each node to determine forwarding path. The
typical geographic routing protocols in WSNs include [6,7].Owing to satisfy the scalability aim
and extending network lifetime in WSN, grouping nodes into clusters has been widely adopted by
the research community. The hierarchical routing protocols involve cluster-based structure of the
sensor nodes. Generally, each cluster constitutes a leader referred to as cluster head (CH) usually
performs the special tasks (fusion and aggregation) and other member nodes (collection of data
and monitoring). The first clustering routing protocol proposed for WSNs includes Low-energy
Adaptive Clustering Hierarchy (LEACH) [8]. The key idea of this protocol is to select randomly a
set of sensor nodes as cluster head and rotate this task to uniformly distribute the energy load
among the nodes in the network. There are two phases of LEACH protocol: The setup and steady
phases. Firstly, in the setup phase clusters are formed and the cluster head (CH) selection is
performed by the member nodes. Secondly the cluster head (CH) compress the gathered data
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
35
from diverse nodes that belong to the respective cluster. Then the cluster head forwards
aggregated data to the base station by single hop communication. Multiple variants of LEACH
protocol are proposed to overcome some drawbacks of this protocol such as: LEACH-C [9], MR-
LEACH [10] and HEED [11].
However, these protocols are not appropriate for UWSNs because they assume that the sensor
network is stationary and they are not well adapted to the intrinsic properties of underwater
environments, such as long propagation delays, low data rates and difficulty of synchronization.
On the other hand, some hierarchical routing protocols have been designed for UWSN such as
Ducs [12], Mccp [13] and HydroCast [14].
DUCS protocol is designed for long-term non-time critical applications where the sensor nodes
are grouped into clusters using a distributed algorithm. The protocol operates in two stages: the
first stage containing the clusters formation and the selection of the cluster head based on the
remaining energy. In addition a randomized rotation of CH is performed among different nodes
within a cluster in order to alleviate fast draining of the sensor node energy. In the second stage
the data are transmitted to the sink using multi-hop routing through other cluster heads.
In MCCP protocol (Minimum Cost Clustering Protocol), the clusters are created based on a cost
metric. The cost metric is calculated on the basis of three important parameters: (1) the total
energy consumption of the cluster members for sending data to the cluster head; (2) the residual
energy of the cluster head and its cluster members; and (3) the relative location between the
cluster head and the uw-sink. The proposed protocol selects a set of non-overlapping clusters
from all potential clusters based on the cost metric affected to each potential cluster and attempts
to reduce the cost of the selected clusters. MCCP can adapt geographical cluster head distribution
to the traffic pattern in the network and thus avoid the formation of hot spots around the uw-sink.
It can also balance the traffic load between cluster heads and cluster members through periodical
re-clustering the sensor nodes in the network.
The global idea of HydroCast is based on a routing decision which is made after comparing the
local pressure or depth information, such that data packets are greedily forwarded towards a node
with the lowest pressure level among the neighbor nodes. In HydroCast scheme, each local
maximum node maintains a recovery route towards a neighboring node with higher depth than
itself. After one or several forwarding’s through local maxima, a data packet can be routed out of
the void region and can be switched back to the greedy mode.
3. THE PROPOSED ALGORITHMS
In the following, we briefly introduce the basic theory of Fuzzy C-Means (FCM) used in cluster
formation of our propositions, and then we give a detailed description of the proposed
approaches.
3.1. Basic theory of Fuzzy C-Means
Fuzzy C-Means clustering algorithm [15], is a kind of clustering algorithm using membership to
describe the possibility of cluster. However FCM is a local optimization algorithm, which is very
sensitive to initialization and gets into the local minimum value easily.
The finite vectors xi (i=1, 2,…, n) are divided into c (1<c<n) classes, and the clustering center of
each class is solved to make membership minimum as the non-similarity index.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
36
The objective function can be defined as follows:
JሺU, cଵ, cଶ … cୡሻ = ෍ ෍ U	୧୨
୫
୬
୨
ୡ
୧ୀଵ
d	୧୨
ଶ
																		ሺ1ሻ
Where Uij is the membership of the group, ci is the clustering center; dij is the special distance
from vector ci to xj. m is the weighted index.
The steps of algorithm are as the following:
• Initializing the membership matrix U to make it satisfy the following formula.
෍ U୧୨ =
ୡ
୧ୀଵ
	1, ∀j = 1, … , n																																	ሺ2ሻ
• Calculating the clustering center using the following formula.
c୧ =
∑ U୧୨		
୫
x୨
୬
୨ୀଵ
∑ U୧୨		
୫୬
୨ୀଵ
																																																																		ሺ3ሻ
• Calculating the objective function according to the formula (1). If the objective function is
less than a threshold or the relative value function change value last time is less than a
threshold, the algorithm stops.
• Updating the matrix by the following formula and returning to step2.
U୧୨ =	෍ሺ
d୧୨
d୩୨
ሻ
ିଶ
୫ିଵൗ
ୡ
୩ୀଵ
																																																							ሺ4ሻ
3.2. Single-Hop Fuzzy based Energy Efficient Routing algorithm for UWSN (SH-
FEER):
SH-FEER is a fuzzy based energy efficient algorithm where clusters are formed by using the
Fuzzy C-Means method. We suppose that underwater sensor nodes always have data to be sent to
the sink and the set of nodes have the same amount of energy [16].
We assume in this approach that the nodes organize themselves inside clusters randomly with
unequal sizes and one node is selected as a cluster-head for each cluster. All non-cluster head
nodes forward their data to their cluster head via a single hop; the cluster-head node receives data
from all cluster members, performs signal processing functions on the data (e.g. aggregation) and
transmits the data to the sink using single-hop routing. The cluster heads are responsible for
coordination among nodes within their clusters (intra-cluster coordination) and communication
between each other (inter-cluster coordination).
SH-FEER incorporates rotation of the cluster-head among the sensors to avoid rapid draining of
the batteries of specific underwater sensors. In this way, the energy consumption is distributed.
The operation mode of SH-FEER is composed to three phases: clusters formation during the first
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
37
step and secondly the cluster head are selected. Initially, the closest node to the center is selected
as cluster head and in the next rounds the selection is based on the residual energy of each node;
the third step is the transmission of data towards the sink.
The algorithm of this first proposition is mentioned as follows:
Step 1: Clusters formation
Apply FCM algorithm to form clusters.
- Each cluster K(i) contains a number of nodes, i=1, …, N
- Initially all nodes have the same amount of energy.
Step 2: Cluster head selection
maxE=zeros(1,N) ;
maxE is a row vector contains N zeros
R_max: maximum number of rounds
TE: total energy of network
while(R≤R_max || TE>0)
for i = 1 to N do
if R==1
-calculate the distance d (nodei ,center) // between nodei and center of cluster.
-Assign ICH (i) of the cluster in which d(nodei , center) is minimum.
else
for j=1 to length(k(i)) do
ifmaxE(i)<k(i).E(j)
maxE(i)=k(i).E(j)
end if
end for
CH(i)=maxE(i)
end if
end for
Step 3: Data transmission
• Intra_cluster transmission
for i = 1 to N do
for j=1 to length(k(i)) do
k(i).j send data to CH(i)
end for
end for
• Transmission from CHs to the uw-sink
for i = 1 to N do
CH(i) aggregates and forwards directly the data to uw-sink
end for.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
38
3.3. Multi-Hop Fuzzy based Energy Efficient Routing algorithm for UWSN (MH-
FEER):
MH-FEER mimics the first proposed algorithm; it uses the same two first phases of SH-FEER
(clusters formation and cluster head selection). However the process of data forwarding toward
the uw-sink is different by using multi-hop routing between cluster heads and uw-sink. The data
are transferred through multiple cluster-heads in the direction of the uw-sink choosing the shortest
path; this is repeated until it reaches the uw-sink.
Since the mode of clusters formation and the cluster heads selection is the same as the first
algorithm, we present below only the pseudo-code relating to the data forwarding from the cluster
heads to uw-sink.
Calculation of distances between CHs and distances between CHs and uw-sink
For i=1 to N
For j=1 to N do
dሺi, jሻ = ට൫x୧ − x୨൯
ଶ
+ ൫y୧ − y୨൯
ଶ
+ ൫z୧ − z୨൯
ଶ
d୳୵ିୱ୧୬୩ሺiሻ = ඥሺx୧ − x୳୵ିୱ୧୬୩ሻଶ + ሺy୧ − y୳୵ିୱ୧୬୩ሻଶ + ሺz୧ − z୳୵ିୱ୧୬୩ሻଶ
end for
for i=1 to N do
ifduw-sink (i)== Min duw-sink
CH(i) sends directly to uw-sink
else
for j=1 to N do
if(i≠j&& d(i,j)==min(i) &&d uw-sink (i) > d uw-sink (j))
CH(i) sends data to CH(j)
end if
end for
end if
end for
4. PERFORMANCE EVALUATION
In this section, we evaluate the performance of the proposed algorithms through extensive
simulations under Matlab environment. Firstly, we define the performance metrics and the
simulation methodology, and then we present the energy model used. Moreover we evaluate how
network parameters such as node density, node mobility affect the performance of the proposed
algorithms.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
39
4.1. Metrics and Methodology
4.1.1. Metrics
In this paper two metrics are used to analyze the performance of the proposed algorithms: total
energy consumption and the number of alive nodes
(i) Total energy consumption ET: is the sum of energy amount consumed by the all sensor
nodes formed the networks
E(i)consumed = E(i)initial-E(i)residual
ETconsumed = ∑ Eሺiሻ୒
୧ୀଵ ୡ୭୬ୱ୳୫ୣୢ
(ii) Number of alive nodes: is the number of sensor nodes where the energy is different to 0
during (r) rounds.
4.1.2. Simulation Methodology
In our simulation we make some assumptions then we present the energy model used.
• Assumptions
- Sensor nodes as well as the uw-sink are stationary after being deployed in the field.
- The network is considered homogeneous and all of the sensor nodes have the same initial
energy.
- Each sensor node knows its own geographical position.
- The underwater sink is not limited in terms of energy, memory and computational power.
- Underwater sink is located outside the area of the sensors nodes (at the surface).
- All nodes measure the environmental parameters at a fixed rate and send it periodically to the
receiver nodes.
- Each sensor node can operate either in sensing mode to monitor the environment parameters and
transmit to the underwater sink, cluster head (to compress and forward it to the uw-sink).
The Parameters setting of the simulation are shown in Table1
Table 1. Simulation parameters
Parameters Values
Network size (100*100*100) m3
Number of nodes 100
Initial energy 10 J
Coordinate of the sink (50, 50,150)
• Energy model
We use the same energy model as used in [17], which was proposed for underwater acoustic
networks. According to this model, to achieve a power level P0 at a receiver at a distance d, the
transmitter power Etx(d) must be:
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
40
Etx (d) = P0 . d2
. 10
ಉሺ౜ሻ
భబ
Where αሺfሻ , measured in dB/m, is a medium absorption coefficient depending on the frequency
range of interest under given water temperature and salinity, αሺfሻ is given by
αሺfሻ = 0.11
10ିଷ
fଶ
1 + fଶ
+ 44
10ିଷ
fଶ
4100 + fଶ
+ 	2.75 ൈ 10ି଻
fଶ
+ 3 ൈ 10ି଺
Where f is the carrier frequency for transmission in KHz. The reception power is assumed to 1/3th
of the transmission power.
4.2. Simulation1: static topology
The figure 1 depicts the total energy consumption of the two proposed algorithms and a
comparison is performed with the direct transmission. As shown in this figure we observe that
the MH-FEER algorithm consumes less energy comparing with SH-FEER, this is due to the
multi-hop routing used between cluster heads and the sink i.e. MH-FEER avoid the long distances
transmission utilized in the SH-FEER between CH and the sink. Although this figure shows that
the energy depletion of the two proposed algorithms is better than the direct transmission.
Figure 1. Total energy consumption vs. number of rounds Figure 2. Alive nodes vs. number of rounds
From the simulation result shown in figure 2 and 3, we can see that the first node dies in direct
transmission algorithm after 30 rounds while in SH-FEER and MH-FEER first node dies after 87
and 31 rounds respectively. We also observe that the last node dies in direct transmission
algorithm after 89 rounds while in SH-FEER and MH-FEER last node dies after 162 and 241
rounds respectively. Therefore, in this set of simulations, we note that MH-FEER about 32.78 %
more efficient in term of network lifetime compared to SH-FEER and about 63.07 % than the
direct transmission algorithm.
Furthermore, the number of alive nodes decreases speedily with direct transmission and SH-
FEER cases in comparing to the MH-FEER algorithm.
0 50 100 150 200 250
0
100
200
300
400
500
600
700
800
900
1000
Number of rounds
Totalenergyconsumption
MH-FEER
SH-FEER
Direct Transmission
0 50 100 150 200 250
0
10
20
30
40
50
60
70
80
90
100
Number of rounds
Alivenodes
MH-FEER
SH-FEER
Direct Transmission
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
41
Figure 3. The first and last node died in static topology
4.3. Simulation 2: dynamic topology
On account of the environment’s impact, underwater sensor nodes will be dynamic, which
produces changes in topology. Consequently, to will be more close to reality we must introduce
the movement to the simulation conditions. Considering this situation, we have used a random
walk mobility model, the node mobility is taken as 1 m/s and the other environmental parameters
are similar with the static simulation.
For the same number of nodes in the network, the figure 4 also shows that the total energy
consumption in dynamic networks is significantly high comparing to the static networks.
Furthermore, the number of alive nodes decreases speedily comparing to the static cases
(29.37%).
Figure 4. Total energy consumption vs. number of rounds Figure 5. Alive nodes vs. number of rounds
0 20 40 60 80 100 120 140
0
100
200
300
400
500
600
700
800
900
1000
Number of rounds
Totalenergyconsumption
MH-FEER
SH-FEER
Direct Transmission
0 20 40 60 80 100 120 140
0
10
20
30
40
50
60
70
80
90
100
Number of rounds
Alivenodes
MH-FEER
SH-FEER
Direct Transmission
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
42
From the simulation result shown in figure 5 and 6, we can see that the first node dies in direct
transmission algorithm after 30 rounds while in SH-FEER and MH-FEER first node dies after 96
and 108 rounds respectively. We also observe that the last node dies in direct transmission
algorithm after 77 rounds while in SH-FEER and MH-FEER last node dies after 117 and 128
rounds respectively. Therefore, in this set of simulation we note that MH-FEER about 8.5% is
more efficient in term of network lifetime comparing to SH-FEER and about 39.84 % versus to
the direct transmission algorithm.
Figure 6. The first and last node died in dynamic topology
4.4. Impact of density and mobility
In order to check the effect of density and mobility we choose the second proposition MH-FEER
in this set of simulations where all nodes are mobile with the same speed and we change the
number of nodes from 200 to 1000 nodes, the simulations results are plotted in the following
figures.
Figure 7. Impact of density on energy consumption Figure 8. Impact of density on alive node
Figures 7 and 8 depict the impact of density on the total energy consumption and the alive node
respectively. The total energy consumption increases when the number of nodes increases since
0 20 40 60 80 100 120 140 160 180
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
10000
Number of rounds
Totalenergyconsumption
1000 node
800 node
600 node
400 node
200 node
0 20 40 60 80 100 120 140 160 180
0
100
200
300
400
500
600
700
800
900
1000
Number of rounds
Alivenodes
1000 node
800 node
600 node
400 node
200 node
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
43
more nodes are involved in packet transmission. However the number of alive nodes remains
stable but it’s eventually decreased rapidly.
In this section of simulation we vary the mobility speed of each node from 1.5 m/s to 5.5 m/s
when using 100 nodes.
Figure 9.Impact of mobility on energy consumption Figure 10. Impact of mobility on alive nodes
It can be seen from figure 9 that the total energy consumption increases with the growth of the
node speed, however, the number of alive nodes reduces more when increasing the speed as
illustrated in figure 10.
5. CONCLUSION
In this paper we address the issue of routing energy efficiency in underwater wireless sensor
networks. Firstly, we have proposed two algorithms which utilize a clustering method based on
Fuzzy C-Means, using these algorithms; we study the effect of two key parameters (scalability
and mobility) on the performance of UWSN. Moreover theses approaches are deployed on static
and mobile environments. The simulation results show a promising performance, in terms of
energy consumption and network lifetime, with the proposed SH-FEER and MH-FEER
algorithms, than the direct transmission. In the future works we aim to investigate intelligent
algorithms such as genetic algorithms or ant colony, specially to find the shortest path between
the cluster heads and the underwater sink.
0 20 40 60 80 100 120
0
100
200
300
400
500
600
700
800
900
1000
Number of rounds
Totalenergyconsumption
speed=1.5
speed=3.5
speed=5.5
0 20 40 60 80 100 120
0
10
20
30
40
50
60
70
80
90
100
Number of rounds
Alivenodes
speed=1.5
speed=3.5
speed=5.5
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
44
REFERENCES
[1] I.F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: Research
challenges", Ad Hoc Networks, pp. 257–279, 2005.
[2] L. Liu, S. Zhou, and J.H .Cui, "Prospects and Problems of Wireless Communication for Underwater
Sensor Networks", WILEY WCMC, pp. 977-994, 2008.
[3] Z.J. Haas, J.Y. Halpern and L. Li, "Gossip-Based Ad Hoc Routing", Proceedings of the 19th
Conference of the IEEE Communications Society (INFOCOM), pp. 1707–1716, 2002.
[4] J. Kulik, W.R. Heinzelman and H. Balakrishnan, "Negotiation based protocols for disseminating
information in wireless sensor networks", Wirel.Netw, pp. 169–185, 2002.
[5] C. Intanagonwiwat, R. Govindan, D. Estrin and J.Heidemann, "Directed diffusion for wireless sensor
networking", IEEE/ACM Trans.Netw, pp. 2–16, 2003.
[6] Y. Xiu, J. Heidemann, and D. Estrin, "Geography-informed energy conservation for ad-hoc routing",
Proceedings ACM/IEEE MobiCom'01, pp. 70-84, 2001.
[7] Y. Yu, R. Govindan, and D.Estrin, "Geographical and energy aware routing: A recursive data
dissemination protocol for wireless sensor networks", Technical Report UCLA/CSD-TR-01-0023,
UCLA Computer Science Department, 2001.
[8] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for
Wireless Microsensor Networks", In Proceedings of the 33rd Annual Hawaii International
Conference on System Sciences, pp. 10–19, 2000.
[9] W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, "An application-specific protocol
architecture for wireless microsensor networks", Wireless Commun, pp. 660–670, 2002.
[10] A.B. Dogar, G.A. Shah and M.O. Farooq, "MR-LEACH: Multi-hop routing with low energy adaptive
clustering hierarchy", Fourth International Conference on Sensor Technologies and Applications
(SENSORCOMM), pp. 262-268, 2010.
[11] O. Younis, S. Fahmy, "A hybrid energy-efficient, distributed clustering approach for ad hoc sensor
networks", Mobile Comput, IEEE Trans, pp. 366–79, 2004.
[12] M.C. Domingo, R. Prior, "A distributed clustering scheme for underwater wireless sensor networks.
in personal, indoor and mobile radio communications", Proceedings of the IEEE 18th International
Symposium on PIMRC,2007.
[13] W. Pu, L. Cheng and Z. Jun, "Distributed minimum-cost clustering protocol for underwater sensor
networks (UWSNs) ", Proceedings of the IEEE international conference on communications, ICC ’07,
2007.
[14] L. Uichin, et al., "Pressure routing for underwater sensor networks", Proceedings of the IEEE
INFOCOM, 2010.
[15] M. Zhang, J. Yu, "Fuzzy partitional clustering algorithms", J journal of Software, pp.6-859, 2004.
[16] M. Hadjila, H. Guyennet and M. Feham, "Energy-Efficient in Wireless Sensor Networks using Fuzzy
C-Means Clustering Approach", International Journal of Sensors and Sensor Networks, pp. 21-26,
2013.
[17] E. Sozer, M. Stojanovic, and J. Proakis, "Underwater acoustic networks", IEEE Journal of Oceanic
Engineering, pp. 72-83, 2000.

More Related Content

What's hot

INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
 
Paper id 25201440
Paper id 25201440Paper id 25201440
Paper id 25201440IJRAT
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (10)

INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
 
Paper id 25201440
Paper id 25201440Paper id 25201440
Paper id 25201440
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMIJCNCJournal
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation withIJCNCJournal
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyIJCNCJournal
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMIJCNCJournal
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiIJCNCJournal
 
Performance improvement of
Performance improvement ofPerformance improvement of
Performance improvement ofIJCNCJournal
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...IJCNCJournal
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMIJCNCJournal
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
 

Viewers also liked (18)

CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMSIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISM
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
 
Optimal bandwidth allocation with
Optimal bandwidth allocation withOptimal bandwidth allocation with
Optimal bandwidth allocation with
 
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
 
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSOMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELS
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...
 
Mobile paymentmethodbased on public key
Mobile paymentmethodbased on public keyMobile paymentmethodbased on public key
Mobile paymentmethodbased on public key
 
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMLIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
 
A proposal to enhance cellular and wifi
A proposal to enhance cellular and wifiA proposal to enhance cellular and wifi
A proposal to enhance cellular and wifi
 
Performance improvement of
Performance improvement ofPerformance improvement of
Performance improvement of
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...
 
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMGEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEM
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
 

Similar to Fuzzy based clustering and energy efficient

An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
 
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSGRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSIJCNCJournal
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewTELKOMNIKA JOURNAL
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...IJCNCJournal
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 

Similar to Fuzzy based clustering and energy efficient (20)

An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSGRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
B05630814
B05630814B05630814
B05630814
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A Review
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 

More from IJCNCJournal

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

More from IJCNCJournal (20)

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Recently uploaded

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 

Recently uploaded (20)

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 

Fuzzy based clustering and energy efficient

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 DOI : 10.5121/ijcnc.2015.7203 33 FUZZY BASED CLUSTERING AND ENERGY EFFICIENT ROUTING FOR UNDERWATER WIRELESS SENSOR NETWORKS Sihem Souiki1 , Mourad Hadjila1 and Mohammed Feham1 1 Department of Telecommunication, Tlemcen University, Algeria. ABSTRACT Underwater Wireless Sensor Network (UWSN) is a particular kind of sensor networks which is characterized by using acoustic channels for communication. UWSN is challenged by great issues specially the energy supply of sensor node which can be wasted rapidly by several factors. The most proposed routing protocols for terrestrial sensor networks are not adequate for UWSN, thus new design of routing protocols must be adapted to this constrain. In this paper we propose two new clustering algorithms based on Fuzzy C-Means mechanisms. In the first proposition, the cluster head is elected initially based on the closeness to the center of the cluster, then the node having the higher residual energy elects itself as a cluster head. All non-cluster head nodes transmit sensed data to the cluster head. This latter performs data aggregation and transmits the data directly to the base station. The second algorithm uses the same principle in forming clusters and electing cluster heads but operates in multi-hop mode to forward data from cluster heads to the underwater sink (uw-sink). Furthermore the two proposed algorithms are tested for static and dynamic deployment. Simulation results demonstrate the effectiveness of the proposed algorithms resulting in an extension of the network lifetime. KEYWORDS UWSN, Routing, Clustering, Fuzzy C-Means, Energy efficiency 1.INTRODUCTION In recent years, underwater wireless sensor network has emerged as a powerful technique in order to discover and exploit this harsh environment. As over 70% of the earth’s surface is covered by water, it is advantageous to deploy underwater sensor networks to support several categories of applications such as oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications [1]. To make these applications viable, there is a need to enable underwater communications among underwater devices. The underwater communication may include the transmission of information in three forms (sound, electromagnetic (EM), or optical waves). Each of these techniques has advantages and drawbacks. Electromagnetic signals deliver very poor performance underwater, providing transmission ranges of only a few meters at the typical RF sensor transmission power. Optical communication for underwater sensor networks using light waves has also been investigated; however these methods either require high precision or high power if the distances between sensor nodes are large. Consequently, acoustic networks enabled by sound waves become ideal alternatives since acoustic signals propagate well through water and require much less power than RF and light signals for the same communication range [2].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 34 An underwater sensor network is usually formed by several autonomous and individual sensor nodes used to collect and forward data to the uw-sink. The most important challenges of deploying such a network are the cost, the computational power, the memory, the communication range and most of all the limited battery resources of each sensor node. The lifetime of UWSN is largely restricted because the number of sensor nodes that stop working due to the energy wastage increases with a deployment time. Then the high energy consumption is particularly significant defy for researchers to achieve long operating time without affecting system performance. Generally routing is the backbone for any network, and routing protocols are considered to be in charge for discovering and maintaining the routes. Most of the proposed protocols for terrestrial sensor networks cannot be immediately used in UWSN owing to the continuous exchange of overhead messages applied (proactive ad hoc routing) or the route discovery process based on the flooding technique (reactive ad hoc routing) although the major protocols are designed for a stationary deployment, thus these solutions are ineffective in large scale UWSN because they exhaust energy and bandwidth resources. Therefore new energy efficient protocols must be designed for UWSN. In this paper we present a hierarchical fuzzy based energy efficient routing algorithms where the clusters are formed by the Fuzzy C-Means method. The nodes are deployed randomly in three dimensional environments. The first proposed algorithm employs a single hop transmission between cluster heads and the uw-sink. Whereas the second proposition uses the multihop transmission between cluster heads and uw-sink; both algorithms are simulated for static and dynamic topologies. The remainder of the paper is organized as follows. In section 2, a related work on hierarchical routing in both terrestrial and underwater wireless sensor networks are presented. Section 3 gives a detail description of our routing algorithms simulated in static and dynamic topologies. Section 4 shows the simulations results. Finally, the last section concludes the paper. 2. RELATED WORKS Energy saving is a primordial issue in UWSNs because sensor nodes are supplied by batteries, which are difficult to replace or recharge in hostile underwater environments. Designing robust, scalable and energy aware routing protocols in this kind of networks is a fundamental research challenge. In the ground based wireless sensor networks, numerous routing protocols have been developed which can be divided into following classes according to deployment: flat, geographical, and hierarchal routing. In a flat topology, all nodes perform the same tasks and have the same functionalities in the network. Data transmission is performed by flooding in hop by hop manner. Flooding [3], Gossiping [4] and SPIN [5] are example of flat routing protocols. The second class is based on the position information of each node to determine forwarding path. The typical geographic routing protocols in WSNs include [6,7].Owing to satisfy the scalability aim and extending network lifetime in WSN, grouping nodes into clusters has been widely adopted by the research community. The hierarchical routing protocols involve cluster-based structure of the sensor nodes. Generally, each cluster constitutes a leader referred to as cluster head (CH) usually performs the special tasks (fusion and aggregation) and other member nodes (collection of data and monitoring). The first clustering routing protocol proposed for WSNs includes Low-energy Adaptive Clustering Hierarchy (LEACH) [8]. The key idea of this protocol is to select randomly a set of sensor nodes as cluster head and rotate this task to uniformly distribute the energy load among the nodes in the network. There are two phases of LEACH protocol: The setup and steady phases. Firstly, in the setup phase clusters are formed and the cluster head (CH) selection is performed by the member nodes. Secondly the cluster head (CH) compress the gathered data
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 35 from diverse nodes that belong to the respective cluster. Then the cluster head forwards aggregated data to the base station by single hop communication. Multiple variants of LEACH protocol are proposed to overcome some drawbacks of this protocol such as: LEACH-C [9], MR- LEACH [10] and HEED [11]. However, these protocols are not appropriate for UWSNs because they assume that the sensor network is stationary and they are not well adapted to the intrinsic properties of underwater environments, such as long propagation delays, low data rates and difficulty of synchronization. On the other hand, some hierarchical routing protocols have been designed for UWSN such as Ducs [12], Mccp [13] and HydroCast [14]. DUCS protocol is designed for long-term non-time critical applications where the sensor nodes are grouped into clusters using a distributed algorithm. The protocol operates in two stages: the first stage containing the clusters formation and the selection of the cluster head based on the remaining energy. In addition a randomized rotation of CH is performed among different nodes within a cluster in order to alleviate fast draining of the sensor node energy. In the second stage the data are transmitted to the sink using multi-hop routing through other cluster heads. In MCCP protocol (Minimum Cost Clustering Protocol), the clusters are created based on a cost metric. The cost metric is calculated on the basis of three important parameters: (1) the total energy consumption of the cluster members for sending data to the cluster head; (2) the residual energy of the cluster head and its cluster members; and (3) the relative location between the cluster head and the uw-sink. The proposed protocol selects a set of non-overlapping clusters from all potential clusters based on the cost metric affected to each potential cluster and attempts to reduce the cost of the selected clusters. MCCP can adapt geographical cluster head distribution to the traffic pattern in the network and thus avoid the formation of hot spots around the uw-sink. It can also balance the traffic load between cluster heads and cluster members through periodical re-clustering the sensor nodes in the network. The global idea of HydroCast is based on a routing decision which is made after comparing the local pressure or depth information, such that data packets are greedily forwarded towards a node with the lowest pressure level among the neighbor nodes. In HydroCast scheme, each local maximum node maintains a recovery route towards a neighboring node with higher depth than itself. After one or several forwarding’s through local maxima, a data packet can be routed out of the void region and can be switched back to the greedy mode. 3. THE PROPOSED ALGORITHMS In the following, we briefly introduce the basic theory of Fuzzy C-Means (FCM) used in cluster formation of our propositions, and then we give a detailed description of the proposed approaches. 3.1. Basic theory of Fuzzy C-Means Fuzzy C-Means clustering algorithm [15], is a kind of clustering algorithm using membership to describe the possibility of cluster. However FCM is a local optimization algorithm, which is very sensitive to initialization and gets into the local minimum value easily. The finite vectors xi (i=1, 2,…, n) are divided into c (1<c<n) classes, and the clustering center of each class is solved to make membership minimum as the non-similarity index.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 36 The objective function can be defined as follows: JሺU, cଵ, cଶ … cୡሻ = ෍ ෍ U ୧୨ ୫ ୬ ୨ ୡ ୧ୀଵ d ୧୨ ଶ ሺ1ሻ Where Uij is the membership of the group, ci is the clustering center; dij is the special distance from vector ci to xj. m is the weighted index. The steps of algorithm are as the following: • Initializing the membership matrix U to make it satisfy the following formula. ෍ U୧୨ = ୡ ୧ୀଵ 1, ∀j = 1, … , n ሺ2ሻ • Calculating the clustering center using the following formula. c୧ = ∑ U୧୨ ୫ x୨ ୬ ୨ୀଵ ∑ U୧୨ ୫୬ ୨ୀଵ ሺ3ሻ • Calculating the objective function according to the formula (1). If the objective function is less than a threshold or the relative value function change value last time is less than a threshold, the algorithm stops. • Updating the matrix by the following formula and returning to step2. U୧୨ = ෍ሺ d୧୨ d୩୨ ሻ ିଶ ୫ିଵൗ ୡ ୩ୀଵ ሺ4ሻ 3.2. Single-Hop Fuzzy based Energy Efficient Routing algorithm for UWSN (SH- FEER): SH-FEER is a fuzzy based energy efficient algorithm where clusters are formed by using the Fuzzy C-Means method. We suppose that underwater sensor nodes always have data to be sent to the sink and the set of nodes have the same amount of energy [16]. We assume in this approach that the nodes organize themselves inside clusters randomly with unequal sizes and one node is selected as a cluster-head for each cluster. All non-cluster head nodes forward their data to their cluster head via a single hop; the cluster-head node receives data from all cluster members, performs signal processing functions on the data (e.g. aggregation) and transmits the data to the sink using single-hop routing. The cluster heads are responsible for coordination among nodes within their clusters (intra-cluster coordination) and communication between each other (inter-cluster coordination). SH-FEER incorporates rotation of the cluster-head among the sensors to avoid rapid draining of the batteries of specific underwater sensors. In this way, the energy consumption is distributed. The operation mode of SH-FEER is composed to three phases: clusters formation during the first
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 37 step and secondly the cluster head are selected. Initially, the closest node to the center is selected as cluster head and in the next rounds the selection is based on the residual energy of each node; the third step is the transmission of data towards the sink. The algorithm of this first proposition is mentioned as follows: Step 1: Clusters formation Apply FCM algorithm to form clusters. - Each cluster K(i) contains a number of nodes, i=1, …, N - Initially all nodes have the same amount of energy. Step 2: Cluster head selection maxE=zeros(1,N) ; maxE is a row vector contains N zeros R_max: maximum number of rounds TE: total energy of network while(R≤R_max || TE>0) for i = 1 to N do if R==1 -calculate the distance d (nodei ,center) // between nodei and center of cluster. -Assign ICH (i) of the cluster in which d(nodei , center) is minimum. else for j=1 to length(k(i)) do ifmaxE(i)<k(i).E(j) maxE(i)=k(i).E(j) end if end for CH(i)=maxE(i) end if end for Step 3: Data transmission • Intra_cluster transmission for i = 1 to N do for j=1 to length(k(i)) do k(i).j send data to CH(i) end for end for • Transmission from CHs to the uw-sink for i = 1 to N do CH(i) aggregates and forwards directly the data to uw-sink end for.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 38 3.3. Multi-Hop Fuzzy based Energy Efficient Routing algorithm for UWSN (MH- FEER): MH-FEER mimics the first proposed algorithm; it uses the same two first phases of SH-FEER (clusters formation and cluster head selection). However the process of data forwarding toward the uw-sink is different by using multi-hop routing between cluster heads and uw-sink. The data are transferred through multiple cluster-heads in the direction of the uw-sink choosing the shortest path; this is repeated until it reaches the uw-sink. Since the mode of clusters formation and the cluster heads selection is the same as the first algorithm, we present below only the pseudo-code relating to the data forwarding from the cluster heads to uw-sink. Calculation of distances between CHs and distances between CHs and uw-sink For i=1 to N For j=1 to N do dሺi, jሻ = ට൫x୧ − x୨൯ ଶ + ൫y୧ − y୨൯ ଶ + ൫z୧ − z୨൯ ଶ d୳୵ିୱ୧୬୩ሺiሻ = ඥሺx୧ − x୳୵ିୱ୧୬୩ሻଶ + ሺy୧ − y୳୵ିୱ୧୬୩ሻଶ + ሺz୧ − z୳୵ିୱ୧୬୩ሻଶ end for for i=1 to N do ifduw-sink (i)== Min duw-sink CH(i) sends directly to uw-sink else for j=1 to N do if(i≠j&& d(i,j)==min(i) &&d uw-sink (i) > d uw-sink (j)) CH(i) sends data to CH(j) end if end for end if end for 4. PERFORMANCE EVALUATION In this section, we evaluate the performance of the proposed algorithms through extensive simulations under Matlab environment. Firstly, we define the performance metrics and the simulation methodology, and then we present the energy model used. Moreover we evaluate how network parameters such as node density, node mobility affect the performance of the proposed algorithms.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 39 4.1. Metrics and Methodology 4.1.1. Metrics In this paper two metrics are used to analyze the performance of the proposed algorithms: total energy consumption and the number of alive nodes (i) Total energy consumption ET: is the sum of energy amount consumed by the all sensor nodes formed the networks E(i)consumed = E(i)initial-E(i)residual ETconsumed = ∑ Eሺiሻ୒ ୧ୀଵ ୡ୭୬ୱ୳୫ୣୢ (ii) Number of alive nodes: is the number of sensor nodes where the energy is different to 0 during (r) rounds. 4.1.2. Simulation Methodology In our simulation we make some assumptions then we present the energy model used. • Assumptions - Sensor nodes as well as the uw-sink are stationary after being deployed in the field. - The network is considered homogeneous and all of the sensor nodes have the same initial energy. - Each sensor node knows its own geographical position. - The underwater sink is not limited in terms of energy, memory and computational power. - Underwater sink is located outside the area of the sensors nodes (at the surface). - All nodes measure the environmental parameters at a fixed rate and send it periodically to the receiver nodes. - Each sensor node can operate either in sensing mode to monitor the environment parameters and transmit to the underwater sink, cluster head (to compress and forward it to the uw-sink). The Parameters setting of the simulation are shown in Table1 Table 1. Simulation parameters Parameters Values Network size (100*100*100) m3 Number of nodes 100 Initial energy 10 J Coordinate of the sink (50, 50,150) • Energy model We use the same energy model as used in [17], which was proposed for underwater acoustic networks. According to this model, to achieve a power level P0 at a receiver at a distance d, the transmitter power Etx(d) must be:
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 40 Etx (d) = P0 . d2 . 10 ಉሺ౜ሻ భబ Where αሺfሻ , measured in dB/m, is a medium absorption coefficient depending on the frequency range of interest under given water temperature and salinity, αሺfሻ is given by αሺfሻ = 0.11 10ିଷ fଶ 1 + fଶ + 44 10ିଷ fଶ 4100 + fଶ + 2.75 ൈ 10ି଻ fଶ + 3 ൈ 10ି଺ Where f is the carrier frequency for transmission in KHz. The reception power is assumed to 1/3th of the transmission power. 4.2. Simulation1: static topology The figure 1 depicts the total energy consumption of the two proposed algorithms and a comparison is performed with the direct transmission. As shown in this figure we observe that the MH-FEER algorithm consumes less energy comparing with SH-FEER, this is due to the multi-hop routing used between cluster heads and the sink i.e. MH-FEER avoid the long distances transmission utilized in the SH-FEER between CH and the sink. Although this figure shows that the energy depletion of the two proposed algorithms is better than the direct transmission. Figure 1. Total energy consumption vs. number of rounds Figure 2. Alive nodes vs. number of rounds From the simulation result shown in figure 2 and 3, we can see that the first node dies in direct transmission algorithm after 30 rounds while in SH-FEER and MH-FEER first node dies after 87 and 31 rounds respectively. We also observe that the last node dies in direct transmission algorithm after 89 rounds while in SH-FEER and MH-FEER last node dies after 162 and 241 rounds respectively. Therefore, in this set of simulations, we note that MH-FEER about 32.78 % more efficient in term of network lifetime compared to SH-FEER and about 63.07 % than the direct transmission algorithm. Furthermore, the number of alive nodes decreases speedily with direct transmission and SH- FEER cases in comparing to the MH-FEER algorithm. 0 50 100 150 200 250 0 100 200 300 400 500 600 700 800 900 1000 Number of rounds Totalenergyconsumption MH-FEER SH-FEER Direct Transmission 0 50 100 150 200 250 0 10 20 30 40 50 60 70 80 90 100 Number of rounds Alivenodes MH-FEER SH-FEER Direct Transmission
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 41 Figure 3. The first and last node died in static topology 4.3. Simulation 2: dynamic topology On account of the environment’s impact, underwater sensor nodes will be dynamic, which produces changes in topology. Consequently, to will be more close to reality we must introduce the movement to the simulation conditions. Considering this situation, we have used a random walk mobility model, the node mobility is taken as 1 m/s and the other environmental parameters are similar with the static simulation. For the same number of nodes in the network, the figure 4 also shows that the total energy consumption in dynamic networks is significantly high comparing to the static networks. Furthermore, the number of alive nodes decreases speedily comparing to the static cases (29.37%). Figure 4. Total energy consumption vs. number of rounds Figure 5. Alive nodes vs. number of rounds 0 20 40 60 80 100 120 140 0 100 200 300 400 500 600 700 800 900 1000 Number of rounds Totalenergyconsumption MH-FEER SH-FEER Direct Transmission 0 20 40 60 80 100 120 140 0 10 20 30 40 50 60 70 80 90 100 Number of rounds Alivenodes MH-FEER SH-FEER Direct Transmission
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 42 From the simulation result shown in figure 5 and 6, we can see that the first node dies in direct transmission algorithm after 30 rounds while in SH-FEER and MH-FEER first node dies after 96 and 108 rounds respectively. We also observe that the last node dies in direct transmission algorithm after 77 rounds while in SH-FEER and MH-FEER last node dies after 117 and 128 rounds respectively. Therefore, in this set of simulation we note that MH-FEER about 8.5% is more efficient in term of network lifetime comparing to SH-FEER and about 39.84 % versus to the direct transmission algorithm. Figure 6. The first and last node died in dynamic topology 4.4. Impact of density and mobility In order to check the effect of density and mobility we choose the second proposition MH-FEER in this set of simulations where all nodes are mobile with the same speed and we change the number of nodes from 200 to 1000 nodes, the simulations results are plotted in the following figures. Figure 7. Impact of density on energy consumption Figure 8. Impact of density on alive node Figures 7 and 8 depict the impact of density on the total energy consumption and the alive node respectively. The total energy consumption increases when the number of nodes increases since 0 20 40 60 80 100 120 140 160 180 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Number of rounds Totalenergyconsumption 1000 node 800 node 600 node 400 node 200 node 0 20 40 60 80 100 120 140 160 180 0 100 200 300 400 500 600 700 800 900 1000 Number of rounds Alivenodes 1000 node 800 node 600 node 400 node 200 node
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 43 more nodes are involved in packet transmission. However the number of alive nodes remains stable but it’s eventually decreased rapidly. In this section of simulation we vary the mobility speed of each node from 1.5 m/s to 5.5 m/s when using 100 nodes. Figure 9.Impact of mobility on energy consumption Figure 10. Impact of mobility on alive nodes It can be seen from figure 9 that the total energy consumption increases with the growth of the node speed, however, the number of alive nodes reduces more when increasing the speed as illustrated in figure 10. 5. CONCLUSION In this paper we address the issue of routing energy efficiency in underwater wireless sensor networks. Firstly, we have proposed two algorithms which utilize a clustering method based on Fuzzy C-Means, using these algorithms; we study the effect of two key parameters (scalability and mobility) on the performance of UWSN. Moreover theses approaches are deployed on static and mobile environments. The simulation results show a promising performance, in terms of energy consumption and network lifetime, with the proposed SH-FEER and MH-FEER algorithms, than the direct transmission. In the future works we aim to investigate intelligent algorithms such as genetic algorithms or ant colony, specially to find the shortest path between the cluster heads and the underwater sink. 0 20 40 60 80 100 120 0 100 200 300 400 500 600 700 800 900 1000 Number of rounds Totalenergyconsumption speed=1.5 speed=3.5 speed=5.5 0 20 40 60 80 100 120 0 10 20 30 40 50 60 70 80 90 100 Number of rounds Alivenodes speed=1.5 speed=3.5 speed=5.5
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 44 REFERENCES [1] I.F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: Research challenges", Ad Hoc Networks, pp. 257–279, 2005. [2] L. Liu, S. Zhou, and J.H .Cui, "Prospects and Problems of Wireless Communication for Underwater Sensor Networks", WILEY WCMC, pp. 977-994, 2008. [3] Z.J. Haas, J.Y. Halpern and L. Li, "Gossip-Based Ad Hoc Routing", Proceedings of the 19th Conference of the IEEE Communications Society (INFOCOM), pp. 1707–1716, 2002. [4] J. Kulik, W.R. Heinzelman and H. Balakrishnan, "Negotiation based protocols for disseminating information in wireless sensor networks", Wirel.Netw, pp. 169–185, 2002. [5] C. Intanagonwiwat, R. Govindan, D. Estrin and J.Heidemann, "Directed diffusion for wireless sensor networking", IEEE/ACM Trans.Netw, pp. 2–16, 2003. [6] Y. Xiu, J. Heidemann, and D. Estrin, "Geography-informed energy conservation for ad-hoc routing", Proceedings ACM/IEEE MobiCom'01, pp. 70-84, 2001. [7] Y. Yu, R. Govindan, and D.Estrin, "Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks", Technical Report UCLA/CSD-TR-01-0023, UCLA Computer Science Department, 2001. [8] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks", In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 10–19, 2000. [9] W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks", Wireless Commun, pp. 660–670, 2002. [10] A.B. Dogar, G.A. Shah and M.O. Farooq, "MR-LEACH: Multi-hop routing with low energy adaptive clustering hierarchy", Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM), pp. 262-268, 2010. [11] O. Younis, S. Fahmy, "A hybrid energy-efficient, distributed clustering approach for ad hoc sensor networks", Mobile Comput, IEEE Trans, pp. 366–79, 2004. [12] M.C. Domingo, R. Prior, "A distributed clustering scheme for underwater wireless sensor networks. in personal, indoor and mobile radio communications", Proceedings of the IEEE 18th International Symposium on PIMRC,2007. [13] W. Pu, L. Cheng and Z. Jun, "Distributed minimum-cost clustering protocol for underwater sensor networks (UWSNs) ", Proceedings of the IEEE international conference on communications, ICC ’07, 2007. [14] L. Uichin, et al., "Pressure routing for underwater sensor networks", Proceedings of the IEEE INFOCOM, 2010. [15] M. Zhang, J. Yu, "Fuzzy partitional clustering algorithms", J journal of Software, pp.6-859, 2004. [16] M. Hadjila, H. Guyennet and M. Feham, "Energy-Efficient in Wireless Sensor Networks using Fuzzy C-Means Clustering Approach", International Journal of Sensors and Sensor Networks, pp. 21-26, 2013. [17] E. Sozer, M. Stojanovic, and J. Proakis, "Underwater acoustic networks", IEEE Journal of Oceanic Engineering, pp. 72-83, 2000.