SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
93
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Energy Consumption Minimization in WSN using BFO
Nidhi Malik
CSE Department
N.C College of Engineering
Israna, Panipat
nidhimalik63@gmail.com
Anju Bhandari
HOD & Assistant Professor, CSE Department
N.C College of Engineering
Israna, Pnipat
er.anjugandhi@gmail.com
Abstract— The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor
networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in
hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes
important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic
controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization
method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good
performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result
in improved performance with faster convergence.
Keywords— Wireless sensor network, ABC, BFO Algorithm.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
A. Wireless Sensor Networks
Sensor nodes offer a powerful mixture of distributed
sensing, computing and verbal exchange. The ever-
increasing skills of those tiny sensor nodes, which include
sensing, statistics processing, and speaking, allow the belief
of WSNs primarily based at the collaborative attempt of a
number of other sensor nodes. They allow an extensive
range of programs and, at the equal time, provide numerous
challenges because of their peculiarities, basically the
stringent electricity constraints to which sensing nodes are
generally subjected. WSNs comprise knowledge and
technologies from 3 unique fields; Wireless
communications, networking and Systems and Control
theory. In order to understand the existing and potential
applications for WSNs, state-of-the-art and extraordinarily
green communication protocols are required. This chapter
offers a first advent to the WSNs, consisting of structure,
specific traits and packages.Much more important to
detector network operation is electricity-performance, that
dictates community period of time, and also the high level
QoS, or fidelity, that's met over the direction of the network
period of time. This QoS is application-precise and will be
measured variety of various strategies. For instance, in a
normal police investigation utility, it should be needed that
one detector stays active inside every sub location of the
network, so as that any entrant is also detected with High
chance. During this scenario, QoS may be delineated by
means that of the share of the environment that's genuinely
blanketed by spirited sensors. in a very normal trailing
application, this QoS may be the anticipated accuracy of the
goal space estimation provided by means that of the
community.
Figure 1.1 Wireless Sensor Networking
B. Network Protocols
When we style the network protocols for a Wi-Fi detector
networks, then numerous sorts of key parts area unit to be
thought about. Initial and main, thanks to the scarce power
assets, routing choices ought to
be guided through a number of awareness of the ability
resources within the network. Moreover, detector networks
area unit explicit from fashionable advert hoc networks
therein contact channels oft exist between activities and
sinks, in situ of between man or girl supply nodes and sinks.
The sink node(s) area unit ordinarily larger interested in
associate degree traditional description of the environment,
as hostile specific readings from the individual detector
devices. Thus, communication in detector networks is
usually referred to as statistics-centric, rather than cope
with-centric, and records could also be aggregate regionally
as hostile having all raw records sent to the sink(s). These
specific functions of detector networks have implications
within the community layer and so need a re-taking under
consideration protocols for statistics routing. In addition,
sensors typically have understanding in their personal space
as how to meaningfully investigate their facts. These
neighborhood facts could also be applied among the
network layer for routing functions. Finally, if a detector
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
94
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
network is correctly connected (i.e., above is required to
produce communication paths), topology management
services need to be used at the aspect of the everyday
routing protocols.
1) Clustering for knowledge Aggregation
As detector networks area unit foretold to scale to massive
numbers of nodes, protocol measurability could be a crucial
style criterion. If the sensors area unit managed directly by
victimization the bottom station, communication overhead,
management delay, and management complexness end up to
be limiting parts in community performance. Clump has
been planned with the help of researchers to establishment a
number of sensors, ordinarily within a geographic
neighborhood, to form a cluster that's controlled by
approach of a cluster head. A hard and fast or adaptive
technique could also be used for cluster maintenance.
Support many critical network features inside a cluster,
which includes channel access for cluster contributors and
energy control, in addition to among clusters, consisting of
routing and code separation to avoid inter-cluster
interference. Moreover, clustering distributes the control
duty from the bottom station to the cluster heads, and gives
a handy framework for records fusion, local selection
making and local control, and strength savings.
The important purpose of WSNs protection is to protect the
wireless sensing element networks from any sorts of attack.
Completely different the various} application eventualities
provided within the sooner phase denote those WSNs may
additionally have terribly different residences. Thus,
considering the accepted protection necessities and
application state of affairs the algorithmic program is
developed to relaxed a WSN. The foremost homes that
created the security mechanism exhausting in WSNs are aid
constraints, operational surroundings and unreliable spoken
communication, which might be mentioned at a lower place.
Resource constraint Resource constraints: it is commonly
assumed that sensing element nodes are very resource
restricted. For associate degree example, the Berkeley
MICA2motes and TMotemini are offered in Table 1.3 [36]
[37]. Thus, protection protocols for WSNs need to be
possible supported to be had hardware and notably ought to
be terribly economical in phrases of strength consumption
and execution time.
II. PROPOSED WORK
Wireless sensor network (WSN) is a very fast evolving
technological platform having tremendous applications
scopes in several domains for examplehealth monitoring,
agriculture, military, structural monitoring, homenetworks
and many more.A WSN contains substantial number
ofsmall-size sensor nodes with low power consumption and
must be capable of detecting physical phenomena for
example constrained in energy supply, bandwidth and
processing power. In our work, we implemented Bacterial
Foraging Optimization (BFO) algorithm in a cluster-based
routing protocol based on Sugeno fuzzy inference system.As
in a given populations of nodes clustering can be done by
different techniques such as FCM, Kmeans, Cmeans etc. We
have used Kmeans for clustering as it is efficient and fast.
After clustering centroid of clusters chosen. In the cluster-
based protocols Cluster Heads (CHs) are generally selected
among all sensor nodes from pool of nodes who is reliable
to maintain cluster work, and then, clusters are made
byassigning each node to the nearest CH. The major
limitation is to generate an inappropriate distribution of CHs
over WSN. The main steps of our work can be summarized
as follows:
• An optimized Sugeno fuzzy inference system (FIS) is
proposed as an efficient and fast, application specific routing
protocol in Wireless Sensor Network environment. We have
designed three membershipfunctions with 27 set of rules in
Sugeno
• K-means algorithm is utilized to form balanced clusters
over the network.
• An objective function is made to calculate residual energy
(RE), distance of node from sink (DNS), distance of node
from centroid (DNC). Position of centroid is calculated by
Kmeans algorithm. Objective function also finds position of
Cluster Head on the basis of fuzzy inference system.
• Bacterial Foraging Optimization (BFO) algorithm is
implemented to optimize the fuzzy rules of FIS file in order
to prolong the network lifetime, based on the different
applicationspecifications.Flow chart of our work is given
below for easy understanding.
A. FUZZY LOGIC INFERENCE SYSTEM
As the fuzzy inference system FIS can achieve a better
combination of the all input parameters to obtain the optimal
output. So a Sugeno FIS is constructed in MATLAB. The
fuzzy controller consists of three parts: first is fuzzification
in which real environment variables are converted to fuzzy
variables, second is inference model which inherits the rule
sets or decision variables and third is defuzzifications which
reverse the fuzzy variables to environment variables. These
are:
1. Residual energy of node (RE)
2. Distance of node from sink of cluster (DNS)
3. Distance of node from centroid of cluster (DNC)
The three input signals are fuzzified and represented in
fuzzy set notations by membership functions. The defined
‗if … then …‘ rules produce the linguistic variables and
these variables are defuzzified into control signals for
comparison. Fuzzy logic control involves three steps:
fuzzification, decision-making using FIS and
defuzzification. Fuzzification transforms the non-fuzzy
(numeric) input variable measurements into the fuzzy set
(linguistic) variable that is a clearly defined boundary. In the
proposed controller, the RE, DNS and DNC are defined by
linguistic variables such as LOW, MED, HIGH
characterized by memberships. The memberships are curves
that define how each point in the input space is mapped to a
membership value between 0 to 1 for RE and -1 to 1 for
DNC and DNS. The membership functions belonging to the
other phases are trapezoidal Membership functions for the
inputs are shown in Fig.2.1.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
95
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 2.1: Membership function of input RE
1) Calculation of Residual Energy of each node
In every round, the nodes sense the WSN environment and
send the obtained information to the sink. The sink is
responsible for receiving the data from nodes, and sending
this information to the user end. All nodes have the same
capabilities of sensing, processing and communicating. Each
node can communicate directly with the sink and with other
nodes. All nodes are equipped with GPS devices, so they are
aware of their own location as well as the location of the
sink. The first order radio communication is used to model
the dissipated energy. In this model, a radio dissipates
𝐸𝑒𝑙𝑒𝑐 × 𝑙 to run either the transmitter or the receiver
circuitry. The energy consumption for transmitter and𝑙 bit
data packet with distance 𝑑 can be formulated as equation
15.
𝐸 𝑇𝐷(𝑙 × 𝑑) =
𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀𝑓𝑠 × 𝑑2
𝑖𝑓 𝑑 ≤ 𝑑0
𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀 𝑎𝑚𝑝 × 𝑑4
𝑖𝑓 𝑑 > 𝑑0
15
𝐸 𝑅𝑋 (𝑙) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐
Where 𝐸𝑒𝑙𝑒 𝑐 is the dissipated energy (per bit) in every
transmitter and receiver circuit, and depends on such
electronics factors as digital coding, modulation, filtering
and spreading of the signal. The amplifier parameter used
for free space and multipath environment 𝜀𝑓𝑠 and
𝜀 𝑎𝑚𝑝 respectively. The distance threshold 𝑑0 is defined as
𝑑0 = 𝜀𝑓𝑠 /𝜀 𝑎𝑚𝑝
2) Performance evaluation:
An overall clustering is firstly performed via Kmeans and
then a CH is selected within the each cluster. In order to
demonstrate the effectiveness of the proposed, the maximum
and standard deviation of intra-cluster distance are used to
compare by BFO and ABC algorithms.The standard
deviation of intra-cluster distance can be expressed as
𝑆𝑇𝐷𝑐𝑙 =
1
𝑁
(𝑥𝑖
𝑁
𝑖=1
𝑀
𝐽=1
𝑎𝑖𝑗 − 𝑐𝑗 )2
Where,𝑎𝑖𝑗 is binary parameter determining whether node i
belongs to cluster j or not. In order to demonstrate the
effectiveness of the BFO, simulation results of the both
algorithm are compared for 50mx50m , 100mx100m and
200x200m geographical area. The base station located at the
centre of the network. All sensors have the same initial
energy. Table 1.1 presents the network details.
Table 1.1Network details
Parameter Value
Initial energy 1 J
𝐸𝑒𝑙𝑒𝑐 50 nJ/bit
𝐸𝑓𝑠 100 pJ/bit/𝑚2
𝐸𝑎𝑚𝑝 0.013pJ/bit/𝑚2
Data packet size 4000 bit
Control packet
size
50 bit
B. FUZZY LOGIC TUNED WITH BFO
1) Description
In previous section we discuss the fuzzy logic decided
output on the basis of three inputs RE, DNS, DNC
membership functions. In figures 2.2-2.4 membership range
of three inputs are defined. In the given fuzzy system, the
number of fuzzy memberships for the each input is 3 (Low,
Medium, and High). So, the number of fuzzy rules is
3×3×3=27.We tuned the membership function range based
on the input conditions and bacterial foraging optimization
(BFO algorithm. In BFO Bacteria move in random direction
in search of its food which takes time into convergence of
BFO.
2) Algorithm Steps
A step by step algorithm for the proposed work is given as:
STEP1. Initialize the node population random positions and
directions of bacteria.
STEP2. Apply Kmeans clustering technique to make
clusters of nodes and their centroids.
STEP3. Create an objective function which can calculate
RE, DNS. DNC and also choose CH on the basis of RE
and calculates mean RE of clusters and total node
population.
STEP4. Create a Fuzzy Inference System FIS using Sugeno
function for three inputs RE,DNS,DNC and make their
membership function and rule set to decide output.
STEP5. Initialize random positions and directions of
bacteria in BFO
STEP6. Consider the searching space dimension as number
of membership function values to be tuned which is 15
in our case.
STEP7. Initialize the chemotactic, swarming, reproduction
and dispersion steps. The initial step size of bacteria is
taken as 0.005.
STEP8. In each chemotactic step, for every bacteria fitness
function is and position of bacteria is updated by
position updating formula. It is
𝑛𝑒𝑤 𝑝𝑜𝑠 = 𝑜𝑙𝑑 𝑝𝑜𝑠 + 𝑠𝑡𝑒𝑝 𝑠𝑖𝑧𝑒
×
𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛
𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛 ∗ 𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛′
STEP9. In swarming step the previous fitness function
output is compared with the next position output of same
bacteria. If found less then position of bacteria is
updated again by formula given in step 5.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
96
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
STEP10. The present position of bacteria is termed as
current values of membership functions.
STEP11. The chemo tactic and swarming loop continues till
all initialized steps are completed. In each loop BFO
updates the direction of bacteria and move the bacteria
into the direction of fast convergence.
STEP12. Reproduction steps take place for bacteria with
high fitness function values.
STEP13. To disperse or kill the weak bacteria, a probability
of 0.25 is defined as the deciding probability. If random
probability is higher than it, bacteria is dispersed or vice
versa.
STEP14. Result will be positions of bacteria with minimum
fitness function output. These positions are membership
function‘s tuned variables for fuzzy logic controller.
Following these steps in optimization of BFO, optimal
values of fuzzy controller membership function is achieved
in our work.
III. RESULTS & DISCUSSION
In our work we have proposed a technique for increasing the
lifetime of a wireless sensor network (WSN) using fuzzy
logic controller and BFO optimisation algorithm the
proposed work is implemented in MATLAB R 2016a. The
basic description of MATLAB is given in appendix. We
have developed our code in modules and are named as per
their functions.
Table 1.2: input variables set in GSA optimization
Input Value
Total number of nodes 100
Total no. of clusters 3
Range for RE [0,1]
Range for DNS [-1,0]
Range for DNC [-1,0]
1. Create X no of nodes in wireless sensor network to
make WSN environment. Divide in 3 clusters using
Kmeans clustering technique.
2. Create Fuzzy inference system (FIS) file using
three inputs and three membership functions of
each inputs with a set of 27 rules to choose output.
3. Apply BFO algorithm to tune input parameters of
FIS.
4. Apply ABC algorithm to tune input parameters of
FIS.
5. Comparison of results of both BFO and ABC.
Case-1 When Geographical area is 50mx50m
When geographical area is 50 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
Figure 3.1 Nodes in cluster in geographical area of 50 m2
Figure 3.2 RE plot of BFO and ABC
Figure 3.3 Standard deviation of cluster distance
Table1.3 Cluster-wise comparsion for BFO and ABC for
case-1
Case-
1
50m2
Cluster 1 Cluster 2 Cluster 3
BFO 8.75456456141063 13.6266384294770 26.4814014635824
ABC 8.00970696477768 11.3888740950478 23.3974753421539
Case-2 When Geographical area is 100mx100m
When geographical area is 100 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
97
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 3.6 Nodes in cluster in geographical area of 100 m2
Figure 3.7 RE plot of BFO and ABC
Figure 3.8 Standard deviation of cluster distance
Table1.4 Cluster-wise comparsion for BFO and ABC for
case-2
Case-
2
100m2
Cluster 1 Cluster 2 Cluster 3
BFO 8.75456456141063 13.6266384294770 26.4814014635824
ABC 8.00970696477768 11.3888740950478 23.3974753421539
Case-3 When Geographical area is 200mx200m
When geographical area is 200 m2
then we calculated and
observed imapct of BFO and ABC algorithm on increasing
the lifetime of WSN.
Here are results of this case:
Figure 3.9 Nodes in cluster in geographical area of 200 m2
Figure 3.10 Standard deviation of cluster distance
Table 1.5 Cluster-wise comparsion for BFO and ABC for
case-3
Case-
3
200m2
Cluster 1 Cluster 2 Cluster 3
BFO 66.2532605617461 38.5725720516026 135.643533028712
ABC 88.0227760388700 28.2006211404531 75.2897030161919
Figure 3.11 RE plot of BFO and ABC
It can be observed that BFO is giving better performance in
comparison to ABC for same set of rules and WSN
environment. Further observation is that when geographical
area is large then results of BFO and ABC are comparable,
but for small geographical area BFO over perform the ABC
for same set of rules, WSN environment and conditions.
IV. RESULTS & DISCUSSION
A. Conclusion
Our thesis work includes the study of clustering, cluster
head (CH) selection and other energy efficient
communication protocols such as ABC and BFO
optimization algorithms for WSN, since it was proposed
earlier that clustering improves the network lifetime. We
used Fuzzy logic controller based approach for cluster head
choosing and compared performance of BFO and ABC for
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 93 – 98
_______________________________________________________________________________________________
98
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
cluster head selection and improvement of network lifetime.
It was also found that the BFO tuned Fuzzy controller gives
better results than ABC tuned parameters. We used ABC as
a reference to compare the
performance of each of the clustering methods It is
concluded that for three different geographical sizes BFO
tuned fuzzy logic controller gives improved result in respect
of network lifetime in comparison to ABC algorithm. As
geographical size increases impact of BFO becomes
comparable to that of ABC but for smaller areas BFO
should be preferred over ABC for longer network lifetime.
B. Future Scope
In this work we focused on longer network life time which
is very important parameter of a WSN network. But for a
better and secure WSN environment, security from external
attacks is also main concern. These types of attacks can be
overcome by end to end encryption. Second is a malicious
attack where attacker node attracts packet by inserting false
routing protocol. Secondly Guard node can also be used
when transmitted data from high security level to low
security level of transmission. Similarly, Multi-Level
Security algorithm can be analyzed and modified for better
performance along with our proposed technique of
increasing network lifetime.
REFERENCES
[1] Q. Yu, Z. Luo and P. Min, "Intrusion detection in wireless
sensor networks for destructive intruders," 2015 Asia-
Pacific Signal and Information Processing Association
Annual Summit and Conference (APSIPA), Hong Kong,
2015, pp. 68-75.
[2] P. R. Vamsi and K. Kant, "Secure data aggregation and
intrusion detection in wireless sensor networks," 2015
International Conference on Signal Processing and
Communication (ICSC), Noida, 2015, pp. 127-131.
[3] Ajith Abraham, CrinaGrosan and Carlos Martin-Vide,
―Evolutionary Design of Intrusion Detection Programs,‖
International Journal of Network Security, Vol.4, No.3,
PP.328–339, Mar. 2007.
[4] IoannisKrontiris, ZinaidaBenenson, ThanassisGiannetsos,
Felix C. Freiling and TassosDimitriou, ―Cooperative
Intrusion Detection in Wireless Sensor Networks.
[5] DjallelEddineBoubiche and AzeddineBilami, ―CROSS
LAYER INTRUSION DETECTION SYSTEM FOR
WIRELESS SENSOR NETWORK,‖ International Journal
of Network Security & Its Applications (IJNSA), Vol.4,
No.2, March 2012.
[6] Shio Kumar Singh, M P Singh and D K Singh, ―Intrusion
Detection Based Security Solution for Cluster-Based
Wireless Sensor Networks,‖ International Journal of
Advanced Science and Technology, Vol.30, May,2011.
[7] A. Anbumozhi, K.Muneeswaran,Sivakasi, ―Detection of
Intruders in Wireless SensorNetworks Using Anomaly,‖
International Journal of Innovative Research in Science,
Engineering and Technology, Volume 3, Special Issue 3,
March 2014.
[8] Centric Intrusion Detection in Wireless Sensor
Networks," 2012 IEEE International Conference on Green
Computing and Communications, Besancon, 2012, pp. 325-
334.
[9] F. Bao, I. R. Chen, M. Chang and J. H. Cho, "Trust-Based
Intrusion Detection in Wireless Sensor Networks," 2011
IEEE International Conference on Communications (ICC),
Kyoto, 2011, pp. 1-6.
[10] G. S. Brar, S. Rani, V. Chopra, R. Malhotra, H. Song and S.
H. Ahmed, "Energy Efficient Direction-Based PDORP
Routing Protocol for WSN," in IEEE Access, vol. 4, no. ,
pp. 3182-3194, 2016.
[11] L. Coppolino, S. DAntonio, A. Garofalo and L. Romano,
"Applying Data Mining Techniques to Intrusion Detection
in Wireless Sensor Networks," 2013 Eighth International
Conference on P2P, Parallel, Grid, Cloud and Internet
Computing, Compiegne, 2013, pp. 247-254.
[12] R. Bhargavi, V. Vaidehi, P. T. V. Bhuvaneswari, P.
Balamuralidhar and M. G. Chandra, "Complex Event
Processing for object tracking and intrusion detection in
Wireless Sensor Networks," 2010 11th International
Conference on Control Automation Robotics & Vision,
Singapore, 2010, pp. 848-853.
[13] HarmandeepKaur, ―A Novel Approach To Prevent Black
Hole Attack In Wireless Sensor Network‖International
Journal For Advance Research In Engineering And
Technology, Vol. 2, Issue VI, June 2014.
[14] Anurag Singh Tomar, ―Optimized Positioning Of Multiple
Base Station for Black Hole Attack‖ International Journal
of Advanced Research in Computer Engineering &
Technology Volume 3 Issue 8, August 2014.
[15] Sowmya K.S, ―Detection and Prevention of Blackhole
Attack in MANET Using ACO‖ International Journal of
Computer Science and Network Security, VOL.12 No.5,
May 2012.

More Related Content

What's hot

Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
M H
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
M H
 
Cost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocolCost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocol
jpstudcorner
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
IJCNCJournal
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET Journal
 
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
Cost aware s ecure routing (caser) protocol design for wireless sensor networksCost aware s ecure routing (caser) protocol design for wireless sensor networks
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
Pvrtechnologies Nellore
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
M H
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Editor IJCATR
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
ijsrd.com
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
IOSR Journals
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
Aarthi Raghavendra
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
Shakas Technologies
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
eSAT Publishing House
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
eSAT Journals
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
M H
 

What's hot (20)

Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
B05630814
B05630814B05630814
B05630814
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
 
Cost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocolCost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocol
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
Cost aware s ecure routing (caser) protocol design for wireless sensor networksCost aware s ecure routing (caser) protocol design for wireless sensor networks
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 

Similar to Energy Consumption Minimization in WSN using BFO

A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
Editor IJCATR
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
rahulmonikasharma
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET Journal
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
cscpconf
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET Journal
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
cscpconf
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
eSAT Publishing House
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
IJCNCJournal
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
 

Similar to Energy Consumption Minimization in WSN using BFO (20)

A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
Report
ReportReport
Report
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
De3211001104
De3211001104De3211001104
De3211001104
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 

Energy Consumption Minimization in WSN using BFO

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 93 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Energy Consumption Minimization in WSN using BFO Nidhi Malik CSE Department N.C College of Engineering Israna, Panipat nidhimalik63@gmail.com Anju Bhandari HOD & Assistant Professor, CSE Department N.C College of Engineering Israna, Pnipat er.anjugandhi@gmail.com Abstract— The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence. Keywords— Wireless sensor network, ABC, BFO Algorithm. __________________________________________________*****_________________________________________________ I. INTRODUCTION A. Wireless Sensor Networks Sensor nodes offer a powerful mixture of distributed sensing, computing and verbal exchange. The ever- increasing skills of those tiny sensor nodes, which include sensing, statistics processing, and speaking, allow the belief of WSNs primarily based at the collaborative attempt of a number of other sensor nodes. They allow an extensive range of programs and, at the equal time, provide numerous challenges because of their peculiarities, basically the stringent electricity constraints to which sensing nodes are generally subjected. WSNs comprise knowledge and technologies from 3 unique fields; Wireless communications, networking and Systems and Control theory. In order to understand the existing and potential applications for WSNs, state-of-the-art and extraordinarily green communication protocols are required. This chapter offers a first advent to the WSNs, consisting of structure, specific traits and packages.Much more important to detector network operation is electricity-performance, that dictates community period of time, and also the high level QoS, or fidelity, that's met over the direction of the network period of time. This QoS is application-precise and will be measured variety of various strategies. For instance, in a normal police investigation utility, it should be needed that one detector stays active inside every sub location of the network, so as that any entrant is also detected with High chance. During this scenario, QoS may be delineated by means that of the share of the environment that's genuinely blanketed by spirited sensors. in a very normal trailing application, this QoS may be the anticipated accuracy of the goal space estimation provided by means that of the community. Figure 1.1 Wireless Sensor Networking B. Network Protocols When we style the network protocols for a Wi-Fi detector networks, then numerous sorts of key parts area unit to be thought about. Initial and main, thanks to the scarce power assets, routing choices ought to be guided through a number of awareness of the ability resources within the network. Moreover, detector networks area unit explicit from fashionable advert hoc networks therein contact channels oft exist between activities and sinks, in situ of between man or girl supply nodes and sinks. The sink node(s) area unit ordinarily larger interested in associate degree traditional description of the environment, as hostile specific readings from the individual detector devices. Thus, communication in detector networks is usually referred to as statistics-centric, rather than cope with-centric, and records could also be aggregate regionally as hostile having all raw records sent to the sink(s). These specific functions of detector networks have implications within the community layer and so need a re-taking under consideration protocols for statistics routing. In addition, sensors typically have understanding in their personal space as how to meaningfully investigate their facts. These neighborhood facts could also be applied among the network layer for routing functions. Finally, if a detector
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 94 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ network is correctly connected (i.e., above is required to produce communication paths), topology management services need to be used at the aspect of the everyday routing protocols. 1) Clustering for knowledge Aggregation As detector networks area unit foretold to scale to massive numbers of nodes, protocol measurability could be a crucial style criterion. If the sensors area unit managed directly by victimization the bottom station, communication overhead, management delay, and management complexness end up to be limiting parts in community performance. Clump has been planned with the help of researchers to establishment a number of sensors, ordinarily within a geographic neighborhood, to form a cluster that's controlled by approach of a cluster head. A hard and fast or adaptive technique could also be used for cluster maintenance. Support many critical network features inside a cluster, which includes channel access for cluster contributors and energy control, in addition to among clusters, consisting of routing and code separation to avoid inter-cluster interference. Moreover, clustering distributes the control duty from the bottom station to the cluster heads, and gives a handy framework for records fusion, local selection making and local control, and strength savings. The important purpose of WSNs protection is to protect the wireless sensing element networks from any sorts of attack. Completely different the various} application eventualities provided within the sooner phase denote those WSNs may additionally have terribly different residences. Thus, considering the accepted protection necessities and application state of affairs the algorithmic program is developed to relaxed a WSN. The foremost homes that created the security mechanism exhausting in WSNs are aid constraints, operational surroundings and unreliable spoken communication, which might be mentioned at a lower place. Resource constraint Resource constraints: it is commonly assumed that sensing element nodes are very resource restricted. For associate degree example, the Berkeley MICA2motes and TMotemini are offered in Table 1.3 [36] [37]. Thus, protection protocols for WSNs need to be possible supported to be had hardware and notably ought to be terribly economical in phrases of strength consumption and execution time. II. PROPOSED WORK Wireless sensor network (WSN) is a very fast evolving technological platform having tremendous applications scopes in several domains for examplehealth monitoring, agriculture, military, structural monitoring, homenetworks and many more.A WSN contains substantial number ofsmall-size sensor nodes with low power consumption and must be capable of detecting physical phenomena for example constrained in energy supply, bandwidth and processing power. In our work, we implemented Bacterial Foraging Optimization (BFO) algorithm in a cluster-based routing protocol based on Sugeno fuzzy inference system.As in a given populations of nodes clustering can be done by different techniques such as FCM, Kmeans, Cmeans etc. We have used Kmeans for clustering as it is efficient and fast. After clustering centroid of clusters chosen. In the cluster- based protocols Cluster Heads (CHs) are generally selected among all sensor nodes from pool of nodes who is reliable to maintain cluster work, and then, clusters are made byassigning each node to the nearest CH. The major limitation is to generate an inappropriate distribution of CHs over WSN. The main steps of our work can be summarized as follows: • An optimized Sugeno fuzzy inference system (FIS) is proposed as an efficient and fast, application specific routing protocol in Wireless Sensor Network environment. We have designed three membershipfunctions with 27 set of rules in Sugeno • K-means algorithm is utilized to form balanced clusters over the network. • An objective function is made to calculate residual energy (RE), distance of node from sink (DNS), distance of node from centroid (DNC). Position of centroid is calculated by Kmeans algorithm. Objective function also finds position of Cluster Head on the basis of fuzzy inference system. • Bacterial Foraging Optimization (BFO) algorithm is implemented to optimize the fuzzy rules of FIS file in order to prolong the network lifetime, based on the different applicationspecifications.Flow chart of our work is given below for easy understanding. A. FUZZY LOGIC INFERENCE SYSTEM As the fuzzy inference system FIS can achieve a better combination of the all input parameters to obtain the optimal output. So a Sugeno FIS is constructed in MATLAB. The fuzzy controller consists of three parts: first is fuzzification in which real environment variables are converted to fuzzy variables, second is inference model which inherits the rule sets or decision variables and third is defuzzifications which reverse the fuzzy variables to environment variables. These are: 1. Residual energy of node (RE) 2. Distance of node from sink of cluster (DNS) 3. Distance of node from centroid of cluster (DNC) The three input signals are fuzzified and represented in fuzzy set notations by membership functions. The defined ‗if … then …‘ rules produce the linguistic variables and these variables are defuzzified into control signals for comparison. Fuzzy logic control involves three steps: fuzzification, decision-making using FIS and defuzzification. Fuzzification transforms the non-fuzzy (numeric) input variable measurements into the fuzzy set (linguistic) variable that is a clearly defined boundary. In the proposed controller, the RE, DNS and DNC are defined by linguistic variables such as LOW, MED, HIGH characterized by memberships. The memberships are curves that define how each point in the input space is mapped to a membership value between 0 to 1 for RE and -1 to 1 for DNC and DNS. The membership functions belonging to the other phases are trapezoidal Membership functions for the inputs are shown in Fig.2.1.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 95 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 2.1: Membership function of input RE 1) Calculation of Residual Energy of each node In every round, the nodes sense the WSN environment and send the obtained information to the sink. The sink is responsible for receiving the data from nodes, and sending this information to the user end. All nodes have the same capabilities of sensing, processing and communicating. Each node can communicate directly with the sink and with other nodes. All nodes are equipped with GPS devices, so they are aware of their own location as well as the location of the sink. The first order radio communication is used to model the dissipated energy. In this model, a radio dissipates 𝐸𝑒𝑙𝑒𝑐 × 𝑙 to run either the transmitter or the receiver circuitry. The energy consumption for transmitter and𝑙 bit data packet with distance 𝑑 can be formulated as equation 15. 𝐸 𝑇𝐷(𝑙 × 𝑑) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀𝑓𝑠 × 𝑑2 𝑖𝑓 𝑑 ≤ 𝑑0 𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝜀 𝑎𝑚𝑝 × 𝑑4 𝑖𝑓 𝑑 > 𝑑0 15 𝐸 𝑅𝑋 (𝑙) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐 Where 𝐸𝑒𝑙𝑒 𝑐 is the dissipated energy (per bit) in every transmitter and receiver circuit, and depends on such electronics factors as digital coding, modulation, filtering and spreading of the signal. The amplifier parameter used for free space and multipath environment 𝜀𝑓𝑠 and 𝜀 𝑎𝑚𝑝 respectively. The distance threshold 𝑑0 is defined as 𝑑0 = 𝜀𝑓𝑠 /𝜀 𝑎𝑚𝑝 2) Performance evaluation: An overall clustering is firstly performed via Kmeans and then a CH is selected within the each cluster. In order to demonstrate the effectiveness of the proposed, the maximum and standard deviation of intra-cluster distance are used to compare by BFO and ABC algorithms.The standard deviation of intra-cluster distance can be expressed as 𝑆𝑇𝐷𝑐𝑙 = 1 𝑁 (𝑥𝑖 𝑁 𝑖=1 𝑀 𝐽=1 𝑎𝑖𝑗 − 𝑐𝑗 )2 Where,𝑎𝑖𝑗 is binary parameter determining whether node i belongs to cluster j or not. In order to demonstrate the effectiveness of the BFO, simulation results of the both algorithm are compared for 50mx50m , 100mx100m and 200x200m geographical area. The base station located at the centre of the network. All sensors have the same initial energy. Table 1.1 presents the network details. Table 1.1Network details Parameter Value Initial energy 1 J 𝐸𝑒𝑙𝑒𝑐 50 nJ/bit 𝐸𝑓𝑠 100 pJ/bit/𝑚2 𝐸𝑎𝑚𝑝 0.013pJ/bit/𝑚2 Data packet size 4000 bit Control packet size 50 bit B. FUZZY LOGIC TUNED WITH BFO 1) Description In previous section we discuss the fuzzy logic decided output on the basis of three inputs RE, DNS, DNC membership functions. In figures 2.2-2.4 membership range of three inputs are defined. In the given fuzzy system, the number of fuzzy memberships for the each input is 3 (Low, Medium, and High). So, the number of fuzzy rules is 3×3×3=27.We tuned the membership function range based on the input conditions and bacterial foraging optimization (BFO algorithm. In BFO Bacteria move in random direction in search of its food which takes time into convergence of BFO. 2) Algorithm Steps A step by step algorithm for the proposed work is given as: STEP1. Initialize the node population random positions and directions of bacteria. STEP2. Apply Kmeans clustering technique to make clusters of nodes and their centroids. STEP3. Create an objective function which can calculate RE, DNS. DNC and also choose CH on the basis of RE and calculates mean RE of clusters and total node population. STEP4. Create a Fuzzy Inference System FIS using Sugeno function for three inputs RE,DNS,DNC and make their membership function and rule set to decide output. STEP5. Initialize random positions and directions of bacteria in BFO STEP6. Consider the searching space dimension as number of membership function values to be tuned which is 15 in our case. STEP7. Initialize the chemotactic, swarming, reproduction and dispersion steps. The initial step size of bacteria is taken as 0.005. STEP8. In each chemotactic step, for every bacteria fitness function is and position of bacteria is updated by position updating formula. It is 𝑛𝑒𝑤 𝑝𝑜𝑠 = 𝑜𝑙𝑑 𝑝𝑜𝑠 + 𝑠𝑡𝑒𝑝 𝑠𝑖𝑧𝑒 × 𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛 𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛 ∗ 𝑑𝑖𝑟𝑒𝑐𝑡𝑖𝑜𝑛′ STEP9. In swarming step the previous fitness function output is compared with the next position output of same bacteria. If found less then position of bacteria is updated again by formula given in step 5.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 96 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ STEP10. The present position of bacteria is termed as current values of membership functions. STEP11. The chemo tactic and swarming loop continues till all initialized steps are completed. In each loop BFO updates the direction of bacteria and move the bacteria into the direction of fast convergence. STEP12. Reproduction steps take place for bacteria with high fitness function values. STEP13. To disperse or kill the weak bacteria, a probability of 0.25 is defined as the deciding probability. If random probability is higher than it, bacteria is dispersed or vice versa. STEP14. Result will be positions of bacteria with minimum fitness function output. These positions are membership function‘s tuned variables for fuzzy logic controller. Following these steps in optimization of BFO, optimal values of fuzzy controller membership function is achieved in our work. III. RESULTS & DISCUSSION In our work we have proposed a technique for increasing the lifetime of a wireless sensor network (WSN) using fuzzy logic controller and BFO optimisation algorithm the proposed work is implemented in MATLAB R 2016a. The basic description of MATLAB is given in appendix. We have developed our code in modules and are named as per their functions. Table 1.2: input variables set in GSA optimization Input Value Total number of nodes 100 Total no. of clusters 3 Range for RE [0,1] Range for DNS [-1,0] Range for DNC [-1,0] 1. Create X no of nodes in wireless sensor network to make WSN environment. Divide in 3 clusters using Kmeans clustering technique. 2. Create Fuzzy inference system (FIS) file using three inputs and three membership functions of each inputs with a set of 27 rules to choose output. 3. Apply BFO algorithm to tune input parameters of FIS. 4. Apply ABC algorithm to tune input parameters of FIS. 5. Comparison of results of both BFO and ABC. Case-1 When Geographical area is 50mx50m When geographical area is 50 m2 then we calculated and observed imapct of BFO and ABC algorithm on increasing the lifetime of WSN. Here are results of this case: Figure 3.1 Nodes in cluster in geographical area of 50 m2 Figure 3.2 RE plot of BFO and ABC Figure 3.3 Standard deviation of cluster distance Table1.3 Cluster-wise comparsion for BFO and ABC for case-1 Case- 1 50m2 Cluster 1 Cluster 2 Cluster 3 BFO 8.75456456141063 13.6266384294770 26.4814014635824 ABC 8.00970696477768 11.3888740950478 23.3974753421539 Case-2 When Geographical area is 100mx100m When geographical area is 100 m2 then we calculated and observed imapct of BFO and ABC algorithm on increasing the lifetime of WSN. Here are results of this case:
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 97 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 3.6 Nodes in cluster in geographical area of 100 m2 Figure 3.7 RE plot of BFO and ABC Figure 3.8 Standard deviation of cluster distance Table1.4 Cluster-wise comparsion for BFO and ABC for case-2 Case- 2 100m2 Cluster 1 Cluster 2 Cluster 3 BFO 8.75456456141063 13.6266384294770 26.4814014635824 ABC 8.00970696477768 11.3888740950478 23.3974753421539 Case-3 When Geographical area is 200mx200m When geographical area is 200 m2 then we calculated and observed imapct of BFO and ABC algorithm on increasing the lifetime of WSN. Here are results of this case: Figure 3.9 Nodes in cluster in geographical area of 200 m2 Figure 3.10 Standard deviation of cluster distance Table 1.5 Cluster-wise comparsion for BFO and ABC for case-3 Case- 3 200m2 Cluster 1 Cluster 2 Cluster 3 BFO 66.2532605617461 38.5725720516026 135.643533028712 ABC 88.0227760388700 28.2006211404531 75.2897030161919 Figure 3.11 RE plot of BFO and ABC It can be observed that BFO is giving better performance in comparison to ABC for same set of rules and WSN environment. Further observation is that when geographical area is large then results of BFO and ABC are comparable, but for small geographical area BFO over perform the ABC for same set of rules, WSN environment and conditions. IV. RESULTS & DISCUSSION A. Conclusion Our thesis work includes the study of clustering, cluster head (CH) selection and other energy efficient communication protocols such as ABC and BFO optimization algorithms for WSN, since it was proposed earlier that clustering improves the network lifetime. We used Fuzzy logic controller based approach for cluster head choosing and compared performance of BFO and ABC for
  • 6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 8 93 – 98 _______________________________________________________________________________________________ 98 IJRITCC | August 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ cluster head selection and improvement of network lifetime. It was also found that the BFO tuned Fuzzy controller gives better results than ABC tuned parameters. We used ABC as a reference to compare the performance of each of the clustering methods It is concluded that for three different geographical sizes BFO tuned fuzzy logic controller gives improved result in respect of network lifetime in comparison to ABC algorithm. As geographical size increases impact of BFO becomes comparable to that of ABC but for smaller areas BFO should be preferred over ABC for longer network lifetime. B. Future Scope In this work we focused on longer network life time which is very important parameter of a WSN network. But for a better and secure WSN environment, security from external attacks is also main concern. These types of attacks can be overcome by end to end encryption. Second is a malicious attack where attacker node attracts packet by inserting false routing protocol. Secondly Guard node can also be used when transmitted data from high security level to low security level of transmission. Similarly, Multi-Level Security algorithm can be analyzed and modified for better performance along with our proposed technique of increasing network lifetime. REFERENCES [1] Q. Yu, Z. Luo and P. Min, "Intrusion detection in wireless sensor networks for destructive intruders," 2015 Asia- Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Hong Kong, 2015, pp. 68-75. [2] P. R. Vamsi and K. Kant, "Secure data aggregation and intrusion detection in wireless sensor networks," 2015 International Conference on Signal Processing and Communication (ICSC), Noida, 2015, pp. 127-131. [3] Ajith Abraham, CrinaGrosan and Carlos Martin-Vide, ―Evolutionary Design of Intrusion Detection Programs,‖ International Journal of Network Security, Vol.4, No.3, PP.328–339, Mar. 2007. [4] IoannisKrontiris, ZinaidaBenenson, ThanassisGiannetsos, Felix C. Freiling and TassosDimitriou, ―Cooperative Intrusion Detection in Wireless Sensor Networks. [5] DjallelEddineBoubiche and AzeddineBilami, ―CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK,‖ International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012. [6] Shio Kumar Singh, M P Singh and D K Singh, ―Intrusion Detection Based Security Solution for Cluster-Based Wireless Sensor Networks,‖ International Journal of Advanced Science and Technology, Vol.30, May,2011. [7] A. Anbumozhi, K.Muneeswaran,Sivakasi, ―Detection of Intruders in Wireless SensorNetworks Using Anomaly,‖ International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Special Issue 3, March 2014. [8] Centric Intrusion Detection in Wireless Sensor Networks," 2012 IEEE International Conference on Green Computing and Communications, Besancon, 2012, pp. 325- 334. [9] F. Bao, I. R. Chen, M. Chang and J. H. Cho, "Trust-Based Intrusion Detection in Wireless Sensor Networks," 2011 IEEE International Conference on Communications (ICC), Kyoto, 2011, pp. 1-6. [10] G. S. Brar, S. Rani, V. Chopra, R. Malhotra, H. Song and S. H. Ahmed, "Energy Efficient Direction-Based PDORP Routing Protocol for WSN," in IEEE Access, vol. 4, no. , pp. 3182-3194, 2016. [11] L. Coppolino, S. DAntonio, A. Garofalo and L. Romano, "Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks," 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, 2013, pp. 247-254. [12] R. Bhargavi, V. Vaidehi, P. T. V. Bhuvaneswari, P. Balamuralidhar and M. G. Chandra, "Complex Event Processing for object tracking and intrusion detection in Wireless Sensor Networks," 2010 11th International Conference on Control Automation Robotics & Vision, Singapore, 2010, pp. 848-853. [13] HarmandeepKaur, ―A Novel Approach To Prevent Black Hole Attack In Wireless Sensor Network‖International Journal For Advance Research In Engineering And Technology, Vol. 2, Issue VI, June 2014. [14] Anurag Singh Tomar, ―Optimized Positioning Of Multiple Base Station for Black Hole Attack‖ International Journal of Advanced Research in Computer Engineering & Technology Volume 3 Issue 8, August 2014. [15] Sowmya K.S, ―Detection and Prevention of Blackhole Attack in MANET Using ACO‖ International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012.