SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
DOI : 10.5121/ijcnc.2015.7607 99
DYNAMIC RE-CLUSTERING LEACH-BASED
(DR-LEACH) PROTOCOL FOR WIRELESS
SENSOR NETWORKS
Abdallah Ijjeh1
,Abdalraheem Ijjeh2
,Huthaifa Al-Issa1
,Saed Thuneibat1
1
Department of Electrical and Electronic Engineering, Al-Balqa` Applied University / Al-
Huson University College, Irbid, Jordan
2
Technical college at Ranya, Ranya, Saudi Arabia
ABSTRACT
A Wireless Sensor Network (WSN) contains a large number of sensor nodes equipped with limited energy
supplies. In most applications, sensor nodes are deployed in a random fashion. Therefore, battery
replacement or charging is considered not practical. As a result, routing protocols must be energy-efficient
to prolong the network’s lifetime. In this paper, we propose a new Dynamic Re-clustering LEACH-Based
protocol (DR-LEACH) which aims to reduce the energy consumption and extending the network’s lifetime.
The idea is to balance energy consumption of Cluster Heads (CHs) by generating clusters with almost
equal number of nodes during each round of the network life time. To perform this, we first calculate the
optimal number of CHs in each round, and based on that we calculate the optimal size of each cluster.
Results show that the proposed protocol improves network lifetime and reduces overall energy
consumption compared to LEACH and BCDCP protocols.
KEYWORDS
Wireless sensors network (WSN), dynamic clustering, optimal cluster size, energy balancing, network
lifetime, residual energy
1.INTRODUCTION
Wireless Sensors Networks (WSNs) are widely considered as one of the interesting and rapidly
developing fields. They have attracted great attention because of the diverse applications they
support in both civilian and military sectors [1]. Typically, a WSN consists of a large number of
low-cost, low-power, and multifunctional wireless sensor nodes with sensing, wireless
communication and computation capabilities. In many applications, the sensor nodes are
randomly deployed. Accordingly, the sensor nodes must organize themselves into a wireless
network and cooperate to perform the required task. In addition, WSNs are usually battery
powered which means it is very difficult to replace or recharge the batteries as soon as the nodes
are deployed [2] [3]. Based on that, many techniques were proposed to achieve longer lifetime
and efficient energy consumption. Clustering is one of the effective techniques used to save
energy in WSNs [4].Clustering means organizing sensor nodes into different groups called
clusters. In each cluster, sensor nodes can be either a Cluster Head (CH) or an ordinary member
node. A CH is the group leader in each cluster. It collects sensed data from member nodes,
aggregates, and transmits the aggregated data to the next CH or to the Base Station [5]. The role
of an ordinary member node is to sense data from the environment in which they are deployed
and send it to the corresponding CH.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
100
2.RELATED WORK
LEACH is one of the most popular clustering techniques used in WSNs to increase the network
lifetime [6] [7]. LEACH is an adaptive, self-organizing and distributed clustering protocol. It
assumes that the BS is fixed and located far from the sensors, all sensor nodes are homogenous
and have limited energy source, sensors can sense the environment at a fixed rate and can
communicate among each other, and sensors can directly communicate with BS. The idea of
LEACH is to organize the nodes into clusters to distribute the energy among the sensor nodes in
the network, and in each cluster there is an elected node called a CH. LEACH introduces the
concept of Rounds each of which consists of two phases. Clusters are formed during the set-up
phase and data transfer occurs during the steady-state phase.
A centralized routing protocol (contrast to LEACH which is distributed) called Base-Station
Controlled Dynamic Clustering Protocol (BCDCP) was introduced in [8]. BCDCP assumes that
the BS has sufficient energy during its operation. Furthermore, it assumes that the BS knows the
places of all nodes. The fundamental idea of BCDCP is the formation of balanced clusters
centrally by the BS, where each CH manages an equal number of member nodes to avoid CH
overload, and organizing placement of the formed CHs throughout the network area. In BCDCP,
there are two phases. The first phase is the setup phase, in which, the BS prepares a list of all
potential CHs based on their remaining energy level. Then, the BS uses the list to pick out the two
farthest CHs, and divides the nodes into two groups based on closeness. Then, it performs a
balancing process on the groups. This process is reiterated within each group until all clusters are
formed. As soon as all clusters are formed, the BS structures a “minimum spanning tree” that
links all CHs, and randomly picks out one CH to forward packets of data to BS. This is in
contrast to LEACH where each CH directly communicates with the BS. The second phase of the
BCDCP protocol is the steady state phase, in which each CH within each cluster creates a TDMA
schedule to minimize collisions between sensor nodes trying to send data to the CH, and the
nodes send the sensed data to the CH which performs data aggregation and compression and
route it to the CH that is responsible for forwarding the data to the BS.
3.INTRODUCTION TO THE PROPOSED PROTOCOL
In this paper we propose a Dynamic Re-clustering protocol (DR-LEACH) as an improvement
over the LEACH protocol. The main goal is to develop a protocol that optimizes the cluster’s size
such that each CH serves an approximately equal number of sensor nodes. Consequently,
processing and transmission performed by each CH is as equal as possible to each other. As a
result, network life time will be extended and nodes will die around the same time. The rest of the
paper is organized as follows: Section 2 explains the network and radio models assumed in our
protocol. A detailed description of the Methodology of DC-LEACH is explained in section 3.
Section 4 demonstrates the experimental of the DC-LEACH. Finally we conclude the paper in
section 5.
4.NETWORK ASSUMPTIONS AND RADIO MODEL
In this section we describe the network and radio model assumed in the DR-LEACH. We did use
the first radio model used in the original LEACH protocol [6]. The model assumes the following:
 The BS is fixed during the running of the protocol (immobile).
 All sensor nodes are homogenous and supplied with the same initial energy.
 All sensor nodes are stationary.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
101
In addition, we assume that each sensor node is capable to act in two different roles: CH role and
normal sensing role. When the node is in the normal sensing role, it senses the environment and
sends the sensed data to its CH. In the CH role, it collects the sensed data from its members in the
cluster, performs data aggregation and compression, then generates a composite signal and
transmits to the BS.
Figure 1 shows the first order radio model. The required energy to transmit and receive a k-bit
data message over a distanced d is given by (2) and (3):
Where ETX and ERX are the required energy consumed per bit to operate the transmitter or receiver
circuitry, respectively. ER is the required energy to receive k-bit data message. and are
amplifier parameters correspond to free space and multi-path fading models. is the threshold
distance given by :
For the purpose of simulations we considered that ETX = ERX= 50 nJ/bit, =10 pJ/b/m2
,
=0.0013 pJ/b/m4
. EDA=5 nJ/b/message, where EDA is the energy required for data aggregation.
These values are mostly used in the literature for evaluating LEACH performance [8, 9, 10, 11].
Figure 1. First order radio model. [12]
5.METHODOLOGY OF THE PROPOSED PROTOCOL
The original LEACH is composed of two phases: the setup phase and the steady-state phase. The
proposed protocol, DR-LEACH, is also composed of same two phases. However, it added two
more steps in the setup phase: splitting and merging. This section provides a detailed description
of the proposed protocol phases.
5.1DR-LEACH SETUP PHASE
At the beginning of the setup phase, initial CHs are elected and clusters are formed similar to the
LEACH protocol. The formed clusters are not optimal in sizes, i.e. some clusters might have very
small number of nodes while some might have large number of nodes. As a result, CHs which
serves a large number of sensor nodes will consume more energy and will die faster than others.
(3)
(2)
(4)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
102
This affects the functionality of the network in the sense that some clusters might get isolated
from the network due to fast discharge of the CH. In addition, it also affects the efficiency of
energy consumption and the network lifetime. DR-LEACH tries to distribute nodes among CHs
equally such that the CH’s have equal amount of work to do in terms of processing and
transmission. This will improve the efficiency of the energy consumption and as a result
prolonging the network lifetime.
After the initial clusters are formed, we calculate the optimal number of clusters (Kopt) [13]. Kopt is
calculated as shown in (5)[14]:
Kopt=
Where n is the number of alive nodes and Dbs is the average distance between the CH and BS. Dbs
is calculated as shown in (6)[14]:
Dbs= (0.765*one dimension of the field)/2
Then, we calculate the optimal cluster size (Nopt) by dividing the total number of alive nodes, n,
over the previously computed Kopt. That is, Nopt is calculated by:
For the best result, the size of each cluster should be exactly Nopt. However, this requires more
computation to guarantee this exact size since a size which is one more or one less than the
optimal size will not be considered optimal and hence we have to reprocess the cluster until we
get an exact match which will force the protocol to converge after longer time (provided that the
total number of alive nose is an exact multiple of Kopt. Otherwise, the protocol will not converge).
Therefore, to let the protocol converge faster and reduce processing, DR-LEACH considers a
cluster to be optimal if its size lies in an interval that is bound by an upper and lower limits and is
centered at Nopt as shown in Figure 2. This interval is called the optimal range of the cluster size.
Consequently, if the cluster size is greater than the minimum limit (Nopt_min) and less than the
maximum limit (Nopt_max), it is considered as an optimal cluster size. Otherwise, we have to
perform re-clustering: splitting large clusters or merging small cluster to form an optimal cluster.
Figure 2. Optimal cluster size boundaries
Nopt_max, Nopt_min are calculated as shown in (8) and (9), respectively
Nopt_max=Nopt + a
Nopt_min=Nopt – a
(5)
(6
)
(7)
(8)
(9)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
103
Where a is a dummy variable that represent the deviation from the exact optimal cluster size.
For faster convergence and less computation, we assume that Nopt_max is twice larger than Nopt_min
such that if we split a large cluster in half, it would result in a two clusters whose sizes are
optimal and need no further processing is required. This is shown in (10).
Nopt_max=2* Nopt_min
Using equations (8), (9), and (10), we can compute the values of Nopt_min andNopt_max as shown in
(11) and (12), respectively.
As soon as Nopt_max and Nopt_min are calculated, the nest step in the setup phase is that each cluster
checks its size. If the cluster size is less than Nopt_min we perform merging. In this step, the CH
informs its members that it is no longer a CH, and returns to the normal sensing node. Each
detached member node independently joins the closest CH (a one with the highest RSSI signal).
If, as a result of merging, a cluster’s size becomes greater than Nopt_max, it is split as described in
the next paragraph. Otherwise, it is still in the optimal and no further processing is required. Each
time a merging operation is performed, the number of clusters is decreased by 1.
A splitting operation is performed if the cluster size exceeds Nopt_max. In such case, the CH
searches its cluster for a node with the highest residual energy. When the CH finds the desired
node, it sends a signal message to that node to inform it to become a second CH (CHnd) within the
cluster. Then, each node of the cluster joins either of the CH’s based on the RSSI. As a result, the
old cluster (whose size is greater than Nopt_max) will be split into two clusters. In the case that one
of the resulting clusters has a size that is less than Nopt_min, merging is performed as described in
the above paragraph. Each time a splitting operation is done the number of clusters is increased
by 1.
The merging and splitting operations are repeatedly performed for all clusters to optimize their
sizes. At the end, all formed clusters are between Nopt_min and Nopt_max, which means are optimal
range and no further processing in regard of forming clusters is required.
5.2 DC-LEACH STEADY STATE PHASE
As soon as all clusters are formed, each CH creates a TDMA schedule to organize the
transmissions of its member nodes. A member node starts sending its sensed data to the CH
during its allocated time slot. When the CH receives all data from its members, CH performs data
aggregation and data compression then it generates a composite signal and transmitted to the BS.
In fact, this is similar to the original LEACH steady state phase. In Figure 3 we illustrate the
methodology of our proposed protocol.
(10)
(11)
(12)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
104
Figure 3: Illustration of the proposed protocol methodology.
.
6.EXPERIMENTAL RESULTS
In this section, the experiment results and performance of the DR-LEACH protocol are presented.
The protocol is simulated using MATLAB as were done in [8,6]. Each run of the protocol is
repeated 20 times and the results are averaged to guarantee statistical reliability. After that, the
results are compared to both BCDCP and LEACH protocols. The performance is measured
against the number of alive nodes, total residual energy, first dead node, and 50% dead nodes.
Table 1 lists the values of the parameters used in the simulation, which are typically used for
evaluating LEACH performance [8,9,10,11].
Table 1. List of parameters
The Parameter The Value
Data Packet Size 2000 bits
Initial Energy 0.5 J
Eelec 50 nJ/bit
Emp 0.0013 pJ/b/m4
Efs 10 pJ/bit/m2
EDA 5 nJ/b/message
Deployment Random
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
105
In the experiment we simulate a 300 sensor nodes deployed in an area of (100×100) m. Different
locations of the BS are considered in this experiment. Specifically, the BS is positions at (0,0)
[lower left corner], (0, -100), (0, -200), and (150, 50).
Figures 4, 5, 6, and 7 show the number of alive sensor nodes in each round of the protocols for
different positions of the BS. As can be depicted from the figure, DR-LEACH is the most energy-
saving protocol for the first dead node, and 50% dead nodes and the last dead node whether the
BS is close or far from the nodes. As a result, DR-LEACH extends the network lifetime
compared to LEACH and BCDCP protocols regardless of the BS location. Hence, it shows more
scalability in terms of how far the BS can be away from the nodes. All of this is due to the way it
handle cluster formation and generating optimal clusters.
Figure 4. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0,0)
Figure 5. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0,-100)
0 100 200 300 400 500 600 700 800
50
100
150
200
250
300
Number of Rounds
NumberofAliveNodes
BCDCP
DR-LEACH
LEACH
0 50 100 150 200 250 300
0
100
200
300
Number of Rounds
NumberofAliveNodes
DR-LEACH
LEACH
BCDCP
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
106
Figure 6. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0-200)
Figure 7. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (150, 50)
Figures 8, 9, 10, and 11 show the total residual energy during each round of DR-LEACH,
LEACH, and BCDCP protocols where the BS is located at (0,0), (0, -100), (0, -200) , and (150,
50) respectively. It can be seen that DR-LEACH is more energy-conserving than the other two
protocols. This is due primarily to the dynamic merging and splitting mechanisms it utilizes. This
leads to balanced energy consumption between clusters. Consequently, less energy is consumed
in each round by a cluster. As a result, more energy is conserved in each round, and the network
lifetime is extended, whether for the first dead node, 50% dead node, or the last dead node
0 20 40 60 80 100 120
0
100
200
300
Number of Rounds
NumberofAliveNodes
BCDCP
DR-LEACH
LEACH
0 50 100 150 200 250 300 350 400
50
100
150
200
250
300
Number ofRounds
NumberofAliveNodes
BCDCP
DR-LEACH
LEACH
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
107
Figure 8. Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0, 0)
Figure 9: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0,-100)
Figure 10: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0,-200)
0 100 200 300 400 500 600 700 800
0
50
100
150
Number of Rounds
TotalResidualEnergy(J)
BCDCP
DR-LEACH
LEACH
0 50 100 150 200 250 300
0
50
100
150
Number of Rounds
TotalResidualEnergy(J)
BCDCP
DR-LEACH
LEACH
0 20 40 60 80 100 120
0
50
100
150
Number of Rounds
TotalResidualEnergy(J)
BCDCP
DR-LEACH
LEACH
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
108
Figure 11: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (150,50)
Table 2 summarizes the results of the experiment and provides a comparison of network lifetimes
for the first dead node, 50% dead node, and the enhancement percentage of DR-LEACH over
BCDCP and LEACH protocols. As can be figured out from the table and the above figures, the
location of the BS greatly affects the occurrence rate of the first dead node. Farther BS will result
in consuming more energy. However, DR-LEACH performance is still better than the other
protocols regardless of the location of the BS. For example, when the BS is at (0,-100) the DC-
LEACH is 200% and 300% better than LEACH in terms of first dead node and 50% dead nodes,
respectively. In addition, it is 36.4% and 79.1% better than the BCDCP in terms of first dead
node and 50% dead nodes respectively at the same location.
Table2: Comparison of network lifetimes for the DC-LEACH, BCDCP and LEACH protocols for different
BS locations (No of sensor nodes = 300, area = 100m x 100m).
BS
Location
Protocol Round at which the event
happened
Enhancement % of DR-
LEACH compared to other
protocols
First Dead
Node
50% Dead
Nodes
First Dead
Node
50% Dead
Nodes
(0,0)m DR-LEACH 107 242 - -
BCDCP 46 165 132.6% 46.67%
LEACH 25 77 328% 214.3%
(0,-100)m DR-LEACH 30 120 - -
BCDCP 22 67 36.4% 79.1%
LEACH 10 30 200% 300%
(0,-200)m DR-LEACH 18 68 - -
BCDCP 14 42 28.57% 61.9%
LEACH 6 18 200% 277.78%
(150,50)m DR-LEACH 50 194 - -
BCDCP 46 109 8.69% 77.98%
LEACH 26 54 92.3% 259.25%
0 100 200 300 400
0
50
100
150
Number of Rounds
TotalResidualEnergy(J)
DCDCP
DR-LEACH
LEACH
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
109
7.CONCLUSIONS
This paper presents a dynamic re-clustering protocol (DR-LEACH) to balance the load among
CHs by taking into consideration the optimal number of CHs and calculating the optimal cluster
size. Based on that, the protocol re-clusters all clusters that beneath lower boundary of optimal
cluster size and split clusters that are above the upper optimal boundary. Although these
techniques will increase up the computational power, but this rise is always negligible compared
to the reduction in number of required transmissions. In this paper we have simulated the
proposed protocol and compared it with BCDCP and LEACH protocols. Simulation results show
that in DR-LEACH is better than both LEACH and BCDCP. In fact, DR-LEACH shows great
improvement over LEACH regardless of the location of the BS. For example, an enhancement as
large as 328% is achieved when the BS is located at (0,0), and as minimum as 92.3% when the
BS is located at (150,50). Also, Improvement over the BCDCP is achieved but in less figures. In
addition, simulation results show that DR-LEACH is more energy-conserving than both LEACH
and BCDCP protocols irrespective of the BS location. In addition, it can be concluded that the
technique of cluster balancing in DR-LEACH is better than the one used in BCDCP since DR-
LEACH is more energy conserving. In BCDCP, there is a single CH which is randomly chosen to
forward data the BS. All the CHs send their data to that chosen node which will finally send the
aggregated data to the BS. As a result, energy consumption is not balanced between nodes. On
the other hand, creating equal clusters that directly communicate with the BS distributes energy
consumption more evenly which results in having more residual energy in the network. As a
result, the network lifetime is extended and the nodes keep running for longer time and die
relatively close in time to each other.
REFERENCES
[1] Deborah Estrin et al, "Next century challenges: scalable coordination in sensor networks," in
ACM/IEEE international conference on Mobile computing and networking , New York, NY, USA,
1999 .
[2] C. F. Wang , J. D. Shih, B. H. Pan and T. Y. Wu, "A Network Lifetime Enhancement Method for
Sink Relocation and Its Analysis in Wireless Sensor Networks," Sensors Journal, IEEE (Volume:14 ,
Issue: 6 ), pp. 1932 - 1943, 2015.
[3] J. Abawajy and S. Ghanavati, "An Alternative Node Deployment Scheme for WSNs," Sensors
Journal, IEEE (Volume:15 , Issue: 2 ), pp. 667 - 675, 2015.
[4] Guan Xin et al, "EEHCA: An Energy-Efficient Hierarchical Clustering Algorithm for Wireless
Sensor Networks," vol. 8, no. 2, 2008.
[5] S. Ghiasi et al, "Optimal Energy Aware Clustering in Sensor Networks," MDPI Sensors, vol. 2, no. 7,
p. 258–269, 2002.
[6] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol
for wireless microsensor networks," in Proceedings of the 33rd Annual Hawaii International
Conference on System Sciences, 2000. , Hawaii , 2000.
[7] M. Aslam et al, "Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless
Sensor Networks," arXiv preprint arXiv:1207.2609, vol. v1, 2012.
[8] S. D. Muruganathan, D. C. F. Ma and R. I. Bh, "A centralized energy-efficient routing protocol for
wireless sensor networks," Communications Magazine, IEEE, vol. 43, no. 13, pp. S8-S13, March
2005.
[9] T. Kang, J. Yun, H. Lee and I. Lee, "A Clustering Method for Energy Efficient Routing in Wireless
Sensor Networks," in International Conference on Electronics, Hardware, Wireless and Optical
Communications EHAC'07 Proceedings of the 6th WSEAS, Corfu Island, Greece, 2007.
[10] M.Bani Yassein et al, "Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),"
in Journal of Digital Content Technology and its Applications, 2009.
[11] M. Tong and M. Tang, "LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network," in
6th International Conference on wireless Communications Networking and Mobile Computing
(WiCOM), Chengdu, 2010.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015
110
[12] C. Y. Wen and Y. C. Chen, "Dynamic Hierarchical Sleep Scheduling for Wireless Ad-Hoc Sensor
Networks," vol. 9, no. 5, 2009.
[13] A.B.M. Alim Al Islam et al, "Finding the Optimal Percentage of Cluster Heads from a New and
Complete Mathematical Model on LEACH," Scientific Research, vol. 2, no. 2, pp. 129-140, 2010.
[14] V. S. Krishna Gopal Vijayvargiya, "An Amend Implementation on LEACH protocol based on Energy
Hierarchy," International Journal of Current Engineering and Technology, vol. 2, no. 4, pp. 427-431,
2012.
[15] W.R. Heinzelman et al, "Energy-efficient communication protocol for wireless microsensor
networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International
Conference on, 2000..
AUTHORS
Dr. Abdullah Ijjeh has received his BSc in Electrical Engineering from Kuwait University
in 1981. He received his M.Sc. in communication engineering from Yarmouk University,
Jordan in 1988. He received his PhD in communication engineering from The Bonch-
Bruevich Saint - Petersburg State University of Telecommunications, St. Petersburg, Russia
1995. Currently he is working at the Department of communication engineering at Al-
Balqa` Applied University, Jordan. His research interests are fibre optics and wireless and
communication systems.
Abdalraheem Ijjeh has obtained his BSc form Yrmouk university 2009, M.Sc from the Jordanian 2013.
Currently he is a lecturer in the Technical College at Ranya, Ranya, Saudi Arabia
Dr. Huthaifa Al-Issa is currently working as an assistant professor at the department of communication
engineering at Al-Balqa` Applied University, Jordan.
Dr. Saed Thuneibat is currently working as an associate professor at the department of communication
engineering at Al-Balqa` Applied University, Jordan.

More Related Content

What's hot

Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
 
Energy aware routing for adhoc
Energy aware routing for adhocEnergy aware routing for adhoc
Energy aware routing for adhocijasuc
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...inventionjournals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...IJCI JOURNAL
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK ijsc
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsIJECEIAES
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksijwmn
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement IJECEIAES
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 

What's hot (18)

Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
Energy aware routing for adhoc
Energy aware routing for adhocEnergy aware routing for adhoc
Energy aware routing for adhoc
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
 
Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
 
196 202
196 202196 202
196 202
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNs
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networks
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 

Viewers also liked

A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...ijmvsc
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...IJCNCJournal
 
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...ijmvsc
 
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ijmvsc
 
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case StudyValue Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Studyijmvsc
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
Performance improvement by
Performance improvement byPerformance improvement by
Performance improvement byIJCNCJournal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential FunctionInventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential Functionijmvsc
 
Application of compressed sampling
Application of compressed samplingApplication of compressed sampling
Application of compressed samplingIJCNCJournal
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...IJCNCJournal
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable networkIJCNCJournal
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
 
Referencing tool for reputation and
Referencing tool for reputation andReferencing tool for reputation and
Referencing tool for reputation andIJCNCJournal
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSTHE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSijmvsc
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIJCNCJournal
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMIJCNCJournal
 

Viewers also liked (19)

A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...
 
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...
 
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...
 
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case StudyValue Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Study
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
Performance improvement by
Performance improvement byPerformance improvement by
Performance improvement by
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential FunctionInventory Models Involving Lead Time Crashing Cost as an Exponential Function
Inventory Models Involving Lead Time Crashing Cost as an Exponential Function
 
Application of compressed sampling
Application of compressed samplingApplication of compressed sampling
Application of compressed sampling
 
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable network
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
 
Referencing tool for reputation and
Referencing tool for reputation andReferencing tool for reputation and
Referencing tool for reputation and
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSTHE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPS
 
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERY
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
 

Similar to DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS

Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...IJCNCJournal
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNOPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNIJCNCJournal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsINFOGAIN PUBLICATION
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...ijsc
 
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...ijsc
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
 

Similar to DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS (20)

Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNOPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws ns
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...
DISSECT AND ENRICH DIVIDE AND RULE SCHEME FOR WIRELESS SENSOR NETWORK TO SOLV...
 
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...
Dissect and Enrich Divide and Rule Scheme for Wireless Sensor Network to Solv...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 
2. 8482 1-pb
2. 8482 1-pb2. 8482 1-pb
2. 8482 1-pb
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 DOI : 10.5121/ijcnc.2015.7607 99 DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS Abdallah Ijjeh1 ,Abdalraheem Ijjeh2 ,Huthaifa Al-Issa1 ,Saed Thuneibat1 1 Department of Electrical and Electronic Engineering, Al-Balqa` Applied University / Al- Huson University College, Irbid, Jordan 2 Technical college at Ranya, Ranya, Saudi Arabia ABSTRACT A Wireless Sensor Network (WSN) contains a large number of sensor nodes equipped with limited energy supplies. In most applications, sensor nodes are deployed in a random fashion. Therefore, battery replacement or charging is considered not practical. As a result, routing protocols must be energy-efficient to prolong the network’s lifetime. In this paper, we propose a new Dynamic Re-clustering LEACH-Based protocol (DR-LEACH) which aims to reduce the energy consumption and extending the network’s lifetime. The idea is to balance energy consumption of Cluster Heads (CHs) by generating clusters with almost equal number of nodes during each round of the network life time. To perform this, we first calculate the optimal number of CHs in each round, and based on that we calculate the optimal size of each cluster. Results show that the proposed protocol improves network lifetime and reduces overall energy consumption compared to LEACH and BCDCP protocols. KEYWORDS Wireless sensors network (WSN), dynamic clustering, optimal cluster size, energy balancing, network lifetime, residual energy 1.INTRODUCTION Wireless Sensors Networks (WSNs) are widely considered as one of the interesting and rapidly developing fields. They have attracted great attention because of the diverse applications they support in both civilian and military sectors [1]. Typically, a WSN consists of a large number of low-cost, low-power, and multifunctional wireless sensor nodes with sensing, wireless communication and computation capabilities. In many applications, the sensor nodes are randomly deployed. Accordingly, the sensor nodes must organize themselves into a wireless network and cooperate to perform the required task. In addition, WSNs are usually battery powered which means it is very difficult to replace or recharge the batteries as soon as the nodes are deployed [2] [3]. Based on that, many techniques were proposed to achieve longer lifetime and efficient energy consumption. Clustering is one of the effective techniques used to save energy in WSNs [4].Clustering means organizing sensor nodes into different groups called clusters. In each cluster, sensor nodes can be either a Cluster Head (CH) or an ordinary member node. A CH is the group leader in each cluster. It collects sensed data from member nodes, aggregates, and transmits the aggregated data to the next CH or to the Base Station [5]. The role of an ordinary member node is to sense data from the environment in which they are deployed and send it to the corresponding CH.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 100 2.RELATED WORK LEACH is one of the most popular clustering techniques used in WSNs to increase the network lifetime [6] [7]. LEACH is an adaptive, self-organizing and distributed clustering protocol. It assumes that the BS is fixed and located far from the sensors, all sensor nodes are homogenous and have limited energy source, sensors can sense the environment at a fixed rate and can communicate among each other, and sensors can directly communicate with BS. The idea of LEACH is to organize the nodes into clusters to distribute the energy among the sensor nodes in the network, and in each cluster there is an elected node called a CH. LEACH introduces the concept of Rounds each of which consists of two phases. Clusters are formed during the set-up phase and data transfer occurs during the steady-state phase. A centralized routing protocol (contrast to LEACH which is distributed) called Base-Station Controlled Dynamic Clustering Protocol (BCDCP) was introduced in [8]. BCDCP assumes that the BS has sufficient energy during its operation. Furthermore, it assumes that the BS knows the places of all nodes. The fundamental idea of BCDCP is the formation of balanced clusters centrally by the BS, where each CH manages an equal number of member nodes to avoid CH overload, and organizing placement of the formed CHs throughout the network area. In BCDCP, there are two phases. The first phase is the setup phase, in which, the BS prepares a list of all potential CHs based on their remaining energy level. Then, the BS uses the list to pick out the two farthest CHs, and divides the nodes into two groups based on closeness. Then, it performs a balancing process on the groups. This process is reiterated within each group until all clusters are formed. As soon as all clusters are formed, the BS structures a “minimum spanning tree” that links all CHs, and randomly picks out one CH to forward packets of data to BS. This is in contrast to LEACH where each CH directly communicates with the BS. The second phase of the BCDCP protocol is the steady state phase, in which each CH within each cluster creates a TDMA schedule to minimize collisions between sensor nodes trying to send data to the CH, and the nodes send the sensed data to the CH which performs data aggregation and compression and route it to the CH that is responsible for forwarding the data to the BS. 3.INTRODUCTION TO THE PROPOSED PROTOCOL In this paper we propose a Dynamic Re-clustering protocol (DR-LEACH) as an improvement over the LEACH protocol. The main goal is to develop a protocol that optimizes the cluster’s size such that each CH serves an approximately equal number of sensor nodes. Consequently, processing and transmission performed by each CH is as equal as possible to each other. As a result, network life time will be extended and nodes will die around the same time. The rest of the paper is organized as follows: Section 2 explains the network and radio models assumed in our protocol. A detailed description of the Methodology of DC-LEACH is explained in section 3. Section 4 demonstrates the experimental of the DC-LEACH. Finally we conclude the paper in section 5. 4.NETWORK ASSUMPTIONS AND RADIO MODEL In this section we describe the network and radio model assumed in the DR-LEACH. We did use the first radio model used in the original LEACH protocol [6]. The model assumes the following:  The BS is fixed during the running of the protocol (immobile).  All sensor nodes are homogenous and supplied with the same initial energy.  All sensor nodes are stationary.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 101 In addition, we assume that each sensor node is capable to act in two different roles: CH role and normal sensing role. When the node is in the normal sensing role, it senses the environment and sends the sensed data to its CH. In the CH role, it collects the sensed data from its members in the cluster, performs data aggregation and compression, then generates a composite signal and transmits to the BS. Figure 1 shows the first order radio model. The required energy to transmit and receive a k-bit data message over a distanced d is given by (2) and (3): Where ETX and ERX are the required energy consumed per bit to operate the transmitter or receiver circuitry, respectively. ER is the required energy to receive k-bit data message. and are amplifier parameters correspond to free space and multi-path fading models. is the threshold distance given by : For the purpose of simulations we considered that ETX = ERX= 50 nJ/bit, =10 pJ/b/m2 , =0.0013 pJ/b/m4 . EDA=5 nJ/b/message, where EDA is the energy required for data aggregation. These values are mostly used in the literature for evaluating LEACH performance [8, 9, 10, 11]. Figure 1. First order radio model. [12] 5.METHODOLOGY OF THE PROPOSED PROTOCOL The original LEACH is composed of two phases: the setup phase and the steady-state phase. The proposed protocol, DR-LEACH, is also composed of same two phases. However, it added two more steps in the setup phase: splitting and merging. This section provides a detailed description of the proposed protocol phases. 5.1DR-LEACH SETUP PHASE At the beginning of the setup phase, initial CHs are elected and clusters are formed similar to the LEACH protocol. The formed clusters are not optimal in sizes, i.e. some clusters might have very small number of nodes while some might have large number of nodes. As a result, CHs which serves a large number of sensor nodes will consume more energy and will die faster than others. (3) (2) (4)
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 102 This affects the functionality of the network in the sense that some clusters might get isolated from the network due to fast discharge of the CH. In addition, it also affects the efficiency of energy consumption and the network lifetime. DR-LEACH tries to distribute nodes among CHs equally such that the CH’s have equal amount of work to do in terms of processing and transmission. This will improve the efficiency of the energy consumption and as a result prolonging the network lifetime. After the initial clusters are formed, we calculate the optimal number of clusters (Kopt) [13]. Kopt is calculated as shown in (5)[14]: Kopt= Where n is the number of alive nodes and Dbs is the average distance between the CH and BS. Dbs is calculated as shown in (6)[14]: Dbs= (0.765*one dimension of the field)/2 Then, we calculate the optimal cluster size (Nopt) by dividing the total number of alive nodes, n, over the previously computed Kopt. That is, Nopt is calculated by: For the best result, the size of each cluster should be exactly Nopt. However, this requires more computation to guarantee this exact size since a size which is one more or one less than the optimal size will not be considered optimal and hence we have to reprocess the cluster until we get an exact match which will force the protocol to converge after longer time (provided that the total number of alive nose is an exact multiple of Kopt. Otherwise, the protocol will not converge). Therefore, to let the protocol converge faster and reduce processing, DR-LEACH considers a cluster to be optimal if its size lies in an interval that is bound by an upper and lower limits and is centered at Nopt as shown in Figure 2. This interval is called the optimal range of the cluster size. Consequently, if the cluster size is greater than the minimum limit (Nopt_min) and less than the maximum limit (Nopt_max), it is considered as an optimal cluster size. Otherwise, we have to perform re-clustering: splitting large clusters or merging small cluster to form an optimal cluster. Figure 2. Optimal cluster size boundaries Nopt_max, Nopt_min are calculated as shown in (8) and (9), respectively Nopt_max=Nopt + a Nopt_min=Nopt – a (5) (6 ) (7) (8) (9)
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 103 Where a is a dummy variable that represent the deviation from the exact optimal cluster size. For faster convergence and less computation, we assume that Nopt_max is twice larger than Nopt_min such that if we split a large cluster in half, it would result in a two clusters whose sizes are optimal and need no further processing is required. This is shown in (10). Nopt_max=2* Nopt_min Using equations (8), (9), and (10), we can compute the values of Nopt_min andNopt_max as shown in (11) and (12), respectively. As soon as Nopt_max and Nopt_min are calculated, the nest step in the setup phase is that each cluster checks its size. If the cluster size is less than Nopt_min we perform merging. In this step, the CH informs its members that it is no longer a CH, and returns to the normal sensing node. Each detached member node independently joins the closest CH (a one with the highest RSSI signal). If, as a result of merging, a cluster’s size becomes greater than Nopt_max, it is split as described in the next paragraph. Otherwise, it is still in the optimal and no further processing is required. Each time a merging operation is performed, the number of clusters is decreased by 1. A splitting operation is performed if the cluster size exceeds Nopt_max. In such case, the CH searches its cluster for a node with the highest residual energy. When the CH finds the desired node, it sends a signal message to that node to inform it to become a second CH (CHnd) within the cluster. Then, each node of the cluster joins either of the CH’s based on the RSSI. As a result, the old cluster (whose size is greater than Nopt_max) will be split into two clusters. In the case that one of the resulting clusters has a size that is less than Nopt_min, merging is performed as described in the above paragraph. Each time a splitting operation is done the number of clusters is increased by 1. The merging and splitting operations are repeatedly performed for all clusters to optimize their sizes. At the end, all formed clusters are between Nopt_min and Nopt_max, which means are optimal range and no further processing in regard of forming clusters is required. 5.2 DC-LEACH STEADY STATE PHASE As soon as all clusters are formed, each CH creates a TDMA schedule to organize the transmissions of its member nodes. A member node starts sending its sensed data to the CH during its allocated time slot. When the CH receives all data from its members, CH performs data aggregation and data compression then it generates a composite signal and transmitted to the BS. In fact, this is similar to the original LEACH steady state phase. In Figure 3 we illustrate the methodology of our proposed protocol. (10) (11) (12)
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 104 Figure 3: Illustration of the proposed protocol methodology. . 6.EXPERIMENTAL RESULTS In this section, the experiment results and performance of the DR-LEACH protocol are presented. The protocol is simulated using MATLAB as were done in [8,6]. Each run of the protocol is repeated 20 times and the results are averaged to guarantee statistical reliability. After that, the results are compared to both BCDCP and LEACH protocols. The performance is measured against the number of alive nodes, total residual energy, first dead node, and 50% dead nodes. Table 1 lists the values of the parameters used in the simulation, which are typically used for evaluating LEACH performance [8,9,10,11]. Table 1. List of parameters The Parameter The Value Data Packet Size 2000 bits Initial Energy 0.5 J Eelec 50 nJ/bit Emp 0.0013 pJ/b/m4 Efs 10 pJ/bit/m2 EDA 5 nJ/b/message Deployment Random
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 105 In the experiment we simulate a 300 sensor nodes deployed in an area of (100×100) m. Different locations of the BS are considered in this experiment. Specifically, the BS is positions at (0,0) [lower left corner], (0, -100), (0, -200), and (150, 50). Figures 4, 5, 6, and 7 show the number of alive sensor nodes in each round of the protocols for different positions of the BS. As can be depicted from the figure, DR-LEACH is the most energy- saving protocol for the first dead node, and 50% dead nodes and the last dead node whether the BS is close or far from the nodes. As a result, DR-LEACH extends the network lifetime compared to LEACH and BCDCP protocols regardless of the BS location. Hence, it shows more scalability in terms of how far the BS can be away from the nodes. All of this is due to the way it handle cluster formation and generating optimal clusters. Figure 4. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0,0) Figure 5. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0,-100) 0 100 200 300 400 500 600 700 800 50 100 150 200 250 300 Number of Rounds NumberofAliveNodes BCDCP DR-LEACH LEACH 0 50 100 150 200 250 300 0 100 200 300 Number of Rounds NumberofAliveNodes DR-LEACH LEACH BCDCP
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 106 Figure 6. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (0-200) Figure 7. Number of live nodes for the DR-LEACH, BCDCP and LEACH, BS at (150, 50) Figures 8, 9, 10, and 11 show the total residual energy during each round of DR-LEACH, LEACH, and BCDCP protocols where the BS is located at (0,0), (0, -100), (0, -200) , and (150, 50) respectively. It can be seen that DR-LEACH is more energy-conserving than the other two protocols. This is due primarily to the dynamic merging and splitting mechanisms it utilizes. This leads to balanced energy consumption between clusters. Consequently, less energy is consumed in each round by a cluster. As a result, more energy is conserved in each round, and the network lifetime is extended, whether for the first dead node, 50% dead node, or the last dead node 0 20 40 60 80 100 120 0 100 200 300 Number of Rounds NumberofAliveNodes BCDCP DR-LEACH LEACH 0 50 100 150 200 250 300 350 400 50 100 150 200 250 300 Number ofRounds NumberofAliveNodes BCDCP DR-LEACH LEACH
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 107 Figure 8. Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0, 0) Figure 9: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0,-100) Figure 10: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (0,-200) 0 100 200 300 400 500 600 700 800 0 50 100 150 Number of Rounds TotalResidualEnergy(J) BCDCP DR-LEACH LEACH 0 50 100 150 200 250 300 0 50 100 150 Number of Rounds TotalResidualEnergy(J) BCDCP DR-LEACH LEACH 0 20 40 60 80 100 120 0 50 100 150 Number of Rounds TotalResidualEnergy(J) BCDCP DR-LEACH LEACH
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 108 Figure 11: Total residual energy for the alive nodes for DR-LEACH, BCDCP and LEACH, BS at (150,50) Table 2 summarizes the results of the experiment and provides a comparison of network lifetimes for the first dead node, 50% dead node, and the enhancement percentage of DR-LEACH over BCDCP and LEACH protocols. As can be figured out from the table and the above figures, the location of the BS greatly affects the occurrence rate of the first dead node. Farther BS will result in consuming more energy. However, DR-LEACH performance is still better than the other protocols regardless of the location of the BS. For example, when the BS is at (0,-100) the DC- LEACH is 200% and 300% better than LEACH in terms of first dead node and 50% dead nodes, respectively. In addition, it is 36.4% and 79.1% better than the BCDCP in terms of first dead node and 50% dead nodes respectively at the same location. Table2: Comparison of network lifetimes for the DC-LEACH, BCDCP and LEACH protocols for different BS locations (No of sensor nodes = 300, area = 100m x 100m). BS Location Protocol Round at which the event happened Enhancement % of DR- LEACH compared to other protocols First Dead Node 50% Dead Nodes First Dead Node 50% Dead Nodes (0,0)m DR-LEACH 107 242 - - BCDCP 46 165 132.6% 46.67% LEACH 25 77 328% 214.3% (0,-100)m DR-LEACH 30 120 - - BCDCP 22 67 36.4% 79.1% LEACH 10 30 200% 300% (0,-200)m DR-LEACH 18 68 - - BCDCP 14 42 28.57% 61.9% LEACH 6 18 200% 277.78% (150,50)m DR-LEACH 50 194 - - BCDCP 46 109 8.69% 77.98% LEACH 26 54 92.3% 259.25% 0 100 200 300 400 0 50 100 150 Number of Rounds TotalResidualEnergy(J) DCDCP DR-LEACH LEACH
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 109 7.CONCLUSIONS This paper presents a dynamic re-clustering protocol (DR-LEACH) to balance the load among CHs by taking into consideration the optimal number of CHs and calculating the optimal cluster size. Based on that, the protocol re-clusters all clusters that beneath lower boundary of optimal cluster size and split clusters that are above the upper optimal boundary. Although these techniques will increase up the computational power, but this rise is always negligible compared to the reduction in number of required transmissions. In this paper we have simulated the proposed protocol and compared it with BCDCP and LEACH protocols. Simulation results show that in DR-LEACH is better than both LEACH and BCDCP. In fact, DR-LEACH shows great improvement over LEACH regardless of the location of the BS. For example, an enhancement as large as 328% is achieved when the BS is located at (0,0), and as minimum as 92.3% when the BS is located at (150,50). Also, Improvement over the BCDCP is achieved but in less figures. In addition, simulation results show that DR-LEACH is more energy-conserving than both LEACH and BCDCP protocols irrespective of the BS location. In addition, it can be concluded that the technique of cluster balancing in DR-LEACH is better than the one used in BCDCP since DR- LEACH is more energy conserving. In BCDCP, there is a single CH which is randomly chosen to forward data the BS. All the CHs send their data to that chosen node which will finally send the aggregated data to the BS. As a result, energy consumption is not balanced between nodes. On the other hand, creating equal clusters that directly communicate with the BS distributes energy consumption more evenly which results in having more residual energy in the network. As a result, the network lifetime is extended and the nodes keep running for longer time and die relatively close in time to each other. REFERENCES [1] Deborah Estrin et al, "Next century challenges: scalable coordination in sensor networks," in ACM/IEEE international conference on Mobile computing and networking , New York, NY, USA, 1999 . [2] C. F. Wang , J. D. Shih, B. H. Pan and T. Y. Wu, "A Network Lifetime Enhancement Method for Sink Relocation and Its Analysis in Wireless Sensor Networks," Sensors Journal, IEEE (Volume:14 , Issue: 6 ), pp. 1932 - 1943, 2015. [3] J. Abawajy and S. Ghanavati, "An Alternative Node Deployment Scheme for WSNs," Sensors Journal, IEEE (Volume:15 , Issue: 2 ), pp. 667 - 675, 2015. [4] Guan Xin et al, "EEHCA: An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks," vol. 8, no. 2, 2008. [5] S. Ghiasi et al, "Optimal Energy Aware Clustering in Sensor Networks," MDPI Sensors, vol. 2, no. 7, p. 258–269, 2002. [6] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000. , Hawaii , 2000. [7] M. Aslam et al, "Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless Sensor Networks," arXiv preprint arXiv:1207.2609, vol. v1, 2012. [8] S. D. Muruganathan, D. C. F. Ma and R. I. Bh, "A centralized energy-efficient routing protocol for wireless sensor networks," Communications Magazine, IEEE, vol. 43, no. 13, pp. S8-S13, March 2005. [9] T. Kang, J. Yun, H. Lee and I. Lee, "A Clustering Method for Energy Efficient Routing in Wireless Sensor Networks," in International Conference on Electronics, Hardware, Wireless and Optical Communications EHAC'07 Proceedings of the 6th WSEAS, Corfu Island, Greece, 2007. [10] M.Bani Yassein et al, "Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)," in Journal of Digital Content Technology and its Applications, 2009. [11] M. Tong and M. Tang, "LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network," in 6th International Conference on wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, 2010.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015 110 [12] C. Y. Wen and Y. C. Chen, "Dynamic Hierarchical Sleep Scheduling for Wireless Ad-Hoc Sensor Networks," vol. 9, no. 5, 2009. [13] A.B.M. Alim Al Islam et al, "Finding the Optimal Percentage of Cluster Heads from a New and Complete Mathematical Model on LEACH," Scientific Research, vol. 2, no. 2, pp. 129-140, 2010. [14] V. S. Krishna Gopal Vijayvargiya, "An Amend Implementation on LEACH protocol based on Energy Hierarchy," International Journal of Current Engineering and Technology, vol. 2, no. 4, pp. 427-431, 2012. [15] W.R. Heinzelman et al, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000.. AUTHORS Dr. Abdullah Ijjeh has received his BSc in Electrical Engineering from Kuwait University in 1981. He received his M.Sc. in communication engineering from Yarmouk University, Jordan in 1988. He received his PhD in communication engineering from The Bonch- Bruevich Saint - Petersburg State University of Telecommunications, St. Petersburg, Russia 1995. Currently he is working at the Department of communication engineering at Al- Balqa` Applied University, Jordan. His research interests are fibre optics and wireless and communication systems. Abdalraheem Ijjeh has obtained his BSc form Yrmouk university 2009, M.Sc from the Jordanian 2013. Currently he is a lecturer in the Technical College at Ranya, Ranya, Saudi Arabia Dr. Huthaifa Al-Issa is currently working as an assistant professor at the department of communication engineering at Al-Balqa` Applied University, Jordan. Dr. Saed Thuneibat is currently working as an associate professor at the department of communication engineering at Al-Balqa` Applied University, Jordan.