SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 05, Issue 02 (February. 2015), ||V4|| PP 13-16
International organization of Scientific Research 13 | P a g e
Improved Location Ware Fault Tolerant Mobile Wireless Sensor
Network
SumitBhanwala
Quality Engineer at Cvent
Abstract:-A sensor network is composed of a large number of sensor nodes that are densely deployed inside or
very close to the phenomenon. Random deployment and self-organization capability In this paper we review
some of location aware Routing protocol and describe the ongoing work to improve these routing protocol and
in the later section of the paper we have proposed a solution to improve the existing LARP based solution as
well as we have proposed the methodology to the existing solution.
Keywords: fault tolerant, network lifetime, leach, WSN.
I. INTRODUCTION
Since wireless sensor networks (WSNs) consist of hundreds and thousands of unattended, resource-
constraint and low–energy sensor nodes designing energy efficient routing protocols is significantly important.
Clustering-based routing protocols are more useful in the context of energy efficiency where several sensor
nodes in the communication range of one another form a cluster. Each cluster has a cluster head (CH)[1], which
coordinates all the nodes of a cluster. There may be a number of base stations (BS) also known as sink in a
WSN that communicate with other networks. A CH aggregates data that are received from all member nodes of
a cluster and sends to the BS. Besides CH, there exist gateway nodes in a cluster which are used for inter-cluster
communications [2]. Hence, clustering protocols produce limited useful information from large amount of raw
sensed data and transmitting this precise useful information to the BS of the network consume less energy [1, 2].
Most clustering protocols of WSN in the literature are designed for static sensor nodes. Thus, these protocols do
not work for WSN applications that require mobile sensor nodes, such as habitat monitoring, wild life
monitoring, target tracking and battlefield surveillance.
Moreover, these protocols do not support localization of sensor nodes but only assume that each node
know their location, which make these protocols inefficient. For instance, low energy adaptive clustering
hierarchy (LEACH) Protocol [3] is a standard static clustering protocol of WSN. LEACH is enhanced as
LEACH-Mobile [4], LEACH-Mobile-Enhancement [5], and cluster based routing protocol formobile nodes in
wireless sensor network (CBR Mobile-WSN) [1] to support mobility of sensor nodes. In these protocols, which
are presented in detail in Section 2, if a non-CH sensor node A does not receive Data Request packets from CH
or CH does not receive data from node A after sending the data request packet, the node A is assumed to be
moved from its previous location. Then the CH discards the timeslot of node A and allocates this free timeslot to
a new mobile member node of this cluster. Node A also tries to find a new CH node of a cluster. However, this
same condition may also arise for the failure of CH and non-CH cluster members. Thus, these protocols cannot
detect the failure of sensor nodes. Moreover, these protocols work in rounds and initiate a new cluster formation
phase at every round, where each round comprises cluster formation, CH selection and data transmission phases.
This is also not considered energy efficient since a large number of messages are transmitted to form a cluster.
To alleviate this problem we propose a location aware fault tolerant clustering protocol for mobile WSN (LFCP-
MWSN). In this protocol, a special packet is sent by a non-CH node A if A has no sensed data to send to the CH
at its allocated timeslot and thus, saves energy by not sending data at every timeslot. At the end of around a node
with the least mobility is selected as a new CH, which is calculated as the ratio of the number movements of a
node inside and outside of its cluster. Moreover, CH does not receive data or special packet from a node A at its
allocated timeslot if (i) data or special packet transmission fails (ii) node A moves out of the cluster or (iii) node
A dies. In such case, CH waits until the next timeslot for node A to confirm the transmissionfailure. If CH does
not receive data or special packet from node A in the next timeslot CH deletes node A from its member list,
discards the timeslot of node A and also notifies BS the ID of node A. In each frame, a timeslot is kept free for
allowing the moving nodes to notify the CH of a new cluster. Thus, if node A moves into a new cluster it sends
a JOIN REQUEST message to the CH of new cluster at the free timeslot. CH of this new cluster accepts the
JOIN REQUEST of node a only when a timeslot becomes free because of the moving of another node out this
cluster. Then the CH of this cluster sends the ID of node A to BS. Thus, if BS receives ID of the node A from
two different CH as a leaving node from a cluster at frame x and a new node into a cluster at frame, then node A
is considered to be moved from a cluster. Otherwise, node A is considered as a failed node. In addition to this,
Improved location ware fault tolerant mobile wireless sensor network
International organization of Scientific Research 14 | P a g e
LFCP-MWSN supports sensors localization in the cluster formation phase and every time a node moves to a
new location since without location information sensors data are meaningless for most of the applications.
II. LITERATURE SURVEY
In [6], Bajaber and Awan propose dynamic static clustering protocol (DSC) for (WSN) and find the
DSC has better performance than LEACH in terms of energy efficiency, network lifetime and communication
overhead. DSC protocol has dynamic and static cases. Dynamic case is divided into two phases: setup and
steady phase. In the setup phase, the base station (BS) forms clusters and selects CH for each cluster based on
the energy levels and positions of the sensor nodes. Then, the BS broadcasts CH ID to all nodes. A sensor node
will be a CH if its ID matches with the CH ID. In the steady phase, CH uses TDMA scheme by dividing each
frame into x number of timeslots, where x is the total number of non-CH nodes in that cluster. A non-CH node
transmits data to the CH only in the allocated timeslots and saves energy by turning its radio off (sleep mode) in
all other timeslots. When a round is completed, data transmitted by all non-CH nodes are aggregated and sent by
the CHs to the BS. In the next round, the current CH of a cluster selects a node as a new CH, which has the most
remaining energy.To provide mobility of sensor nodes, Kim and Chung [4] propose LEACH-Mobile (LEACH-
M) routing protocol where cluster formation and CH selection mechanism is same as LEACH. LEACH-M
ensures the communication of a node with a CH even if node is in motion by transmitting data request packet
from CH to the sensor node in its allocated timeslot using TDMA scheme. For this purpose, a member node A
of a cluster with CH B waits two timeslots of two consecutive frames to decide whether A has moved. The node
A does not send any data at its allocated timeslot to B until it receives data-request from B and if the node
ADoes not receive any Data Request at the beginning of a timeslot (when it is awake) from B then A goes to the
sleeping mode and waits for the Data-Request from B until the next frame. If A does not any receive the Data
Request in the next frame as well it requests for a JOIN-ACK message to join in a new cluster. Then A joins to a
new CH which is in the vicinity of A and from which A receives the advertisement message for the first time by
sending a registration message. The CH then sends a TDMA schedule, which contains timeslots that are
assigned to all members including new mobile node A. Similarly if a CH does not receive data from A in two
consecutive rounds (after sending the Data- Request packet) CH discards A from its membership and removes A
from its TDMA slot considering that A has moved.Award et al. propose [1] cluster based routing protocol for
mobile nodes in WSN (CBR Mobile-WSN) to reduce energy consumption and thenumber of packets loss of
LEACH-M. CBR-M is an adaptive protocol that avoids wastage of timeslots and hence, ensures efficient
bandwidth utilization. Each CH keeps some free timeslots to enable other incoming mobile nodes from other
clusters to join its cluster. A CH sends data request message to the non-CHNodes and if the CH does not receive
data from a member, the packet is considered to be lost and the CH discards the nodes membership, at the end of
the frame. Consequently, if a sensor node A does not receive data request message from its CH then A tries to
join in a new cluster to avoid loss of packets. If the sensor node A receives Data Request message from CH but
A has no data to send, A will not hold any time slot and this timeslot can be assigned to another member node
that has data to send. In another scenario, if a sensor node A moves and hence, does not receive data request
message from its CH at its allocated timeslot A sends its data to the free CH to avoid the loss of data. Then A
sends a registration message to join the cluster of a nearby CH. When a CH finishes receiving data messages
from all sensor nodes in a round, the CH checks whether it receives data messages from all members, and then
removes the sensor nodes from which the CH did not receive any data. Each sensor node A wakes up one
timeslot before its scheduled timeslot to check whether it has really been assigned that timeslot. If A has not
been assigned any timeslot it goes back to sleep mode and its timeslot might be used by a mobile sensor node
that enters the cluster. This phenomenon reduces energy consumptions. However, CBR-mobile has more
average delay as compared to LEACH-M since the moved sensor nodes send data to the free CH whenever that
sensor node did not receive any data request from its CH which adds delay to the network whereas in LEACH-
mobile assume packets are lost when sensor nodes do not receive any data request from CH.
III. PROPOSED WORK
Clustering in mobile WSN provide vast range of dynamic behavior as well as improvement in the
performance in the system parameters, but the existing algorithm does not
Consider the mobility of cluster heads, that’s why in the proposed work we will also allow the mobility of a CH
out of cluster in the current round.
IV. METHODOLOGY
The methodology adopted to complete this work includes both the combination of qualitative and
quantitative approaches.
This work is based on qualitative approach as it improves the performance or quality by comparing different
attributes or characteristics. The proposed algorithm works with the following assumptions.
 All sensors are mobile.
Improved location ware fault tolerant mobile wireless sensor network
International organization of Scientific Research 15 | P a g e
 Once a node is selected as a CH, it remains in the same cluster.
 Initially, all sensors have the same energy.
A node in each cluster is equipped with GPS and work only for localization. This node is known as an anchors
node. Sensors are heterogeneous in terms of their roles since they work as anchor nodes, cluster heads, and
cluster members.
V. RESULT AND DISCUSSION
The simulation of proposed algorithm is done over the MATLAB and operating system is used
windows 8 with the system configuration having processor i5 and ram of 4gb, the figure 1-2 depict the
performance of our proposed algorithm as the energy
Figure 1 energy consumption with respect to no of rounds
Consumption of our proposed is less than the existing algorithm, shown in figure 1, and consecutly the
network lifetime gets increases which has been shown in figure 2
Figure 2 network lifetime with respect to no. of rounds
VI. CONCLUSION AND FUTURE WORK
In this paper we have improved the existing location aware fault tolerant clustering protocol for mobile
WSN with giving the mobility to the cluster head, the result discussedin this paper proves the efficiency of our
proposed algorithm.
Improved location ware fault tolerant mobile wireless sensor network
International organization of Scientific Research 16 | P a g e
REFERENCES
[1]. Wang, Quanhong, HossamHassanein, and KenanXu. "A practical perspective on wireless sensor
networks." Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems 9 (2005).
[2]. Karim, Lutful, and Nidal Nasser. "Reliable location-aware routing protocol for mobile wireless sensor
network." IET communications 6.14 (2012): 2149-2158.
[3]. Mittal, Divya, and SukhjinderKaur. "Enhanced Location-Aware Routing Protocol for Wireless Sensor
Network."
[4]. Heo, Nojeong, and Pramod K. Varshney. "Energy-efficient deployment of intelligent mobile sensor
networks." Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on 35.1
(2005): 78-92.
[5]. Shah, Rahul C., and Jan M. Rabaey. "Energy aware routing for low energy ad hoc sensor
networks." Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE.
Vol. 1. IEEE, 2002.
[6]. Gupta, Gaurav, and Mohamed Younis. "Fault-tolerant clustering of wireless sensor networks." Wireless
Communications and Networking, 2003. WCNC 2003. 2003 IEEE. Vol. 3. IEEE, 2003.
[7]. Chen, Jinran, ShubhaKher, and ArunSomani. "Distributed fault detection of wireless sensor
networks." Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and
sensor networks. ACM, 2006.
[8]. Karlof, Chris, and David Wagner. "Secure routing in wireless sensor networks: Attacks and
countermeasures." Ad hoc networks 1.2 (2003): 293-315.
[9]. Younis, Mohamed, Moustafa Youssef, and KhaledArisha. "Energy-aware routing in cluster-based
sensor networks." Modeling, Analysis and Simulation of Computer and Telecommunications Systems,
2002. MASCOTS 2002. Proceedings. 10th IEEE International Symposium on. IEEE, 2002.
[10]. Abbasi, Ameer Ahmed, and Mohamed Younis. "A survey on clustering algorithms for wireless sensor
networks." Computer communications 30. 14 2826-2841.

More Related Content

What's hot

Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformTELKOMNIKA JOURNAL
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parametersijsrd.com
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsJPINFOTECH JAYAPRAKASH
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularGabriel Balderas
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569IJRAT
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksIffat Anjum
 

What's hot (18)

Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Network layer
Network layerNetwork layer
Network layer
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Gpsr2
Gpsr2Gpsr2
Gpsr2
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane ts
 
K045036871
K045036871K045036871
K045036871
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for Vehicular
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
 

Viewers also liked

Geography lesson example
Geography lesson exampleGeography lesson example
Geography lesson exampleYSJLTD
 
The Windows Store and Monetizing your App
The Windows Store and Monetizing your AppThe Windows Store and Monetizing your App
The Windows Store and Monetizing your AppAlan Mendelevich
 
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_Tuberculosis
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_TuberculosisFedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_Tuberculosis
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_TuberculosisFedegan
 

Viewers also liked (14)

I5244145
I5244145I5244145
I5244145
 
Html5
Html5Html5
Html5
 
G5243336
G5243336G5243336
G5243336
 
E5242427
E5242427E5242427
E5242427
 
F5242832
F5242832F5242832
F5242832
 
100001
100001100001
100001
 
D5242023
D5242023D5242023
D5242023
 
A5240112
A5240112A5240112
A5240112
 
C5241719
C5241719C5241719
C5241719
 
J5244649
J5244649J5244649
J5244649
 
H5243740
H5243740H5243740
H5243740
 
Geography lesson example
Geography lesson exampleGeography lesson example
Geography lesson example
 
The Windows Store and Monetizing your App
The Windows Store and Monetizing your AppThe Windows Store and Monetizing your App
The Windows Store and Monetizing your App
 
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_Tuberculosis
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_TuberculosisFedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_Tuberculosis
Fedegan_Animal_Ganadero_Resolución_01513_2004_Enfermedad_Bovino_Tuberculosis
 

Similar to B5241316

Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
 
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...IJLT EMAS
 
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORKA ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORKcscpconf
 
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...csandit
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...ijcsa
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 

Similar to B5241316 (20)

Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
 
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORKA ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
 
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
 
H0421043049
H0421043049H0421043049
H0421043049
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
I04503075078
I04503075078I04503075078
I04503075078
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

B5241316

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 02 (February. 2015), ||V4|| PP 13-16 International organization of Scientific Research 13 | P a g e Improved Location Ware Fault Tolerant Mobile Wireless Sensor Network SumitBhanwala Quality Engineer at Cvent Abstract:-A sensor network is composed of a large number of sensor nodes that are densely deployed inside or very close to the phenomenon. Random deployment and self-organization capability In this paper we review some of location aware Routing protocol and describe the ongoing work to improve these routing protocol and in the later section of the paper we have proposed a solution to improve the existing LARP based solution as well as we have proposed the methodology to the existing solution. Keywords: fault tolerant, network lifetime, leach, WSN. I. INTRODUCTION Since wireless sensor networks (WSNs) consist of hundreds and thousands of unattended, resource- constraint and low–energy sensor nodes designing energy efficient routing protocols is significantly important. Clustering-based routing protocols are more useful in the context of energy efficiency where several sensor nodes in the communication range of one another form a cluster. Each cluster has a cluster head (CH)[1], which coordinates all the nodes of a cluster. There may be a number of base stations (BS) also known as sink in a WSN that communicate with other networks. A CH aggregates data that are received from all member nodes of a cluster and sends to the BS. Besides CH, there exist gateway nodes in a cluster which are used for inter-cluster communications [2]. Hence, clustering protocols produce limited useful information from large amount of raw sensed data and transmitting this precise useful information to the BS of the network consume less energy [1, 2]. Most clustering protocols of WSN in the literature are designed for static sensor nodes. Thus, these protocols do not work for WSN applications that require mobile sensor nodes, such as habitat monitoring, wild life monitoring, target tracking and battlefield surveillance. Moreover, these protocols do not support localization of sensor nodes but only assume that each node know their location, which make these protocols inefficient. For instance, low energy adaptive clustering hierarchy (LEACH) Protocol [3] is a standard static clustering protocol of WSN. LEACH is enhanced as LEACH-Mobile [4], LEACH-Mobile-Enhancement [5], and cluster based routing protocol formobile nodes in wireless sensor network (CBR Mobile-WSN) [1] to support mobility of sensor nodes. In these protocols, which are presented in detail in Section 2, if a non-CH sensor node A does not receive Data Request packets from CH or CH does not receive data from node A after sending the data request packet, the node A is assumed to be moved from its previous location. Then the CH discards the timeslot of node A and allocates this free timeslot to a new mobile member node of this cluster. Node A also tries to find a new CH node of a cluster. However, this same condition may also arise for the failure of CH and non-CH cluster members. Thus, these protocols cannot detect the failure of sensor nodes. Moreover, these protocols work in rounds and initiate a new cluster formation phase at every round, where each round comprises cluster formation, CH selection and data transmission phases. This is also not considered energy efficient since a large number of messages are transmitted to form a cluster. To alleviate this problem we propose a location aware fault tolerant clustering protocol for mobile WSN (LFCP- MWSN). In this protocol, a special packet is sent by a non-CH node A if A has no sensed data to send to the CH at its allocated timeslot and thus, saves energy by not sending data at every timeslot. At the end of around a node with the least mobility is selected as a new CH, which is calculated as the ratio of the number movements of a node inside and outside of its cluster. Moreover, CH does not receive data or special packet from a node A at its allocated timeslot if (i) data or special packet transmission fails (ii) node A moves out of the cluster or (iii) node A dies. In such case, CH waits until the next timeslot for node A to confirm the transmissionfailure. If CH does not receive data or special packet from node A in the next timeslot CH deletes node A from its member list, discards the timeslot of node A and also notifies BS the ID of node A. In each frame, a timeslot is kept free for allowing the moving nodes to notify the CH of a new cluster. Thus, if node A moves into a new cluster it sends a JOIN REQUEST message to the CH of new cluster at the free timeslot. CH of this new cluster accepts the JOIN REQUEST of node a only when a timeslot becomes free because of the moving of another node out this cluster. Then the CH of this cluster sends the ID of node A to BS. Thus, if BS receives ID of the node A from two different CH as a leaving node from a cluster at frame x and a new node into a cluster at frame, then node A is considered to be moved from a cluster. Otherwise, node A is considered as a failed node. In addition to this,
  • 2. Improved location ware fault tolerant mobile wireless sensor network International organization of Scientific Research 14 | P a g e LFCP-MWSN supports sensors localization in the cluster formation phase and every time a node moves to a new location since without location information sensors data are meaningless for most of the applications. II. LITERATURE SURVEY In [6], Bajaber and Awan propose dynamic static clustering protocol (DSC) for (WSN) and find the DSC has better performance than LEACH in terms of energy efficiency, network lifetime and communication overhead. DSC protocol has dynamic and static cases. Dynamic case is divided into two phases: setup and steady phase. In the setup phase, the base station (BS) forms clusters and selects CH for each cluster based on the energy levels and positions of the sensor nodes. Then, the BS broadcasts CH ID to all nodes. A sensor node will be a CH if its ID matches with the CH ID. In the steady phase, CH uses TDMA scheme by dividing each frame into x number of timeslots, where x is the total number of non-CH nodes in that cluster. A non-CH node transmits data to the CH only in the allocated timeslots and saves energy by turning its radio off (sleep mode) in all other timeslots. When a round is completed, data transmitted by all non-CH nodes are aggregated and sent by the CHs to the BS. In the next round, the current CH of a cluster selects a node as a new CH, which has the most remaining energy.To provide mobility of sensor nodes, Kim and Chung [4] propose LEACH-Mobile (LEACH- M) routing protocol where cluster formation and CH selection mechanism is same as LEACH. LEACH-M ensures the communication of a node with a CH even if node is in motion by transmitting data request packet from CH to the sensor node in its allocated timeslot using TDMA scheme. For this purpose, a member node A of a cluster with CH B waits two timeslots of two consecutive frames to decide whether A has moved. The node A does not send any data at its allocated timeslot to B until it receives data-request from B and if the node ADoes not receive any Data Request at the beginning of a timeslot (when it is awake) from B then A goes to the sleeping mode and waits for the Data-Request from B until the next frame. If A does not any receive the Data Request in the next frame as well it requests for a JOIN-ACK message to join in a new cluster. Then A joins to a new CH which is in the vicinity of A and from which A receives the advertisement message for the first time by sending a registration message. The CH then sends a TDMA schedule, which contains timeslots that are assigned to all members including new mobile node A. Similarly if a CH does not receive data from A in two consecutive rounds (after sending the Data- Request packet) CH discards A from its membership and removes A from its TDMA slot considering that A has moved.Award et al. propose [1] cluster based routing protocol for mobile nodes in WSN (CBR Mobile-WSN) to reduce energy consumption and thenumber of packets loss of LEACH-M. CBR-M is an adaptive protocol that avoids wastage of timeslots and hence, ensures efficient bandwidth utilization. Each CH keeps some free timeslots to enable other incoming mobile nodes from other clusters to join its cluster. A CH sends data request message to the non-CHNodes and if the CH does not receive data from a member, the packet is considered to be lost and the CH discards the nodes membership, at the end of the frame. Consequently, if a sensor node A does not receive data request message from its CH then A tries to join in a new cluster to avoid loss of packets. If the sensor node A receives Data Request message from CH but A has no data to send, A will not hold any time slot and this timeslot can be assigned to another member node that has data to send. In another scenario, if a sensor node A moves and hence, does not receive data request message from its CH at its allocated timeslot A sends its data to the free CH to avoid the loss of data. Then A sends a registration message to join the cluster of a nearby CH. When a CH finishes receiving data messages from all sensor nodes in a round, the CH checks whether it receives data messages from all members, and then removes the sensor nodes from which the CH did not receive any data. Each sensor node A wakes up one timeslot before its scheduled timeslot to check whether it has really been assigned that timeslot. If A has not been assigned any timeslot it goes back to sleep mode and its timeslot might be used by a mobile sensor node that enters the cluster. This phenomenon reduces energy consumptions. However, CBR-mobile has more average delay as compared to LEACH-M since the moved sensor nodes send data to the free CH whenever that sensor node did not receive any data request from its CH which adds delay to the network whereas in LEACH- mobile assume packets are lost when sensor nodes do not receive any data request from CH. III. PROPOSED WORK Clustering in mobile WSN provide vast range of dynamic behavior as well as improvement in the performance in the system parameters, but the existing algorithm does not Consider the mobility of cluster heads, that’s why in the proposed work we will also allow the mobility of a CH out of cluster in the current round. IV. METHODOLOGY The methodology adopted to complete this work includes both the combination of qualitative and quantitative approaches. This work is based on qualitative approach as it improves the performance or quality by comparing different attributes or characteristics. The proposed algorithm works with the following assumptions.  All sensors are mobile.
  • 3. Improved location ware fault tolerant mobile wireless sensor network International organization of Scientific Research 15 | P a g e  Once a node is selected as a CH, it remains in the same cluster.  Initially, all sensors have the same energy. A node in each cluster is equipped with GPS and work only for localization. This node is known as an anchors node. Sensors are heterogeneous in terms of their roles since they work as anchor nodes, cluster heads, and cluster members. V. RESULT AND DISCUSSION The simulation of proposed algorithm is done over the MATLAB and operating system is used windows 8 with the system configuration having processor i5 and ram of 4gb, the figure 1-2 depict the performance of our proposed algorithm as the energy Figure 1 energy consumption with respect to no of rounds Consumption of our proposed is less than the existing algorithm, shown in figure 1, and consecutly the network lifetime gets increases which has been shown in figure 2 Figure 2 network lifetime with respect to no. of rounds VI. CONCLUSION AND FUTURE WORK In this paper we have improved the existing location aware fault tolerant clustering protocol for mobile WSN with giving the mobility to the cluster head, the result discussedin this paper proves the efficiency of our proposed algorithm.
  • 4. Improved location ware fault tolerant mobile wireless sensor network International organization of Scientific Research 16 | P a g e REFERENCES [1]. Wang, Quanhong, HossamHassanein, and KenanXu. "A practical perspective on wireless sensor networks." Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems 9 (2005). [2]. Karim, Lutful, and Nidal Nasser. "Reliable location-aware routing protocol for mobile wireless sensor network." IET communications 6.14 (2012): 2149-2158. [3]. Mittal, Divya, and SukhjinderKaur. "Enhanced Location-Aware Routing Protocol for Wireless Sensor Network." [4]. Heo, Nojeong, and Pramod K. Varshney. "Energy-efficient deployment of intelligent mobile sensor networks." Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on 35.1 (2005): 78-92. [5]. Shah, Rahul C., and Jan M. Rabaey. "Energy aware routing for low energy ad hoc sensor networks." Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE. Vol. 1. IEEE, 2002. [6]. Gupta, Gaurav, and Mohamed Younis. "Fault-tolerant clustering of wireless sensor networks." Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE. Vol. 3. IEEE, 2003. [7]. Chen, Jinran, ShubhaKher, and ArunSomani. "Distributed fault detection of wireless sensor networks." Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks. ACM, 2006. [8]. Karlof, Chris, and David Wagner. "Secure routing in wireless sensor networks: Attacks and countermeasures." Ad hoc networks 1.2 (2003): 293-315. [9]. Younis, Mohamed, Moustafa Youssef, and KhaledArisha. "Energy-aware routing in cluster-based sensor networks." Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002. MASCOTS 2002. Proceedings. 10th IEEE International Symposium on. IEEE, 2002. [10]. Abbasi, Ameer Ahmed, and Mohamed Younis. "A survey on clustering algorithms for wireless sensor networks." Computer communications 30. 14 2826-2841.