SlideShare a Scribd company logo
1 of 18
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
DOI: 10.5121/ijcnc.2019.11403 43
FUZZY INFORMER HOMED ROUTING PROTOCOL
FOR WIRELESS SENSOR NETWORK
Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh
Department of Computer Science & Engineering, Faculty of Engineering and
Technology, Panjab University, Chandigarh, India
ABSTRACT
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful
environmental information and send them to the base station. During these processes, nodes are prone to
failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and
energy efficiency are two important objectives for reliable packet delivery. To address these objectives a
novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to
distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties
in cluster head communication range estimation. The simulation results show that the proposed method can
significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results
revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the
nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable
and energy efficient fault tolerance algorithm for wireless sensor networks.
KEYWORDS
Wireless Sensor Network; Routing Protocols; Fault Tolerance; Energy Efficiency; Clustering Algorithms; Fuzzy
Logic system
1. INTRODUCTION
A wireless sensor network (WSN) is a self-configured or self-organized network. It contains a
collection of small, low powered sensor nodes with limited transmission range and the base
station or sink [1, 2]. Sensor nodes in wireless sensor networks are prone to failure because of
hardware and software failures, instability of communication link, battery depletion, dislocation,
etc. Therefore, there is a needfor an efficient fault tolerance mechanism to manage or identify the
fault and take appropriate action while it occurs [3]. A collector node has restricted capability in
sensing and collecting meaningful environment information within its range. It generally transfers
the sensed and collected data to the base station. The sensor nodes consume energy while sensing,
processing, receiving and transferring data [4]. In the majority of cases, they have the same amount
of energy which is not replaceable [5] or replacing the battery is impossible [6, 7]. Hence, energy
efficiency is an important design objective in a wireless sensor network.
To aggregate and transmit sensed data through efficient manner, the network can be clustered or
partitioned into the number of clusters. Each cluster in the network has a cluster head. It generally
receives the sensed data from cluster members then aggregates and transmits to the base station
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
44
[8].In the clustering manner, selection of a suitable cluster head is very important, it can reduce
energy depletion of sensor nodes and increase the lifetime of the wireless sensor network [9, 13].
Generally, clustering procedures utilize two methods, electing cluster heads with higher
remaining energy and revolving them periodically to balance energy depletion of the sensor nodes
all over the network for prolonging the network lifetime.
Utilizing intelligent methods improve the efficiency of wireless sensor network [10]. As an
intelligent technique, fuzzy logic is the most powerful tool that can be used for clustering
procedure. In a wireless sensor network, it can be used to select suitable cluster heads [9, 11].
Fuzzy logic has several advantages over traditional methods for instant, design time,
computational complexity and development cost are low and it is more flexible [12].Sointhis
paper, a novel fault tolerance algorithm named Fuzzy Informer Homed Routing (FIHR) protocol
is introduced and simulated for wireless sensor networks using fuzzy logic. It is derived from the
Informer Homed Routing (IHR) protocol [13] and Dual-Homed fault tolerant Routing (DHR)
protocol [14]. Clustering procedure in IHR and DHR protocols is based on a probabilistic model
same as LEACH protocol. Moreover, it is probable that some cluster heads are located in a
particular zone. It means that primary cluster heads are not picked out in a distributed manner.
The proposed FIHR is a distributed competitive cluster head selection with fault tolerance
algorithm. The proposed method efforts on allocating suitable communication range to the tentative
primary cluster heads. To make wise decisions to select primary cluster heads (PCHs), the
introduced FIHR method employs fuzzy logic inference system and uses the distance to the base
station and the remaining energy of available sensor nodes during simulation time. Furthermore,
each primary cluster head will choose the non-cluster head locally with the higher energy left as its
backup cluster head (BCH). To achieve fault tolerance, every BCH will control the aliveness of
relevant PCH based on the beacon message it receives from its PCH in each round.
We compare the effectiveness of FIHR protocol with IHR and DHR protocols in terms of first
node dead, half of the nodes alive and total residual energy level of the network at various rounds.
The results show that the proposed FIHR protocol outperforms IHR and DHR protocols. It is
concluded that the suggested FIHR protocol is stable as well as energy efficient fault tolerance
protocol for WSNs.
The rest of this article is organized as follows: Section 2 is about related works, in section 3
Preliminaries will be discussed, in section 4 the proposed FIHR protocol will be introduced, in
section 5 clustering with fuzzy logic system will be discussed, section 6 is about simulation
results and discussions, and finally we conclude the paper in section 7.
2. RELATED WORK
Efficiently transferring the data from collector nodes to the sink or base station is a critical issue
in the wireless sensor network. Therefore, numerous faulttolerant routing protocolshave been
offered in the literature. Moreover, most of the existing fault tolerance methods introduce
hardware redundancy and path redundancy. For example, to offer fault tolerance against cluster
head failures, DHR protocol was proposed. In this method, each cluster is structured into collector
nodes and two cluster head nodes (primary and backup). Furthermore, cluster head selection
procedure is performed in rounds as in Low-Energy Adaptive Clustering Hierarchy (LEACH)
protocol. In this protocol the collected data is dispatched to both cluster heads then the primary
and backup cluster heads send received data packets to the base station [14]
subsequentlyinsignificant energy will be consumed per packet transfer. Moreover, a major
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
45
drawback of DHR protocol is a duplication of forwarding every data packet over two disjoint
paths towards thebase station. This cause decreases the overall network lifetime. Furthermore, the
DHR protocol uses a simple probabilistic model which is insufficient to find the best solution for
network clustering. Qiu et al. [13] presented a novel energy-aware and fault tolerance scheme for
a wireless sensor network, calledInformer Homed Routing protocol. In this protocol, each
collector node has two cluster heads associated with it (PCH and BCH). Furthermore, the
collector node just dispatched sensed data to the BCH when it found that PCH failed, instead of
transferring the data packet to the PCH and BCH simultaneity. The effectiveness of this method
was compared with DHR and LEACH protocols in aspects of power consumption and the number
of failed sensor nodes. Also, the throughput of the network was considered with different fault
rates. Results revealed that the suggested protocol could significantly decrease power
consumption and reduce data packet loss rate as well as prolong the networklifetime. IHR
protocol does not measure the remaining energy level of the selected cluster head during cluster
formation. Moreover, the suggested protocol uses a simple probabilistic model which is not
enough to gain the best solution for clustering. Furthermore, the IHR protocol does not take into
considerations the distance among primary cluster heads.
Abedi et al. [15] introduced a new fault tolerance algorithm. In this algorithm, to guarantee a fault
tolerant topology, each sensor node must select two nearest relay nodes and can be considered as
primary and backup cluster heads. Furthermore, the failure probability value of each relay node
was used to discover the most optimal path in the current network topology. Moreover, the relay
node with the lowest probability of failure will become the primary cluster head and the second
one is considered as a backup. Therefore, sensor nodes could send a data packet through the
suitable relay nodes to the sink and the event of primary cluster head failure, sensor nodes could
send a data packet through the backup cluster head. The simulation results were used to examine
only the fault tolerance level of the networks. There is a limitation of this method, sensor nodes
select the next hop relay node without taking into account the total distance among itself and the
base station also does not consider the residual energy of them.
3. PRELIMINARIES
To describe the suggested protocol in detail, the characteristics of the network model that are used
in the simulation process are introduced. Thus, the following assumptions that are made about the
wireless sensor network model are given below:
• Sensor nodes are distributed in the 100m×100m and 200m×200m square field randomly.
• There areonly one base station and its located at the center of the field.
• Every sensor nodes and the base station are fixed after the distribution phase.
• Sensor nodes are capable of altering the transmission power according to the distance of the
receiver nodes.
• All sensor nodes have equal energy when they are initially distributed.
• Each cluster has primary and backup cluster head nodes.
• For each collector node in the network, there is only one primary/backup cluster head to reach
the BS.
In this paper, the energy consumption model proposed in [16, 17, 18] has been used.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
46
3.1. An overview of IHR protocol
IHR is a distributed fault management technique, it considers two important aspects for a wireless
sensor network, the first one is energy consumption and the second one is reliability. In this protocol,
each collector node within a cluster has two cluster heads associated with it (PCH and BCH).
Furthermore, each collector node only sent a data packet to the backup one when it discovered that the
main cluster head failed, instead of transferring a data packet to the main cluster head and backup
cluster head simultaneity. Therefore, the data transmitting process will not be interrupted during the
lifetime of the network. Figure 1 illustrates the network model for the IHR protocol.
IHR protocol considers hardware faults, particularly main cluster head failure. The hardware faults
may be caused by receiver/transmitter failure, battery exhaustion, malicious attack, and malicious
human activities. In this protocol, the impact of hardware failure is considered, because when amain
cluster head gets fail, its relevant sensor nodes are disconnected. This will meaningfully decrease
the availability and reliability of the sensor network.
3.2. An overview of the DHR protocol
DHR protocol considers an important aspect of wireless sensor network which is reliability. In
this protocol, each collector node within a cluster has two cluster heads associated with it (PCH
and BCH). Furthermore, each collector node sends a data packet to both of them at the same
time. Consequently, aggregated data packets are forwarded to the base station through primary
cluster heads as well as backup cluster heads. This protocol can guarantee data loss issue while
a primary cluster head gets fail. A major drawback of DHR protocol is a duplication of
forwarding every data packet over two disjoint paths towards the base station. Therefore, in
data packet transferring procedure, energy will consume more and the overall network lifetime
will be decreased.
Figure 1. The network model for IHR protocol
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
47
4. PROPOSED FIHR PROTOCOL
The fuzzy IHR protocol is implemented based on the IHR protocol. The difference between IHR
and FIHR is that the IHR protocol goes through the probabilistic model for clustering but FIHR
protocol goes through the proposed fuzzy unequal clustering scheme. Furthermore, the distance
between cluster heads has been considered to provide clustering in a distributed manner. The
following pseudocode represented how the FIHR algorithm is implemented.
Pseudocode: Fuzzy Informer Homed Routing
Input: Network setting configuration
N ← Number of deployed sensor nodes
R ← Number of Rounds
M← Number of times for data packet transmission
Output: FIHR Scheme
1: T← probability to become a tentative CH
2: Node Status← Non Cluster Head (NCH)
3: clusterMembers← Null
4: myClusterHead← Null
5: beTentativeCH← True
6: inquiry counter ← Null
7:for rounds.index=1:1: R do
8:x ← rand (0, 1)
9: if x < T then
10:Measure distance to BS for Candidate CH
11:Calculate ComR of Candidate CH applying fuzzy logic (Input: Distance, Energy)
12:if ComR> Threshold
13: beTentativeCH ← False
14: else
15: Calculate distance to other PCHs
16: if ComR<=distance-ComR
17: Node Status ← Primary Cluster Head (PCH)
18: Advertise PCHmessage (ID, ComR) to other nodes
19: else
20: beTentativeCH ← False
21: end if
22: end if
23: On receiving all PCHmessages
24: myClusterHead ← The nearest PCH
25: Send JoinMessage(ID) to the closest PCH
26: Each PCH will select the node with the higher energy left among its entire cluster Members as the BCH.
27: After selection of the BCHs, each PCH will inform its cluster members about BCH.
28: end if
29: for times index =1:1: M do
30: Each BCH starts inquiry from its relevant PCH for checking the aliveness.
31: inquiry counter ← inquiry counter+1.
32: if PCH is still working then
33: PCH receives inquiry message from BCH then responds to confirm its aliveness.
34: Upon receiving the respond message from PCH, inquiry counter ← inquiry counter-1
35: end if
36: if inquiries counter > 3 then
37: BCH decides the relevant PCH has failed then
38: it sends inform message to its NCHs that send data packet to itself afterwards.
39: end if
40: if NCH receives the informer message from BCH then
41: dispatches data packet to its relevant BCH.
42: else
43: dispatches data packet to its relevant PCH.
44: end if
45: end for
46: end for
International Journal of Computer Networks & Communica
In this protocol, there are two fuzzy input variables; the first one is residual energy and the
second one is the distance to
(ComR) stands for the fuzzy output variable. If a sensor
the competition, it becomes a tentative CH then in t
primary cluster head. Furthermore, the selection of a primary cluster head is not only
based on fuzzy input variables. The distance between primary cluster
considered to increase the performance of the network. Moreover, each primary cluster
head will select a sensor node with the highest energy left from its cluster members as
backup. Each primary cluster head will be check for aliveness by
Figure 2 shows the schematic chart of proposed FIHR protocol
Figure
Computer Networks & Communications (IJCNC) Vol.11, No.4, July
In this protocol, there are two fuzzy input variables; the first one is residual energy and the
second one is the distance to thebase station. Furthermore, the communication range
(ComR) stands for the fuzzy output variable. If a sensor node has selected
the competition, it becomes a tentative CH then in the local area competes
primary cluster head. Furthermore, the selection of a primary cluster head is not only
based on fuzzy input variables. The distance between primary cluster
increase the performance of the network. Moreover, each primary cluster
node with the highest energy left from its cluster members as
. Each primary cluster head will be check for aliveness by its backup cluster head.
Figure 2 shows the schematic chart of proposed FIHR protocol.
Figure 2. Schematic chart of the proposed FIHR protocol
tions (IJCNC) Vol.11, No.4, July 2019
48
In this protocol, there are two fuzzy input variables; the first one is residual energy and the
base station. Furthermore, the communication range
node has selected tocontribute in
he local area competes to become
primary cluster head. Furthermore, the selection of a primary cluster head is not only
based on fuzzy input variables. The distance between primary cluster heads is also
increase the performance of the network. Moreover, each primary cluster
node with the highest energy left from its cluster members as a
its backup cluster head.
International Journal of Computer Networks & Communica
5. CLUSTERING WITH F
In this section, the proposed clustering piece of FIHR protocol using
details. It is a distributed unequal clustering. It makes the local decision for determining
communication range which leads to selecting primary cluster head
the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads.
In the FIHR protocol, selecting a tentative primary cluster head is based on a
scheme. To estimate the communication range for a tentative primary cluster head, it employs
both distances to BS and residual energy factors.
The communication range of each candidate primary cluster head is determined by using
predefined fuzzy if-then rules to han
Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference
technique. The Center of Area (COA) scheme is employed for
communication range [4].
The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system,
fuzzy rule base, and defuzzification with input and output variables. In the introduced method
there are two crisp values as inputs (distance to BS
value (Communication range). The basic model for fuzzy logic system incorporated in the
proposed FIHR protocol is shown in Figure 3
• Fuzzification:Itstands for converting crisp input values into fuzzy sets through membership
functions.
• Fuzzy rule base: It is used for storing If
• Fuzzy inference engine:
simulate the reasoning by which it produces a fuzzy inference.
• Defuzzification:It stands for converting fuzzy outputs into crisp values.
For simplicity, trapezoidal and triangular membership fun
protocol. The mathematical formula for triangular membership function is described as in
equation (1) [24].
Figure 3. The basic model of the fuzzy logic system i
Computer Networks & Communications (IJCNC) Vol.11, No.4, July
FUZZY LOGIC SYSTEM
In this section, the proposed clustering piece of FIHR protocol using fuzzy logic
details. It is a distributed unequal clustering. It makes the local decision for determining
communication range which leads to selecting primary cluster heads. Furthermore, it takes benefits of
the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads.
In the FIHR protocol, selecting a tentative primary cluster head is based on a
estimate the communication range for a tentative primary cluster head, it employs
to BS and residual energy factors.
The communication range of each candidate primary cluster head is determined by using
then rules to handle the uncertainty. Furthermore, to evaluate the rules, the
Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference
technique. The Center of Area (COA) scheme is employed for defuzzification
The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system,
fuzzy rule base, and defuzzification with input and output variables. In the introduced method
there are two crisp values as inputs (distance to BS and residual energy) and one output crisp
value (Communication range). The basic model for fuzzy logic system incorporated in the
proposed FIHR protocol is shown in Figure 3.
for converting crisp input values into fuzzy sets through membership
is used for storing If-Then rules.
Fuzzy inference engine: It is used for combining fuzzy input values and fuzzy rules to
simulate the reasoning by which it produces a fuzzy inference.
stands for converting fuzzy outputs into crisp values.
For simplicity, trapezoidal and triangular membership functions are used in the proposed
. The mathematical formula for triangular membership function is described as in
. The basic model of the fuzzy logic system in FIHR protocol
tions (IJCNC) Vol.11, No.4, July 2019
49
logic is described in
details. It is a distributed unequal clustering. It makes the local decision for determining
s. Furthermore, it takes benefits of
the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads.
In the FIHR protocol, selecting a tentative primary cluster head is based on a probabilistic
estimate the communication range for a tentative primary cluster head, it employs
The communication range of each candidate primary cluster head is determined by using
dle the uncertainty. Furthermore, to evaluate the rules, the
Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference
defuzzificationof the
The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system,
fuzzy rule base, and defuzzification with input and output variables. In the introduced method
and residual energy) and one output crisp
value (Communication range). The basic model for fuzzy logic system incorporated in the
for converting crisp input values into fuzzy sets through membership
is used for combining fuzzy input values and fuzzy rules to
are used in the proposed FIHR
. The mathematical formula for triangular membership function is described as in
n FIHR protocol
International Journal of Computer Networks & Communica
Triangular
The parameters {x, z, y} while
underlying triangular membership function.
There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost
trapezoidal functions. These are defined in terms of coordinates
support limit, b is the upper limit,
mathematical formula for leftmost and rightmost trapezoidal membership functions are described as
in equations (1) and (2).
Rightmost	trapezoidal
In case of Rightmost trapezoidal, the coordinate
Leftmost	trapezoidal
In case Leftmost trapezoidal the coordinate
Figure 4 depicts an example of the triangular m
Figure 5 represents an example of the rightmost trapezoidal membership function and Figure 6
illustrates leftmost trapezoidal membership function of the proposed FIHR protocol.
Figure
Computer Networks & Communications (IJCNC) Vol.11, No.4, July
Triangular m;	x,	z,	y
			0												"#													$ % &								
'()
*()
							"#							& + $ + ,				
-('
-(*
								"#						, + $ + .						
0											"#										. + $							
/(1)
while (x < z < c), determine the m coordinates of the three angles of the
underlying triangular membership function.
There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost
These are defined in terms of coordinates {a, b, c, d}
is the upper limit, c is lower limit and d is lower support limit.
mathematical formula for leftmost and rightmost trapezoidal membership functions are described as
Rightmost	trapezoidal m;	a,	b 1
					0										"#													$ 2 3		
4('
4(5
								"#						6 + $ + 3	
1										"#											$ % 6					
In case of Rightmost trapezoidal, the coordinate a is less than coordinate b, while c
Leftmost	trapezoidal m;	c,	d 1
					0												"#									$ 2 9							
'(:
4(5
										"#						9 + $ + ;	
1														"#										$ % ;					
In case Leftmost trapezoidal the coordinate c is less than coordinate d, while aand b
Figure 4 depicts an example of the triangular membership function.
represents an example of the rightmost trapezoidal membership function and Figure 6
illustrates leftmost trapezoidal membership function of the proposed FIHR protocol.
Figure 4. Triangular membership function
tions (IJCNC) Vol.11, No.4, July 2019
50
/(1)
coordinates of the three angles of the
There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost
{a, b, c, d}, where a is upper
is lower support limit. The
mathematical formula for leftmost and rightmost trapezoidal membership functions are described as
					
				
		
/(2)
c and d are -∞.
					
				
		
/(3)
are +∞.
represents an example of the rightmost trapezoidal membership function and Figure 6
illustrates leftmost trapezoidal membership function of the proposed FIHR protocol.
International Journal of Computer Networks & Communica
Figure
The fuzzy set that defines the distance to
Figure 7. The linguistic variables for distance to BS are
membership function is preferred for
preferred formed.
Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in
Figure 8. The linguistic variables for this fuzzy set are
linguistic variables have a trapezoidal membership function
triangular membership function.
Figure
Figure 7
Computer Networks & Communications (IJCNC) Vol.11, No.4, July
Figure 6. Leftmost trapezoidal membership function
The fuzzy set that defines the distance to thebase station as an input variable is represented in
Figure 7. The linguistic variables for distance to BS are close, med and
membership function is preferred for close and far and a triangular membe
Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in
Figure 8. The linguistic variables for this fuzzy set are low, med and high. The
linguistic variables have a trapezoidal membership function while med linguistic variable has a
triangular membership function.
Figure 5. Rightmost trapezoidal membership function
7. Membership functions of distance to base station
tions (IJCNC) Vol.11, No.4, July 2019
51
station as an input variable is represented in
and far. A trapezoidal
and a triangular membership function is
Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in
. The low and high
linguistic variable has a
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
52
The fuzzy output variable is the communication range of the tentative primary cluster
head. The fuzzy set for the communication range is represented in Figure 9. The linguistic
variables for this fuzzy set are very small, small, rather small, med-small, med, med-large,
ratherlarge,large and very large. A trapezoidal membership function is preferred for very
small and very large variables. The remaining linguistic variables are represented by
using the triangular membership function.
One of the main modules of the fuzzy inference system is the if-then rules which are designed to
simulate the real world behavior [18]. The rules are typically based on knowledge of experts and
experience on the same domain [8]. After the fuzzification step, the obtained membership values
are applied to if-then rules for determining fuzzy output set. Table 1 represents the possible rules
that are considered in the proposed FIHR protocol for calculating the communication range of a
Figure 8. Membership functions of residual energy
Figure 9. Membership functions of communication range
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
53
tentative PCH. If a selected tentative PCH located far away from the base station and its energy is
full, then it has the highest communication range (very large). On the other hand, if its energy is
very low and it is the nearest sensor node to the base station, then it has the lowest
communication range (very small). Furthermore, the remaining intermediate possibilities fall
among these two extreme cases.
Table 1. Possible if-then rules
In the defuzzification step, the Center of Area (COA) scheme is employed for a crisp output value (ComR).
The relationship between input variables (residual energy and distance to base station) and the
output variable (communication range) is represented in Figure 10.
6. SIMULATION RESULTS AND DISCUSSIONS
To evaluate the performance of the proposed protocol, two different scenarios are implemented.
In the first scenario, hundred sensor nodes are randomly spread in the area size of (100×100)
m2
anda base station is placed at the center of the network, at (50, 50) coordinates. In the second
Rule
No.
Fuzzy input variables
Fuzzy output
variable
Residual energy (J) Distance to BS (m) ComR
1 Low Close Verysmall
2 Med Close Small
3 High Close Rathersmall
4 Low Med Medsmall
5 Med Med Med
6 High Med Medlarge
7 Low Far Ratherlarge
8 Med Far Large
9 High Far Verylarge
Figure 10. The relationship between input and output variables in the
proposed FIHR fuzzy logic system
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
54
scenario, two hundred sensor nodes are randomly spread in the area size of (200×200) m2
and a
base station is placed at the center of the network, at (100, 100) coordinates. The simulation
parameters are summarized in Table 2.
Table 2. Simulation parameters
The numberof researchers used the metrics First Node Dead (FND) and Half of Nodes Alive
(HNA) to evaluate the performance of the network [4, 20, 21, 22] and to estimate the lifetime of
the network [4]. The metric FND denotes an estimated value for the round in which the first
sensor node dies. Furthermore, the metric HNA denotes an estimated value for the round in which
the half of sensor nodes dies [23]. Therefore, the metrics FND and HNA isused to evaluate the
effectiveness of the proposed protocol over the IHR and DHR protocols. To yield more reliable
outcomes, the experiments were conducted 20 times and the averages of the results have been
taken for each protocol. Furthermore, to assess the performance of the offered protocol over the
IHR and DHR protocols, two different scenarios are developed.
6.1. Scenario 1
In this scenario, hundred sensor nodes are randomly spread in the area size of (100×100) m2
and
the base station is placed at the center of the network at (50, 50) coordinates. The detailed
configuration of this scenario is presented in Table 2. The simulation of the proposed method,
IHR and DHR schemes yielded the following results:
Table 3 shows the measured values of FND and HNA metrics concerning the number of rounds till
which the first sensor node gets dead and half of the sensor nodes are alive for simulated protocols.
From Table 3 can be observed, the proposed method (FHIR) outperforms IHR and DHR schemes in
both FND and HNA metrics. As to evaluate the energy efficiency of the proposed method, the total
residual energy metric is used. The total residual energy of the network is calculated after each
round. Table 4 shows the total residual energy levels for the proposed method, IHR and DHR
schemes at various rounds. Since each sensor node has 3J initial energy level, the entire energy level
of the network is equal to 300J in scenario 1 at the beginning simulation time.
Parameter Value
Network size (meters) (100m×100m), (200m×200m)
Location of BS (50, 50), (100, 100)
Number of Sensor nodes 100, 200
Sensor Nodes Energy 3.0 J
ETx (Eelec) / ERx (Eelec) 50 nJ/bit
Data packet size 32000 bits
Number of data transmission per round 3
Query/Respond messages size 160 bits
Îľfs and Îľmp 10, 0.004 pJ/bit/m2
Eda (EAggregation) 5 nJ/bit/signal
Table 3. Values of FND and HNA metrics
Protocol FND HNA
DHR 106 166
IHR 123 289
FIHR 126 304
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
55
From the above table, it can be concluded that the FIHR method can save a little bit more energy
as compared with the IHR method and significantly save energy as compare with DHR scheme in
this scenario. Table 5 represents the throughput value during the lifetime of the network for
simulated protocols. From the table, it can be concluded that the FIHR protocol can deliver
packets a little bit more as compared with IHR and 22170 KB data packets more than DHR
protocol in scenario 1.
Table 5. Throughput for FIHR, IHR and DHR protocols
The parameter, number of dead nodes has also been considered for performance evaluation of the
network. Figure 11 represented the number of dead nodes for FIHR, DHR and IHR protocols at
various rounds. From the results, it can be observed that the proposed FIHR protocol outperforms
IHR and DHR protocols.
Figure 11. Number of dead nodes for FIHR, IHR and DHR protocols at various rounds
Protocol Packet delivery (KB)
DHR 19590 KB
IHR 41625 KB
FIHR 41760 KB
0
10
20
30
40
50
60
70
80
90
100
1
13
25
37
49
61
73
85
97
109
121
133
145
157
169
181
193
205
217
229
241
253
265
277
289
301
313
325
337
349
361
373
385
397
409
421
433
445
NumberofDeadNodes
Number of Rounds
FIHR Protocol
IHR Protocol
DHR Protocol
Table 4. Total residual energy levels for DHR, IHR and FIHR protocols
Round No.
Protocol
50 100 200 300 400
DHR 206.56 113.11 0 0 0
IHR 249.48 197.78 100.86 38.37 2.03
FIHR 250.89 200.61 106.24 40.04 4.95
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
56
6.2. Scenario 2
In this scenario, two hundred sensor nodes are randomly spread in the area size of
(200×200)m2
and the base station is placed at the center of the network at (100, 100)
coordinates. The detailed configuration of this scenario is presented in Table 2. The
simulation of the proposed method, IHR and DHR protocols yielded the following results.
As seen in Table 6 the proposed FIHR protocol performs better than IHR and DHR
protocols for both FND and HNA metrics. FIHR protocol is 42.6% and 123.33% more
efficient than IHR and DHR protocols respectively in terms of FND. Moreover, it is
29.7% and 127.66% more efficient than IHR and DHR protocols while the HNA metric
is considered for performance evaluation.
Table 6. Values of FND and HNA metrics
Figure 12 demonstrates the number of dead nodes concerning the number of rounds for both
protocols. This figure displays that the FIHR protocol is steadier than the IHR and DHR
protocols. Because the workload is distributed among cluster heads and sensor node deaths begin
later for FIHR protocol and continue linearly till all sensor nodes die in the network.
As to evaluate energy the efficiency of the FIHR protocol, the total remaining energy metric is
used. Figure 13 shows the total remaining energy levels for proposed FIHR, DHR and IHR
protocols at various rounds for scenario 2. Since each sensor node has 3J initial energy and the
Protocol FND HNA
DHR 30 94
IHR 47 165
FIHR 67 214
0
20
40
60
80
100
120
140
160
180
200
1
14
27
40
53
66
79
92
105
118
131
144
157
170
183
196
209
222
235
248
261
274
287
300
313
326
339
352
365
378
391
404
417
430
443
NumberofDeadNodes
Number of Rounds
FIHR Protocol
IHR Protocol
DHR Protocol
Figure 12. Number of dead nodes for FIHR, IHR and DHR protocols at various rounds
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
57
number of sensor nodes is200, the total energy level of the network is equal to 600J at the
beginning simulation time.
From the above figure, we can conclude that the FIHR protocol can save more energy as
compared to IHR and DHR protocols in this scenario.
Table 7 represents the throughput value during the lifetime of the network for DHR, IHR and
FIHR protocols. From the table, it can be concluded that the FIHR protocol can deliver packets
more as compared with IHR and DHR protocols. Moreover, it is 9.14% and 158.63% more
efficient than IHR and DHR protocols respectively in scenario 2.
7. CONCLUSION
The paper presented a distributed fault tolerance mechanism for wireless sensor networks. The
method designed and developed based on IHR protocol. It is called Fuzzy IHR fault tolerance
protocol. The difference between IHR and FIHR is that the IHR protocol goes through the
probabilistic model for clustering but FIHR protocol goes through the proposed fuzzy unequal
clustering scheme. Fuzzy IHR protocol tries to distribute the workload between every sensor
node. To achieve this objective, it assigns appropriate communication range to the selected
tentative primary cluster head using fuzzy logic. The fuzzy parameters to calculate
communication range values of tentative primary cluster heads are remaining energy and distance
0
100
200
300
400
500
600
1
15
29
43
57
71
85
99
113
127
141
155
169
183
197
211
225
239
253
267
281
295
309
323
337
351
365
379
393
407
421
435
449
Remainingenergy
Number of rounds
FIHR Protocol
IHR Protocol
DHR Protocol
Figure 13. The total remaining energy levels for DHR, IHR and FIHR protocols at
various rounds
Table 7. Throughput for FIHR and IHR protocols
Protocol Packet delivery (KB)
DHR 14451 KB
IHR 34246 KB
FIHR 37375 KB
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
58
tothe base station. The parameter distance between cluster heads also is considered to avoid
overlapping of them and obtaining distributed workload of cluster heads. According to the
simulation results the FIHR has better performance compared to IHR and DHR protocols in terms
of first node dead, half of the nodes alive, throughput and total energy remaining of the network.
Furthermore, results imply that the workload is distributed and the sensor nodes tend to fail later
within the lifetime of the network. Moreover, the remaining energy level of the network in FIHR
protocol at a certain round is higher than with IHR and DHR protocols. As a result, FIHR
protocol is more energy efficient than the IHR and DHR protocols. It is concluded that the
proposed protocol is a stable and energy efficient fault tolerance algorithm for WSNs.
As FIHR protocol is introduced for WSNs that containing stationary sensor nodes, it can be
extended for handling mobile sensor nodes. Furthermore, it can be extended for large scale
networks while using two or more levels of clustering.
REFERENCES
[1] Atero,F. J., Vinagre,J. J.,Ramiro J. and Wilby,M. “A low energy and adaptive routing architecture for
efficient field monitoring in heterogeneous wireless sensor networks,” In proc. IEEE Int. Conf. on
High Performance Computing and Simulation, Istanbul, Turkey, 2011, pp.449 – 455.
[2] Baroutis, N. and Younis, M., (2017)“Load-conscious maximization of base-station location privacy in
wireless sensor networks,” Computer Networks, 124, pp.126-139.
[3] Kakamanshadi, G., Gupta, S. and Singh, S. "A survey on fault tolerance techniques in Wireless
Sensor Networks," In proc. IEEE Int. Conf. on Green Computing and Internet of Things, India, 2015,
pp. 168-173.
[4] Biswas, S., Das, R. and Chatterjee, P., (2018)“Energy-efficient connected target coverage in multi-
hop wireless sensor networks,” In Industry Interactive Innovations in Science, Engineering and
Technology, Springer, Singapore, pp. 411-421.
[5] Bagci, H. and Yazici, A., (2013)“An energy aware fuzzy approach to unequal clustering in wireless
sensor networks,” Applied Soft Computing, vol. 13, no.4, pp.1741-1749.
[6] Mittal, N., Singh, U. and Sohi, B.S., (2017)“A stable energy efficient clustering protocol for wireless
sensor networks,”Wireless Networks, vol.23, no.6, pp.1809-1821.
[7] Pachlor, R. and Shrimankar, D., (2018)“EEHCCP: an energy-efficient hybrid clustering
communication protocol for wireless sensor network,” In Ad Hoc Networks, Springer, Cham, vol.223,
pp. 199-207.
[8] Wang, J., Niu, J., Wang, K. and Liu, W., (2018)“An energy efficient fuzzy cluster head selection
algorithm for WSNs,” In IEEE International Workshop on Advanced Image Technology (IWAIT),
pp. 1-4.
[9] Tamandani, Y.K., Bokhari, M.U. and Shallal, Q.M., (2017)“Two-step fuzzy logic system to achieve energy
efficiency and prolonging the lifetime of WSNs,” Wireless Networks, vol.23, no.6, pp.1889-1899.
[10] Torghabeh, N. A., Totonchi, M. R. A. and Moghaddam, M. H. Y. “Cluster Head Selection using a
Two-Level Fuzzy Logic in Wireless Sensor Networks,” In proc. 2nd IEEE Int. Conf. on Computer
Engineering and Technology, China, 2010, pp.357–361.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
59
[11] Messaoudi, A., Elkamel, R., Helali, A. and Bouallegue, R.,“Distributed fuzzy logic based routing
protocol for wireless sensor networks,” In proc. 24thIEEE Int. Conf. onSoftware,
Telecommunications and Computer Networks (SoftCOM), 2016,pp. 1-7.
[12] Arjunan, S. and Sujatha P., (2017)“A survey on unequal clustering protocols in Wireless Sensor
Networks,”Journal of King Saud University-Computer and Information Sciences,vol. xx, PP.1-14.
[13] Meikang, Q., Ming, Z., Li, J., Liu, J., Quan, G. and Zhu, Y., (2013)“Informer homed routing fault
tolerance mechanism for wireless sensor networks,” Journal of Systems Architecture, vol. 59, pp.260-
270, May. 2013.
[14] Jain, N., Vokkarane, V.M. and Wang, J.P., “Performance analysis of dual-homed fault tolerant routing
in wireless sensor networks,” In proc. IEEE Conf. on Technologies for Homeland Security, Waltham,
2008, pp. 474–479.
[15] Abedi, R. H., Aslam, N. and Ghani, S., "Fault tolerance analysis of heterogeneous wireless sensor
network," In proc. 24th IEEECanadian Conf. on Electrical and Computer Engineering, Canada, 2011,
pp.175-179.
[16] Akyildiz, F. and Vuran, C. Wireless sensor networks. 1st ed. Georgia, Institute of Technology, USA:
John Wiley & Sons, 2010, pp.48-49.
[17] Xiaoling, W., Cho, J., Brian, J. d. and Lee, S., "Energy-aware routing for wireless sensor networks by
AHP," In IFIP Int. Workshop on Software Technologies for Embedded and Ubiquitous Systems,
Springer Berlin Heidelberg, 2007, pp. 446-455.
[18] Masdari, M. and Naghiloo, F., (2017)“Fuzzy Logic-Based Sink Selection and Load Balancing in
Multi-Sink Wireless Sensor Networks,” Wireless Personal Communications, vol.97, no.2, pp.2713-
2739.
[19] El Alami, H. and Najid, A., “March. Energy-efficient fuzzy logic cluster head selection in wireless
sensor networks,” In proc.IEEE Int. Conf. on Information Technology for Organizations Development
(IT4OD), 2016, pp. 1-7.
[20] Agrawal, D. and Pandey, S., (2017)“FUCA: Fuzzy‐based unequal clustering algorithm to prolong the
lifetime of wireless sensor networks,” International Journal of Communication Systems, vol.31, no.2,
pp.1-18
[21] Shankar, T., Karthikeyan, A., Sivasankar, P., and Rajesh A., (2017)“Hybrid approach for optimal
cluster head selection in WSN using leach and monkey search algorithms,” Journal of Engineering
Science and Technology, vol.12, no.2, pp.506-517.
[22] Adhikary, D.R.D. and Mallick, D.K., (2017)“An Energy Aware Unequal Clustering Algorithm using
Fuzzy Logic for Wireless Sensor Networks,” Journal of ICT Research and Applications, vol.11, no.1,
pp.55-76.
[23] Sert, S.A., Bagci, H. and Yazici, A., (2015)“MOFCA: Multi-objective fuzzy clustering algorithm for
wireless sensor networks,” Applied Soft Computing, vol.30, pp.151-165.
[24] Logambigai, R. and Kannan, A., (2016)“Fuzzy logic based unequal clustering for wireless sensor
networks,”Wireless Networks, vol.22, no.3, pp.945-957.
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
60
AUTHORS BIOGRAPHY
GholamrezaKakamanshadi received the M.Tech. degree in Computer Engineering
from BharatiVidyapeeth University, Pune, India, in 2012. He is currently pursuing his
Ph.D. in the Department of CSE, University Institute of Engineering & Technology,
Panjab University, Chandigarh, India. His research interests are Wireless sensor
network, Body area network, Internet of Things and Network security.
Savita Gupta received the B.Tech and M.E. degree in both Computer Science and
Engineering. She obtained her Ph.D. degree in 2007 in the field of Medical Image
Processing. She has been into the teaching profession since 1992 and has published
more than 70 papers in refereed International Journals and conference proceedings.
Presently, she is working as Director in the University Institute of Engineering &
Technology, Panjab University, Chandigarh, India. She has completed various
research projects funded by various agencies like DST, AICTE, and MHRD. Her
research interests include Medical image processing, Wavelet based image
compression and denoising, Network security and Wireless sensor networks.
Sukhwinder Singh received the B.Tech degree in 1991 and M.E. degree in 1999. he
obtained his Ph.D. degree in 2006 from IIT, Roorkee. Presently, he is working as a
professor in the Department of CSE, University Institute of Engineering &
Technology, Panjab University, Chandigarh, India. His research interests include
Medical Image Processing and Analysis, Biomedical Signal Processing, Information
Retrieval, Wireless Sensor Networks, Body Area Networks, Cognitive Enhancement,
Machine Intelligence.

More Related Content

What's hot

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Modified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsModified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsijujournal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 

What's hot (18)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Modified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsnsModified ccef for energy efficiency and extended network lifetime in wsns
Modified ccef for energy efficiency and extended network lifetime in wsns
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
 
Dc31712719
Dc31712719Dc31712719
Dc31712719
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 

Similar to Fuzzy Logic Clustering Protocol Improves Fault Tolerance and Energy Efficiency in Wireless Sensor Networks

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...IJCNCJournal
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksCSCJournals
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 

Similar to Fuzzy Logic Clustering Protocol Improves Fault Tolerance and Energy Efficiency in Wireless Sensor Networks (20)

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Fuzzy Logic Clustering Protocol Improves Fault Tolerance and Energy Efficiency in Wireless Sensor Networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 DOI: 10.5121/ijcnc.2019.11403 43 FUZZY INFORMER HOMED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh Department of Computer Science & Engineering, Faculty of Engineering and Technology, Panjab University, Chandigarh, India ABSTRACT A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks. KEYWORDS Wireless Sensor Network; Routing Protocols; Fault Tolerance; Energy Efficiency; Clustering Algorithms; Fuzzy Logic system 1. INTRODUCTION A wireless sensor network (WSN) is a self-configured or self-organized network. It contains a collection of small, low powered sensor nodes with limited transmission range and the base station or sink [1, 2]. Sensor nodes in wireless sensor networks are prone to failure because of hardware and software failures, instability of communication link, battery depletion, dislocation, etc. Therefore, there is a needfor an efficient fault tolerance mechanism to manage or identify the fault and take appropriate action while it occurs [3]. A collector node has restricted capability in sensing and collecting meaningful environment information within its range. It generally transfers the sensed and collected data to the base station. The sensor nodes consume energy while sensing, processing, receiving and transferring data [4]. In the majority of cases, they have the same amount of energy which is not replaceable [5] or replacing the battery is impossible [6, 7]. Hence, energy efficiency is an important design objective in a wireless sensor network. To aggregate and transmit sensed data through efficient manner, the network can be clustered or partitioned into the number of clusters. Each cluster in the network has a cluster head. It generally receives the sensed data from cluster members then aggregates and transmits to the base station
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 44 [8].In the clustering manner, selection of a suitable cluster head is very important, it can reduce energy depletion of sensor nodes and increase the lifetime of the wireless sensor network [9, 13]. Generally, clustering procedures utilize two methods, electing cluster heads with higher remaining energy and revolving them periodically to balance energy depletion of the sensor nodes all over the network for prolonging the network lifetime. Utilizing intelligent methods improve the efficiency of wireless sensor network [10]. As an intelligent technique, fuzzy logic is the most powerful tool that can be used for clustering procedure. In a wireless sensor network, it can be used to select suitable cluster heads [9, 11]. Fuzzy logic has several advantages over traditional methods for instant, design time, computational complexity and development cost are low and it is more flexible [12].Sointhis paper, a novel fault tolerance algorithm named Fuzzy Informer Homed Routing (FIHR) protocol is introduced and simulated for wireless sensor networks using fuzzy logic. It is derived from the Informer Homed Routing (IHR) protocol [13] and Dual-Homed fault tolerant Routing (DHR) protocol [14]. Clustering procedure in IHR and DHR protocols is based on a probabilistic model same as LEACH protocol. Moreover, it is probable that some cluster heads are located in a particular zone. It means that primary cluster heads are not picked out in a distributed manner. The proposed FIHR is a distributed competitive cluster head selection with fault tolerance algorithm. The proposed method efforts on allocating suitable communication range to the tentative primary cluster heads. To make wise decisions to select primary cluster heads (PCHs), the introduced FIHR method employs fuzzy logic inference system and uses the distance to the base station and the remaining energy of available sensor nodes during simulation time. Furthermore, each primary cluster head will choose the non-cluster head locally with the higher energy left as its backup cluster head (BCH). To achieve fault tolerance, every BCH will control the aliveness of relevant PCH based on the beacon message it receives from its PCH in each round. We compare the effectiveness of FIHR protocol with IHR and DHR protocols in terms of first node dead, half of the nodes alive and total residual energy level of the network at various rounds. The results show that the proposed FIHR protocol outperforms IHR and DHR protocols. It is concluded that the suggested FIHR protocol is stable as well as energy efficient fault tolerance protocol for WSNs. The rest of this article is organized as follows: Section 2 is about related works, in section 3 Preliminaries will be discussed, in section 4 the proposed FIHR protocol will be introduced, in section 5 clustering with fuzzy logic system will be discussed, section 6 is about simulation results and discussions, and finally we conclude the paper in section 7. 2. RELATED WORK Efficiently transferring the data from collector nodes to the sink or base station is a critical issue in the wireless sensor network. Therefore, numerous faulttolerant routing protocolshave been offered in the literature. Moreover, most of the existing fault tolerance methods introduce hardware redundancy and path redundancy. For example, to offer fault tolerance against cluster head failures, DHR protocol was proposed. In this method, each cluster is structured into collector nodes and two cluster head nodes (primary and backup). Furthermore, cluster head selection procedure is performed in rounds as in Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol. In this protocol the collected data is dispatched to both cluster heads then the primary and backup cluster heads send received data packets to the base station [14] subsequentlyinsignificant energy will be consumed per packet transfer. Moreover, a major
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 45 drawback of DHR protocol is a duplication of forwarding every data packet over two disjoint paths towards thebase station. This cause decreases the overall network lifetime. Furthermore, the DHR protocol uses a simple probabilistic model which is insufficient to find the best solution for network clustering. Qiu et al. [13] presented a novel energy-aware and fault tolerance scheme for a wireless sensor network, calledInformer Homed Routing protocol. In this protocol, each collector node has two cluster heads associated with it (PCH and BCH). Furthermore, the collector node just dispatched sensed data to the BCH when it found that PCH failed, instead of transferring the data packet to the PCH and BCH simultaneity. The effectiveness of this method was compared with DHR and LEACH protocols in aspects of power consumption and the number of failed sensor nodes. Also, the throughput of the network was considered with different fault rates. Results revealed that the suggested protocol could significantly decrease power consumption and reduce data packet loss rate as well as prolong the networklifetime. IHR protocol does not measure the remaining energy level of the selected cluster head during cluster formation. Moreover, the suggested protocol uses a simple probabilistic model which is not enough to gain the best solution for clustering. Furthermore, the IHR protocol does not take into considerations the distance among primary cluster heads. Abedi et al. [15] introduced a new fault tolerance algorithm. In this algorithm, to guarantee a fault tolerant topology, each sensor node must select two nearest relay nodes and can be considered as primary and backup cluster heads. Furthermore, the failure probability value of each relay node was used to discover the most optimal path in the current network topology. Moreover, the relay node with the lowest probability of failure will become the primary cluster head and the second one is considered as a backup. Therefore, sensor nodes could send a data packet through the suitable relay nodes to the sink and the event of primary cluster head failure, sensor nodes could send a data packet through the backup cluster head. The simulation results were used to examine only the fault tolerance level of the networks. There is a limitation of this method, sensor nodes select the next hop relay node without taking into account the total distance among itself and the base station also does not consider the residual energy of them. 3. PRELIMINARIES To describe the suggested protocol in detail, the characteristics of the network model that are used in the simulation process are introduced. Thus, the following assumptions that are made about the wireless sensor network model are given below: • Sensor nodes are distributed in the 100m×100m and 200m×200m square field randomly. • There areonly one base station and its located at the center of the field. • Every sensor nodes and the base station are fixed after the distribution phase. • Sensor nodes are capable of altering the transmission power according to the distance of the receiver nodes. • All sensor nodes have equal energy when they are initially distributed. • Each cluster has primary and backup cluster head nodes. • For each collector node in the network, there is only one primary/backup cluster head to reach the BS. In this paper, the energy consumption model proposed in [16, 17, 18] has been used.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 46 3.1. An overview of IHR protocol IHR is a distributed fault management technique, it considers two important aspects for a wireless sensor network, the first one is energy consumption and the second one is reliability. In this protocol, each collector node within a cluster has two cluster heads associated with it (PCH and BCH). Furthermore, each collector node only sent a data packet to the backup one when it discovered that the main cluster head failed, instead of transferring a data packet to the main cluster head and backup cluster head simultaneity. Therefore, the data transmitting process will not be interrupted during the lifetime of the network. Figure 1 illustrates the network model for the IHR protocol. IHR protocol considers hardware faults, particularly main cluster head failure. The hardware faults may be caused by receiver/transmitter failure, battery exhaustion, malicious attack, and malicious human activities. In this protocol, the impact of hardware failure is considered, because when amain cluster head gets fail, its relevant sensor nodes are disconnected. This will meaningfully decrease the availability and reliability of the sensor network. 3.2. An overview of the DHR protocol DHR protocol considers an important aspect of wireless sensor network which is reliability. In this protocol, each collector node within a cluster has two cluster heads associated with it (PCH and BCH). Furthermore, each collector node sends a data packet to both of them at the same time. Consequently, aggregated data packets are forwarded to the base station through primary cluster heads as well as backup cluster heads. This protocol can guarantee data loss issue while a primary cluster head gets fail. A major drawback of DHR protocol is a duplication of forwarding every data packet over two disjoint paths towards the base station. Therefore, in data packet transferring procedure, energy will consume more and the overall network lifetime will be decreased. Figure 1. The network model for IHR protocol
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 47 4. PROPOSED FIHR PROTOCOL The fuzzy IHR protocol is implemented based on the IHR protocol. The difference between IHR and FIHR is that the IHR protocol goes through the probabilistic model for clustering but FIHR protocol goes through the proposed fuzzy unequal clustering scheme. Furthermore, the distance between cluster heads has been considered to provide clustering in a distributed manner. The following pseudocode represented how the FIHR algorithm is implemented. Pseudocode: Fuzzy Informer Homed Routing Input: Network setting configuration N ← Number of deployed sensor nodes R ← Number of Rounds M← Number of times for data packet transmission Output: FIHR Scheme 1: T← probability to become a tentative CH 2: Node Status← Non Cluster Head (NCH) 3: clusterMembers← Null 4: myClusterHead← Null 5: beTentativeCH← True 6: inquiry counter ← Null 7:for rounds.index=1:1: R do 8:x ← rand (0, 1) 9: if x < T then 10:Measure distance to BS for Candidate CH 11:Calculate ComR of Candidate CH applying fuzzy logic (Input: Distance, Energy) 12:if ComR> Threshold 13: beTentativeCH ← False 14: else 15: Calculate distance to other PCHs 16: if ComR<=distance-ComR 17: Node Status ← Primary Cluster Head (PCH) 18: Advertise PCHmessage (ID, ComR) to other nodes 19: else 20: beTentativeCH ← False 21: end if 22: end if 23: On receiving all PCHmessages 24: myClusterHead ← The nearest PCH 25: Send JoinMessage(ID) to the closest PCH 26: Each PCH will select the node with the higher energy left among its entire cluster Members as the BCH. 27: After selection of the BCHs, each PCH will inform its cluster members about BCH. 28: end if 29: for times index =1:1: M do 30: Each BCH starts inquiry from its relevant PCH for checking the aliveness. 31: inquiry counter ← inquiry counter+1. 32: if PCH is still working then 33: PCH receives inquiry message from BCH then responds to confirm its aliveness. 34: Upon receiving the respond message from PCH, inquiry counter ← inquiry counter-1 35: end if 36: if inquiries counter > 3 then 37: BCH decides the relevant PCH has failed then 38: it sends inform message to its NCHs that send data packet to itself afterwards. 39: end if 40: if NCH receives the informer message from BCH then 41: dispatches data packet to its relevant BCH. 42: else 43: dispatches data packet to its relevant PCH. 44: end if 45: end for 46: end for
  • 6. International Journal of Computer Networks & Communica In this protocol, there are two fuzzy input variables; the first one is residual energy and the second one is the distance to (ComR) stands for the fuzzy output variable. If a sensor the competition, it becomes a tentative CH then in t primary cluster head. Furthermore, the selection of a primary cluster head is not only based on fuzzy input variables. The distance between primary cluster considered to increase the performance of the network. Moreover, each primary cluster head will select a sensor node with the highest energy left from its cluster members as backup. Each primary cluster head will be check for aliveness by Figure 2 shows the schematic chart of proposed FIHR protocol Figure Computer Networks & Communications (IJCNC) Vol.11, No.4, July In this protocol, there are two fuzzy input variables; the first one is residual energy and the second one is the distance to thebase station. Furthermore, the communication range (ComR) stands for the fuzzy output variable. If a sensor node has selected the competition, it becomes a tentative CH then in the local area competes primary cluster head. Furthermore, the selection of a primary cluster head is not only based on fuzzy input variables. The distance between primary cluster increase the performance of the network. Moreover, each primary cluster node with the highest energy left from its cluster members as . Each primary cluster head will be check for aliveness by its backup cluster head. Figure 2 shows the schematic chart of proposed FIHR protocol. Figure 2. Schematic chart of the proposed FIHR protocol tions (IJCNC) Vol.11, No.4, July 2019 48 In this protocol, there are two fuzzy input variables; the first one is residual energy and the base station. Furthermore, the communication range node has selected tocontribute in he local area competes to become primary cluster head. Furthermore, the selection of a primary cluster head is not only based on fuzzy input variables. The distance between primary cluster heads is also increase the performance of the network. Moreover, each primary cluster node with the highest energy left from its cluster members as a its backup cluster head.
  • 7. International Journal of Computer Networks & Communica 5. CLUSTERING WITH F In this section, the proposed clustering piece of FIHR protocol using details. It is a distributed unequal clustering. It makes the local decision for determining communication range which leads to selecting primary cluster head the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads. In the FIHR protocol, selecting a tentative primary cluster head is based on a scheme. To estimate the communication range for a tentative primary cluster head, it employs both distances to BS and residual energy factors. The communication range of each candidate primary cluster head is determined by using predefined fuzzy if-then rules to han Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference technique. The Center of Area (COA) scheme is employed for communication range [4]. The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system, fuzzy rule base, and defuzzification with input and output variables. In the introduced method there are two crisp values as inputs (distance to BS value (Communication range). The basic model for fuzzy logic system incorporated in the proposed FIHR protocol is shown in Figure 3 • Fuzzification:Itstands for converting crisp input values into fuzzy sets through membership functions. • Fuzzy rule base: It is used for storing If • Fuzzy inference engine: simulate the reasoning by which it produces a fuzzy inference. • Defuzzification:It stands for converting fuzzy outputs into crisp values. For simplicity, trapezoidal and triangular membership fun protocol. The mathematical formula for triangular membership function is described as in equation (1) [24]. Figure 3. The basic model of the fuzzy logic system i Computer Networks & Communications (IJCNC) Vol.11, No.4, July FUZZY LOGIC SYSTEM In this section, the proposed clustering piece of FIHR protocol using fuzzy logic details. It is a distributed unequal clustering. It makes the local decision for determining communication range which leads to selecting primary cluster heads. Furthermore, it takes benefits of the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads. In the FIHR protocol, selecting a tentative primary cluster head is based on a estimate the communication range for a tentative primary cluster head, it employs to BS and residual energy factors. The communication range of each candidate primary cluster head is determined by using then rules to handle the uncertainty. Furthermore, to evaluate the rules, the Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference technique. The Center of Area (COA) scheme is employed for defuzzification The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system, fuzzy rule base, and defuzzification with input and output variables. In the introduced method there are two crisp values as inputs (distance to BS and residual energy) and one output crisp value (Communication range). The basic model for fuzzy logic system incorporated in the proposed FIHR protocol is shown in Figure 3. for converting crisp input values into fuzzy sets through membership is used for storing If-Then rules. Fuzzy inference engine: It is used for combining fuzzy input values and fuzzy rules to simulate the reasoning by which it produces a fuzzy inference. stands for converting fuzzy outputs into crisp values. For simplicity, trapezoidal and triangular membership functions are used in the proposed . The mathematical formula for triangular membership function is described as in . The basic model of the fuzzy logic system in FIHR protocol tions (IJCNC) Vol.11, No.4, July 2019 49 logic is described in details. It is a distributed unequal clustering. It makes the local decision for determining s. Furthermore, it takes benefits of the fuzzy logic scheme to calculate the communication range of candidate primary cluster heads. In the FIHR protocol, selecting a tentative primary cluster head is based on a probabilistic estimate the communication range for a tentative primary cluster head, it employs The communication range of each candidate primary cluster head is determined by using dle the uncertainty. Furthermore, to evaluate the rules, the Mamdani method, which is one of the most frequently used methods, is used as a fuzzy inference defuzzificationof the The fuzzy logic system contains four modules [18, 10, 19]; fuzzification, fuzzy inference system, fuzzy rule base, and defuzzification with input and output variables. In the introduced method and residual energy) and one output crisp value (Communication range). The basic model for fuzzy logic system incorporated in the for converting crisp input values into fuzzy sets through membership is used for combining fuzzy input values and fuzzy rules to are used in the proposed FIHR . The mathematical formula for triangular membership function is described as in n FIHR protocol
  • 8. International Journal of Computer Networks & Communica Triangular The parameters {x, z, y} while underlying triangular membership function. There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost trapezoidal functions. These are defined in terms of coordinates support limit, b is the upper limit, mathematical formula for leftmost and rightmost trapezoidal membership functions are described as in equations (1) and (2). Rightmost trapezoidal In case of Rightmost trapezoidal, the coordinate Leftmost trapezoidal In case Leftmost trapezoidal the coordinate Figure 4 depicts an example of the triangular m Figure 5 represents an example of the rightmost trapezoidal membership function and Figure 6 illustrates leftmost trapezoidal membership function of the proposed FIHR protocol. Figure Computer Networks & Communications (IJCNC) Vol.11, No.4, July Triangular m; x, z, y 0 "# $ % & '() *() "# & + $ + , -(' -(* "# , + $ + . 0 "# . + $ /(1) while (x < z < c), determine the m coordinates of the three angles of the underlying triangular membership function. There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost These are defined in terms of coordinates {a, b, c, d} is the upper limit, c is lower limit and d is lower support limit. mathematical formula for leftmost and rightmost trapezoidal membership functions are described as Rightmost trapezoidal m; a, b 1 0 "# $ 2 3 4(' 4(5 "# 6 + $ + 3 1 "# $ % 6 In case of Rightmost trapezoidal, the coordinate a is less than coordinate b, while c Leftmost trapezoidal m; c, d 1 0 "# $ 2 9 '(: 4(5 "# 9 + $ + ; 1 "# $ % ; In case Leftmost trapezoidal the coordinate c is less than coordinate d, while aand b Figure 4 depicts an example of the triangular membership function. represents an example of the rightmost trapezoidal membership function and Figure 6 illustrates leftmost trapezoidal membership function of the proposed FIHR protocol. Figure 4. Triangular membership function tions (IJCNC) Vol.11, No.4, July 2019 50 /(1) coordinates of the three angles of the There are two types of a trapezoidal function, which are named leftmost trapezoidal and rightmost {a, b, c, d}, where a is upper is lower support limit. The mathematical formula for leftmost and rightmost trapezoidal membership functions are described as /(2) c and d are -∞. /(3) are +∞. represents an example of the rightmost trapezoidal membership function and Figure 6 illustrates leftmost trapezoidal membership function of the proposed FIHR protocol.
  • 9. International Journal of Computer Networks & Communica Figure The fuzzy set that defines the distance to Figure 7. The linguistic variables for distance to BS are membership function is preferred for preferred formed. Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in Figure 8. The linguistic variables for this fuzzy set are linguistic variables have a trapezoidal membership function triangular membership function. Figure Figure 7 Computer Networks & Communications (IJCNC) Vol.11, No.4, July Figure 6. Leftmost trapezoidal membership function The fuzzy set that defines the distance to thebase station as an input variable is represented in Figure 7. The linguistic variables for distance to BS are close, med and membership function is preferred for close and far and a triangular membe Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in Figure 8. The linguistic variables for this fuzzy set are low, med and high. The linguistic variables have a trapezoidal membership function while med linguistic variable has a triangular membership function. Figure 5. Rightmost trapezoidal membership function 7. Membership functions of distance to base station tions (IJCNC) Vol.11, No.4, July 2019 51 station as an input variable is represented in and far. A trapezoidal and a triangular membership function is Moreover, the fuzzy set that defines the residual energy as another input variable is demonstrated in . The low and high linguistic variable has a
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 52 The fuzzy output variable is the communication range of the tentative primary cluster head. The fuzzy set for the communication range is represented in Figure 9. The linguistic variables for this fuzzy set are very small, small, rather small, med-small, med, med-large, ratherlarge,large and very large. A trapezoidal membership function is preferred for very small and very large variables. The remaining linguistic variables are represented by using the triangular membership function. One of the main modules of the fuzzy inference system is the if-then rules which are designed to simulate the real world behavior [18]. The rules are typically based on knowledge of experts and experience on the same domain [8]. After the fuzzification step, the obtained membership values are applied to if-then rules for determining fuzzy output set. Table 1 represents the possible rules that are considered in the proposed FIHR protocol for calculating the communication range of a Figure 8. Membership functions of residual energy Figure 9. Membership functions of communication range
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 53 tentative PCH. If a selected tentative PCH located far away from the base station and its energy is full, then it has the highest communication range (very large). On the other hand, if its energy is very low and it is the nearest sensor node to the base station, then it has the lowest communication range (very small). Furthermore, the remaining intermediate possibilities fall among these two extreme cases. Table 1. Possible if-then rules In the defuzzification step, the Center of Area (COA) scheme is employed for a crisp output value (ComR). The relationship between input variables (residual energy and distance to base station) and the output variable (communication range) is represented in Figure 10. 6. SIMULATION RESULTS AND DISCUSSIONS To evaluate the performance of the proposed protocol, two different scenarios are implemented. In the first scenario, hundred sensor nodes are randomly spread in the area size of (100×100) m2 anda base station is placed at the center of the network, at (50, 50) coordinates. In the second Rule No. Fuzzy input variables Fuzzy output variable Residual energy (J) Distance to BS (m) ComR 1 Low Close Verysmall 2 Med Close Small 3 High Close Rathersmall 4 Low Med Medsmall 5 Med Med Med 6 High Med Medlarge 7 Low Far Ratherlarge 8 Med Far Large 9 High Far Verylarge Figure 10. The relationship between input and output variables in the proposed FIHR fuzzy logic system
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 54 scenario, two hundred sensor nodes are randomly spread in the area size of (200×200) m2 and a base station is placed at the center of the network, at (100, 100) coordinates. The simulation parameters are summarized in Table 2. Table 2. Simulation parameters The numberof researchers used the metrics First Node Dead (FND) and Half of Nodes Alive (HNA) to evaluate the performance of the network [4, 20, 21, 22] and to estimate the lifetime of the network [4]. The metric FND denotes an estimated value for the round in which the first sensor node dies. Furthermore, the metric HNA denotes an estimated value for the round in which the half of sensor nodes dies [23]. Therefore, the metrics FND and HNA isused to evaluate the effectiveness of the proposed protocol over the IHR and DHR protocols. To yield more reliable outcomes, the experiments were conducted 20 times and the averages of the results have been taken for each protocol. Furthermore, to assess the performance of the offered protocol over the IHR and DHR protocols, two different scenarios are developed. 6.1. Scenario 1 In this scenario, hundred sensor nodes are randomly spread in the area size of (100×100) m2 and the base station is placed at the center of the network at (50, 50) coordinates. The detailed configuration of this scenario is presented in Table 2. The simulation of the proposed method, IHR and DHR schemes yielded the following results: Table 3 shows the measured values of FND and HNA metrics concerning the number of rounds till which the first sensor node gets dead and half of the sensor nodes are alive for simulated protocols. From Table 3 can be observed, the proposed method (FHIR) outperforms IHR and DHR schemes in both FND and HNA metrics. As to evaluate the energy efficiency of the proposed method, the total residual energy metric is used. The total residual energy of the network is calculated after each round. Table 4 shows the total residual energy levels for the proposed method, IHR and DHR schemes at various rounds. Since each sensor node has 3J initial energy level, the entire energy level of the network is equal to 300J in scenario 1 at the beginning simulation time. Parameter Value Network size (meters) (100m×100m), (200m×200m) Location of BS (50, 50), (100, 100) Number of Sensor nodes 100, 200 Sensor Nodes Energy 3.0 J ETx (Eelec) / ERx (Eelec) 50 nJ/bit Data packet size 32000 bits Number of data transmission per round 3 Query/Respond messages size 160 bits Îľfs and Îľmp 10, 0.004 pJ/bit/m2 Eda (EAggregation) 5 nJ/bit/signal Table 3. Values of FND and HNA metrics Protocol FND HNA DHR 106 166 IHR 123 289 FIHR 126 304
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 55 From the above table, it can be concluded that the FIHR method can save a little bit more energy as compared with the IHR method and significantly save energy as compare with DHR scheme in this scenario. Table 5 represents the throughput value during the lifetime of the network for simulated protocols. From the table, it can be concluded that the FIHR protocol can deliver packets a little bit more as compared with IHR and 22170 KB data packets more than DHR protocol in scenario 1. Table 5. Throughput for FIHR, IHR and DHR protocols The parameter, number of dead nodes has also been considered for performance evaluation of the network. Figure 11 represented the number of dead nodes for FIHR, DHR and IHR protocols at various rounds. From the results, it can be observed that the proposed FIHR protocol outperforms IHR and DHR protocols. Figure 11. Number of dead nodes for FIHR, IHR and DHR protocols at various rounds Protocol Packet delivery (KB) DHR 19590 KB IHR 41625 KB FIHR 41760 KB 0 10 20 30 40 50 60 70 80 90 100 1 13 25 37 49 61 73 85 97 109 121 133 145 157 169 181 193 205 217 229 241 253 265 277 289 301 313 325 337 349 361 373 385 397 409 421 433 445 NumberofDeadNodes Number of Rounds FIHR Protocol IHR Protocol DHR Protocol Table 4. Total residual energy levels for DHR, IHR and FIHR protocols Round No. Protocol 50 100 200 300 400 DHR 206.56 113.11 0 0 0 IHR 249.48 197.78 100.86 38.37 2.03 FIHR 250.89 200.61 106.24 40.04 4.95
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 56 6.2. Scenario 2 In this scenario, two hundred sensor nodes are randomly spread in the area size of (200×200)m2 and the base station is placed at the center of the network at (100, 100) coordinates. The detailed configuration of this scenario is presented in Table 2. The simulation of the proposed method, IHR and DHR protocols yielded the following results. As seen in Table 6 the proposed FIHR protocol performs better than IHR and DHR protocols for both FND and HNA metrics. FIHR protocol is 42.6% and 123.33% more efficient than IHR and DHR protocols respectively in terms of FND. Moreover, it is 29.7% and 127.66% more efficient than IHR and DHR protocols while the HNA metric is considered for performance evaluation. Table 6. Values of FND and HNA metrics Figure 12 demonstrates the number of dead nodes concerning the number of rounds for both protocols. This figure displays that the FIHR protocol is steadier than the IHR and DHR protocols. Because the workload is distributed among cluster heads and sensor node deaths begin later for FIHR protocol and continue linearly till all sensor nodes die in the network. As to evaluate energy the efficiency of the FIHR protocol, the total remaining energy metric is used. Figure 13 shows the total remaining energy levels for proposed FIHR, DHR and IHR protocols at various rounds for scenario 2. Since each sensor node has 3J initial energy and the Protocol FND HNA DHR 30 94 IHR 47 165 FIHR 67 214 0 20 40 60 80 100 120 140 160 180 200 1 14 27 40 53 66 79 92 105 118 131 144 157 170 183 196 209 222 235 248 261 274 287 300 313 326 339 352 365 378 391 404 417 430 443 NumberofDeadNodes Number of Rounds FIHR Protocol IHR Protocol DHR Protocol Figure 12. Number of dead nodes for FIHR, IHR and DHR protocols at various rounds
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 57 number of sensor nodes is200, the total energy level of the network is equal to 600J at the beginning simulation time. From the above figure, we can conclude that the FIHR protocol can save more energy as compared to IHR and DHR protocols in this scenario. Table 7 represents the throughput value during the lifetime of the network for DHR, IHR and FIHR protocols. From the table, it can be concluded that the FIHR protocol can deliver packets more as compared with IHR and DHR protocols. Moreover, it is 9.14% and 158.63% more efficient than IHR and DHR protocols respectively in scenario 2. 7. CONCLUSION The paper presented a distributed fault tolerance mechanism for wireless sensor networks. The method designed and developed based on IHR protocol. It is called Fuzzy IHR fault tolerance protocol. The difference between IHR and FIHR is that the IHR protocol goes through the probabilistic model for clustering but FIHR protocol goes through the proposed fuzzy unequal clustering scheme. Fuzzy IHR protocol tries to distribute the workload between every sensor node. To achieve this objective, it assigns appropriate communication range to the selected tentative primary cluster head using fuzzy logic. The fuzzy parameters to calculate communication range values of tentative primary cluster heads are remaining energy and distance 0 100 200 300 400 500 600 1 15 29 43 57 71 85 99 113 127 141 155 169 183 197 211 225 239 253 267 281 295 309 323 337 351 365 379 393 407 421 435 449 Remainingenergy Number of rounds FIHR Protocol IHR Protocol DHR Protocol Figure 13. The total remaining energy levels for DHR, IHR and FIHR protocols at various rounds Table 7. Throughput for FIHR and IHR protocols Protocol Packet delivery (KB) DHR 14451 KB IHR 34246 KB FIHR 37375 KB
  • 16. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 58 tothe base station. The parameter distance between cluster heads also is considered to avoid overlapping of them and obtaining distributed workload of cluster heads. According to the simulation results the FIHR has better performance compared to IHR and DHR protocols in terms of first node dead, half of the nodes alive, throughput and total energy remaining of the network. Furthermore, results imply that the workload is distributed and the sensor nodes tend to fail later within the lifetime of the network. Moreover, the remaining energy level of the network in FIHR protocol at a certain round is higher than with IHR and DHR protocols. As a result, FIHR protocol is more energy efficient than the IHR and DHR protocols. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for WSNs. As FIHR protocol is introduced for WSNs that containing stationary sensor nodes, it can be extended for handling mobile sensor nodes. Furthermore, it can be extended for large scale networks while using two or more levels of clustering. REFERENCES [1] Atero,F. J., Vinagre,J. J.,Ramiro J. and Wilby,M. “A low energy and adaptive routing architecture for efficient field monitoring in heterogeneous wireless sensor networks,” In proc. IEEE Int. Conf. on High Performance Computing and Simulation, Istanbul, Turkey, 2011, pp.449 – 455. [2] Baroutis, N. and Younis, M., (2017)“Load-conscious maximization of base-station location privacy in wireless sensor networks,” Computer Networks, 124, pp.126-139. [3] Kakamanshadi, G., Gupta, S. and Singh, S. "A survey on fault tolerance techniques in Wireless Sensor Networks," In proc. IEEE Int. Conf. on Green Computing and Internet of Things, India, 2015, pp. 168-173. [4] Biswas, S., Das, R. and Chatterjee, P., (2018)“Energy-efficient connected target coverage in multi- hop wireless sensor networks,” In Industry Interactive Innovations in Science, Engineering and Technology, Springer, Singapore, pp. 411-421. [5] Bagci, H. and Yazici, A., (2013)“An energy aware fuzzy approach to unequal clustering in wireless sensor networks,” Applied Soft Computing, vol. 13, no.4, pp.1741-1749. [6] Mittal, N., Singh, U. and Sohi, B.S., (2017)“A stable energy efficient clustering protocol for wireless sensor networks,”Wireless Networks, vol.23, no.6, pp.1809-1821. [7] Pachlor, R. and Shrimankar, D., (2018)“EEHCCP: an energy-efficient hybrid clustering communication protocol for wireless sensor network,” In Ad Hoc Networks, Springer, Cham, vol.223, pp. 199-207. [8] Wang, J., Niu, J., Wang, K. and Liu, W., (2018)“An energy efficient fuzzy cluster head selection algorithm for WSNs,” In IEEE International Workshop on Advanced Image Technology (IWAIT), pp. 1-4. [9] Tamandani, Y.K., Bokhari, M.U. and Shallal, Q.M., (2017)“Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs,” Wireless Networks, vol.23, no.6, pp.1889-1899. [10] Torghabeh, N. A., Totonchi, M. R. A. and Moghaddam, M. H. Y. “Cluster Head Selection using a Two-Level Fuzzy Logic in Wireless Sensor Networks,” In proc. 2nd IEEE Int. Conf. on Computer Engineering and Technology, China, 2010, pp.357–361.
  • 17. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 59 [11] Messaoudi, A., Elkamel, R., Helali, A. and Bouallegue, R.,“Distributed fuzzy logic based routing protocol for wireless sensor networks,” In proc. 24thIEEE Int. Conf. onSoftware, Telecommunications and Computer Networks (SoftCOM), 2016,pp. 1-7. [12] Arjunan, S. and Sujatha P., (2017)“A survey on unequal clustering protocols in Wireless Sensor Networks,”Journal of King Saud University-Computer and Information Sciences,vol. xx, PP.1-14. [13] Meikang, Q., Ming, Z., Li, J., Liu, J., Quan, G. and Zhu, Y., (2013)“Informer homed routing fault tolerance mechanism for wireless sensor networks,” Journal of Systems Architecture, vol. 59, pp.260- 270, May. 2013. [14] Jain, N., Vokkarane, V.M. and Wang, J.P., “Performance analysis of dual-homed fault tolerant routing in wireless sensor networks,” In proc. IEEE Conf. on Technologies for Homeland Security, Waltham, 2008, pp. 474–479. [15] Abedi, R. H., Aslam, N. and Ghani, S., "Fault tolerance analysis of heterogeneous wireless sensor network," In proc. 24th IEEECanadian Conf. on Electrical and Computer Engineering, Canada, 2011, pp.175-179. [16] Akyildiz, F. and Vuran, C. Wireless sensor networks. 1st ed. Georgia, Institute of Technology, USA: John Wiley & Sons, 2010, pp.48-49. [17] Xiaoling, W., Cho, J., Brian, J. d. and Lee, S., "Energy-aware routing for wireless sensor networks by AHP," In IFIP Int. Workshop on Software Technologies for Embedded and Ubiquitous Systems, Springer Berlin Heidelberg, 2007, pp. 446-455. [18] Masdari, M. and Naghiloo, F., (2017)“Fuzzy Logic-Based Sink Selection and Load Balancing in Multi-Sink Wireless Sensor Networks,” Wireless Personal Communications, vol.97, no.2, pp.2713- 2739. [19] El Alami, H. and Najid, A., “March. Energy-efficient fuzzy logic cluster head selection in wireless sensor networks,” In proc.IEEE Int. Conf. on Information Technology for Organizations Development (IT4OD), 2016, pp. 1-7. [20] Agrawal, D. and Pandey, S., (2017)“FUCA: Fuzzy‐based unequal clustering algorithm to prolong the lifetime of wireless sensor networks,” International Journal of Communication Systems, vol.31, no.2, pp.1-18 [21] Shankar, T., Karthikeyan, A., Sivasankar, P., and Rajesh A., (2017)“Hybrid approach for optimal cluster head selection in WSN using leach and monkey search algorithms,” Journal of Engineering Science and Technology, vol.12, no.2, pp.506-517. [22] Adhikary, D.R.D. and Mallick, D.K., (2017)“An Energy Aware Unequal Clustering Algorithm using Fuzzy Logic for Wireless Sensor Networks,” Journal of ICT Research and Applications, vol.11, no.1, pp.55-76. [23] Sert, S.A., Bagci, H. and Yazici, A., (2015)“MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks,” Applied Soft Computing, vol.30, pp.151-165. [24] Logambigai, R. and Kannan, A., (2016)“Fuzzy logic based unequal clustering for wireless sensor networks,”Wireless Networks, vol.22, no.3, pp.945-957.
  • 18. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019 60 AUTHORS BIOGRAPHY GholamrezaKakamanshadi received the M.Tech. degree in Computer Engineering from BharatiVidyapeeth University, Pune, India, in 2012. He is currently pursuing his Ph.D. in the Department of CSE, University Institute of Engineering & Technology, Panjab University, Chandigarh, India. His research interests are Wireless sensor network, Body area network, Internet of Things and Network security. Savita Gupta received the B.Tech and M.E. degree in both Computer Science and Engineering. She obtained her Ph.D. degree in 2007 in the field of Medical Image Processing. She has been into the teaching profession since 1992 and has published more than 70 papers in refereed International Journals and conference proceedings. Presently, she is working as Director in the University Institute of Engineering & Technology, Panjab University, Chandigarh, India. She has completed various research projects funded by various agencies like DST, AICTE, and MHRD. Her research interests include Medical image processing, Wavelet based image compression and denoising, Network security and Wireless sensor networks. Sukhwinder Singh received the B.Tech degree in 1991 and M.E. degree in 1999. he obtained his Ph.D. degree in 2006 from IIT, Roorkee. Presently, he is working as a professor in the Department of CSE, University Institute of Engineering & Technology, Panjab University, Chandigarh, India. His research interests include Medical Image Processing and Analysis, Biomedical Signal Processing, Information Retrieval, Wireless Sensor Networks, Body Area Networks, Cognitive Enhancement, Machine Intelligence.