Cluster head election is a key technique used to reduce energy consumption and enhancing the throughput
of wireless sensor networks. In this paper, a new energy efficient clustering (E2C) protocol for
heterogeneous wireless sensor networks is proposed. Cluster head is elected based on the predicted
residual energy of sensors, optimal probability of a sensor to become a cluster head, and its degree of
connectivity as the parameters. The probability threshold to compete for the role of cluster head is derived.
The probability threshold has been extended for multi-levels energy heterogeneity in the network. The
proposed E2C protocol is simulated in MATLAB. Results obtained in the simulationshowthat performance
of the proposed E2Cprotocol is betterthan stable election protocol (SEP), and distributed energy efficient
clustering (DEEC) protocol in terms of energy consumption, throughput, and network lifetime.
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
In WSN the data aggregation is a means for condensing the energy requirement by reducing number of
transmission by combining the data and sending the final required result to the base station. The lifetime
of the WSN can be improved by employing the aggregation techniques. During the process of aggregation
the numbers of transmission are reduced by combining the similar data from the nearby areas. By using
the clustering technique and aggregating the correlated data greatly minimize the energy consumed in
collecting and disseminating the data. In this work, we evaluate the performance of a novel energy
efficient cluster based aggregation protocol (EECAP) for WSN. The main focus in this proposed work is
to study the performance of our proposed aggregation protocol with divergent sink placements such as
when sink is at the centre of the sensing field, corner of the sensing field or at a location selected
randomly in the sensor field. We present experimental results by calculating the lifetime of network in
terms of number of sensing rounds using various parameters such as – average remaining energy of
nodes, number of dead nodes after the specified number of sensing rounds. Finally the performance of
various aggregation algorithms such as LEACH, SEP and our proposed aggregation protocol (EECAP)
are compared with divergent sink placements. The simulation results demonstrates that EECAP exhibits
good performance in terms of lifetime and the energy consumption of the wireless sensor networks and
which can be as equally compared with existing clustering protocols.
Energy aware clustering protocol (eacp)IJCNCJournal
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
Clustering provides an effective method for
extending the lifetime of a wireless sensor network. Current
clustering methods selecting cluster heads with more residual
energy, and rotating cluster heads periodically to distribute the
energy consumption among nodes in each cluster. However,
they rarely consider the hot spot problem in multi hop sensor
networks. When cluster heads forward their data to the base
station, the cluster heads closer to the base station are heavily
burdened with traffic and tend to die much faster. To mitigate
the hot spot problem, we propose a Novel Energy Efficient
Unequal Clustering Routing (NEEUC) protocol. It uses residual
energy and groupsthe nodesinto clusters of unequal layers
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
In wireless sensor networks (WSN), conserving energy and increasing lifetime of the network are a critical issue that has been addressed by substantial research works. The clustering technique has been proven particularly energy-efficient in WSN. The nodes form groups (clusters) that include one cluster head and member clusters. Cluster heads (CHs) are able to process, filter, gather the data sent by sensors
belonging to their cluster and send it to the base station. Many routing protocols which have been proposed are based on heterogeneity and use the clustering scheme such as SEP and DEEC. In this paper we introduce a new approach called WDDC in which cluster heads are chosen on the basis
of probability of ratio of residual energy and average energy of the network. It also takes into consideration distances between nodes and the base station to favor near nodes with more energy to be cluster heads. Furthermore, WDDC is dynamic; it divides network lifetime in two zones in which it changes its behavior. Simulation results show that our approach performs better than the other distributed clustering protocols such as SEP and DEEC in terms of energy efficiency and lifetime of the network.
A Deterministic Heterogeneous Clustering Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
In wireless sensor network, devices or nodes are generally battery powered devices. These nodes have
limited amount of initial energy that are consumed at different rates, depending on the power level. The
lifetime of the network is defined as the time until the first node fails (or runs out of battery). In this paper
different type of energy efficient routing algorithms are discussed and approach of these algorithms is to
maximize the minimum lifetime of wireless sensor network. Special attention has been devoted for
algorithms formulate the routing problem as a linear programming problem, which uses the optimal flow
path for data transmission and gives the optimum results. Advantages, limitations as well as comparative
study of these algorithms are also discussed in this paper.
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
In WSN the data aggregation is a means for condensing the energy requirement by reducing number of
transmission by combining the data and sending the final required result to the base station. The lifetime
of the WSN can be improved by employing the aggregation techniques. During the process of aggregation
the numbers of transmission are reduced by combining the similar data from the nearby areas. By using
the clustering technique and aggregating the correlated data greatly minimize the energy consumed in
collecting and disseminating the data. In this work, we evaluate the performance of a novel energy
efficient cluster based aggregation protocol (EECAP) for WSN. The main focus in this proposed work is
to study the performance of our proposed aggregation protocol with divergent sink placements such as
when sink is at the centre of the sensing field, corner of the sensing field or at a location selected
randomly in the sensor field. We present experimental results by calculating the lifetime of network in
terms of number of sensing rounds using various parameters such as – average remaining energy of
nodes, number of dead nodes after the specified number of sensing rounds. Finally the performance of
various aggregation algorithms such as LEACH, SEP and our proposed aggregation protocol (EECAP)
are compared with divergent sink placements. The simulation results demonstrates that EECAP exhibits
good performance in terms of lifetime and the energy consumption of the wireless sensor networks and
which can be as equally compared with existing clustering protocols.
Energy aware clustering protocol (eacp)IJCNCJournal
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
Clustering provides an effective method for
extending the lifetime of a wireless sensor network. Current
clustering methods selecting cluster heads with more residual
energy, and rotating cluster heads periodically to distribute the
energy consumption among nodes in each cluster. However,
they rarely consider the hot spot problem in multi hop sensor
networks. When cluster heads forward their data to the base
station, the cluster heads closer to the base station are heavily
burdened with traffic and tend to die much faster. To mitigate
the hot spot problem, we propose a Novel Energy Efficient
Unequal Clustering Routing (NEEUC) protocol. It uses residual
energy and groupsthe nodesinto clusters of unequal layers
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
In wireless sensor networks (WSN), conserving energy and increasing lifetime of the network are a critical issue that has been addressed by substantial research works. The clustering technique has been proven particularly energy-efficient in WSN. The nodes form groups (clusters) that include one cluster head and member clusters. Cluster heads (CHs) are able to process, filter, gather the data sent by sensors
belonging to their cluster and send it to the base station. Many routing protocols which have been proposed are based on heterogeneity and use the clustering scheme such as SEP and DEEC. In this paper we introduce a new approach called WDDC in which cluster heads are chosen on the basis
of probability of ratio of residual energy and average energy of the network. It also takes into consideration distances between nodes and the base station to favor near nodes with more energy to be cluster heads. Furthermore, WDDC is dynamic; it divides network lifetime in two zones in which it changes its behavior. Simulation results show that our approach performs better than the other distributed clustering protocols such as SEP and DEEC in terms of energy efficiency and lifetime of the network.
A Deterministic Heterogeneous Clustering Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
In wireless sensor network, devices or nodes are generally battery powered devices. These nodes have
limited amount of initial energy that are consumed at different rates, depending on the power level. The
lifetime of the network is defined as the time until the first node fails (or runs out of battery). In this paper
different type of energy efficient routing algorithms are discussed and approach of these algorithms is to
maximize the minimum lifetime of wireless sensor network. Special attention has been devoted for
algorithms formulate the routing problem as a linear programming problem, which uses the optimal flow
path for data transmission and gives the optimum results. Advantages, limitations as well as comparative
study of these algorithms are also discussed in this paper.
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
With the availability of low cost, short range sensor technology along with advances in wireless networking, sensor networks has become a hot topic of discussion. The International Journal of Advanced Smart Sensor Network Systems is an open access peer-reviewed journal which focuses on applied research and applications of sensor networks. While sensor networks provide ample opportunities to provide various services, its effective deployment in large scale is still challenging due to various factors. This journal provides a forum that impacts the development of high performance computing solutions to problems arising due to the complexities of sensor network systems. It also acts as a path to exchange novel ideas about impacts of sensor networks research.
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
In wireless sensor networks (WSN), data fusion
should be energy efficient. But, determining the optimal
number of aggregators in an energy efficient manner is a
challenging task. Moreover, the existing data fusion
techniques mostly use the same path for transmitting
aggregated data to the sink which reduces the nodes lifetime.
In this paper, we propose a technique which combines energy
efficiency and multiple path selection for data fusion in WSN.
The network is partitioned into various clusters and the node
with highest residual energy is selected as the cluster head.
The sink computes multiple paths to each cluster head for
data transmission. The distributed source coding and the
lifting scheme wavelet transform are used for compressing
the data at the CH. During each round of transmission, the
path is changed in a round robin manner, to conserve the
energy. This process is repeated for each cluster. From our
simulation results we show that this data fusion technique
has less energy consumption with increased packet delivery
ratio, when compared with the existing schemes.
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...chokrio
The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing of energy consumption across all nodes of the heterogeneous network is very important to prevent the death of those nodes and thereafter increase the
lifetime of the network. DEEC (Distributed Energy Efficient Clustering) is one of routing protocols
designed to extend the stability time of the network by reducing energy consumption. A disadvantage of
DEEC, which doesn’t takes into account the cluster size and the density of nodes in this cluster to elect the
cluster heads. When multiple cluster heads are randomly selected within a small area, a big extra energy
loss occurs. The amount of lost energy is approximately proportional to the number of cluster heads in this
area. In this paper, we propose to improve DEEC by a modified energy efficient algorithm for choosing
cluster heads that exclude a number of low energy levels nodes due to their distribution density and their
dimensions area. We show by simulation in MATLAB that the proposed approach increases the number of
received messages and prolong the lifetime of the network compared to DEEC. We conclude by studying
the parameters of heterogeneity that proposed technique provides a longer stability period which increases
by increasing the number of nodes which are excluded from the cluster head selection.
Energy efficient data communication approach in wireless sensor networksijassn
Wireless sensor network has a vast variety of applications. The adoption of energy efficient cluster-based
configuration has many untapped desirable benefits for the WSNs. The limitation of energy in a sensor
node creates challenges for routing in WSNs. The research work presents the organized and detailed
description of energy conservation method for WSNs. In the proposed method reclustering and multihop
data transmission processes are utilized for data reporting to base station by sensor node. The accurate use
of energy in WSNs is the main challenge for exploiting the network to the full extent. The main aim of the
proposed method is that by evenly distributing the energy all over the sensor nodes and by reducing the
total energy dissipation, the lifetime of the network is enhanced, so that the node will remain alive for
longer times inside the cluster. The result shows that the proposed clustering approach has higher stable
region and network life time than Topology-Controlled Adaptive Clustering (TCAC) and Low-Energy
Adaptive Clustering Hierarchy (LEACH) for WSNs.
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
In wireless sensor network, lifetime of sensor nodes is the most essential parameters. sensor node's lifetime may be extended using LEACH and HEED scheme which is allowing to move the cluster head surrounded by the sensor nodes try to allocate the energy consumption over all nodes in the network. Energy efficiency is depends on the selection of cluster head. In this paper, we proposed the clustering algorithm to minimize the overhead of control packets by using LEACH and HEED and Efficient utilization of node near sink and to implements the hybrid protocol which would be better than the existing protocol.
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
Telecommunications is increasingly vital to the society at large, and has become essential to
business, academic, as well as social activities. Due to the necessity to have access to
telecommunications, the deployment requires regulations and policy. Otherwise, the deployment
of the infrastructures would contribute to environment, and human complexities rather than
ease of use.
However, the formulation of telecommunication infrastructure deployment regulation and
policy involve agents such as people and processes. The roles of the agents are critical, and are
not as easy as it meant to belief. This could be attributed to different factors, as they produce
and reproduce themselves overtime.
This paper presents the result of a study which focused on the roles of agents in the formulation
of telecommunication infrastructures deployment regulation and policy. In the study, the
interactions that take place amongst human and non-human agents were investigated. The study
employed the duality of structure, of Structuration theory as lens to understand the effectiveness
of interactions in the formulation of regulations, and how policy is used to facilitate the
deployment of telecommunications infrastructure in the South African environment.
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...chokrio
Ameliorating the lifetime in heterogeneous wireless sensor network is an important task because the sensor nodes are limited in the resource energy. The best way to improve a WSN lifetime is the clustering based algorithms in which each cluster is managed by a leader called Cluster Head. Each other node must communicate with this CH to send the data sensing. The nearest base station nodes must also send their data to their leaders, this causes a loss of energy. In this paper, we propose a new approach to ameliorate a threshold distributed energy efficient clustering protocol for heterogeneous wireless sensor networks by excluding closest nodes to the base station in the clustering process. We show by simulation in MATLAB that the proposed approach increases obviously the number of the received packet messages and prolongs the lifetime of the network compared to TDEEC protocol.
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...IOSR Journals
Abstract: In WSN sensors are randomly deployed in the sensor field which brings the coverage problem and limited energy resources. Hence energy and coverage problem are very scarce resources for such sensor systems and has to be managed wisely in order to extend the life of the sensors and maximizing coverage for the duration of a particular mission. In past a lot of cluster based algorithm and techniques were used. In this paper we propose combination of PSO based algorithm and cluster based Least Spanning Tree algorithm, which are very effective alone for WSN, and we also obtain life of sensor node and data transmission by LST based PSO algorithm. These techniques effectively overcome the problems of low energy and coverage of sensor range. Keywords: Energy efficient clustering, Least Spanning Tree algorithm, PSO algorithm, Wireless Sensor Networks.
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...Editor IJCATR
Wireless Sensor Network (WSN) consists of spatially distributed autonomous devices that cooperatively sense physical or
environmental conditions. Due to the non-uniform node deployment, the energy consumption among nodes are more
imbalanced in cluster-based wireless sensor networks this factor will affect the network life time. Cluster-based routing and EADC
algorithm through an efficient energy aware clustering algorithm is employed to avoid imbalance network distribution. Our proposed
protocol EADC aims at minimizing the overall network overhead and energy expenditure associated with the multi hop data retrieval
process while also ensuring balanced energy consumption among SNs and prolonged network life time .A optimal one-hop based
selective node in building cluster structures consisted of member nodes that route their measured data to their assigned cluster head is
identified to ensure efficient communication. The proposed routing algorithm increases forwarding tasks of the nodes in scarcely
covered areas by forcing cluster heads to choose nodes with higher energy and fewer member nodes and finally, achieves
imbalanced among cluster head and improve the network life time.
Review Paper on Energy Efficient Protocol in Wireless Sensor NetworkIJERA Editor
Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long network life time. The lifetime of Wireless Sensor Networks (WSN) is crucial. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Hence, this paper aims to study different energy balance routing protocols of WSNs. In this paper, we have compared different protocols of WSN, ensuring maximum network lifetime by balancing the load as equally as possible
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...IJECEIAES
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on KMeans clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
This research work propounds a simple graph theory semblance Divide and Conquer Quad tree based Multi-hop Static Leach (DCQMS-Leach) energy efficient routing protocol for wireless sensor networks. The pivotal theme of this research work is to demonstrate how divide and conquer plays a pivotal role in a multi-hop static leach energy efficient routing protocol. This research work motivates, enforces, reckons the DCQMS-Leach energy efficient routing protocol in wireless sensor networks using Mat lab simulator.This research work also computes the performance concepts of DCQMS-Leach routing protocol using various performance metrics such as Packet Drop Rate (PDR), Throughput, and End to End Delay (EED) by comparing and contrasting alive nodes with number of nodes, number of each packets sent to the cluster heads with rounds, number of cluster heads with rounds, number of packets forwarded to the base station with rounds and finally dead nodes with number of rounds. In order to curtail energy consumption this research work proffers a routing methodology such as DCQMS-Leach in energy efficient wireless,sensor routing protocol. The recommended DCQMS-Leach overcomes the in adequacies of all other different leach protocols suggested by the previous researchers.
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...ijwmn
The deployment of network nodes is essential to ensure the wireless sensor network's regular operation and affects the multiple network performance metrics, such as connectivity, coverage, lifetime, and cost. This paper focuses on the problem of minimizing network costs while meeting network requirements, and proposes a corona-based deployment method by using the variable transmission distance sensor. Based on the analysis of node energy consumption and network cost, an optimization model to minimize Cost Per Unit Area is given. The transmission distances and initial energy of the sensors are obtained by solving the model. The optimization model is improved to ensure the energy consumption balance of nodes in the same corona. Based on these parameters, the process of network node deployment is given. Deploying the
network through this method will greatly reduce network costs.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
Regressive admission control enabled by real time qos measurementsIJCNCJournal
We propose a novel regressive principle to Admission Control (AC) assisted by real-time passive QoS
monitoring. This measurement-based AC scheme acceptsflows by default, but based on the changes in the
network QoS, it makes regressive decisions on the possible flow rejection, thus bringing cognition to the
network path. TheREgressive Admission Control (REAC) system consists of three modules performing the
necessary tasks:QoS measurements, traffic identification, and the actual AC decision making and flow
control. There are two major advantages with this new scheme; (i) significant optimization of the
connection start-up phase, and (ii) continuous QoS knowledge of the accepted streams. In fact, the latter
combined with the REAC decisions can enable guaranteed QoS without requiring any QoS support from
the network. REAC was tested on a video streaming test bed and proved to have a timely and realistic
match between the network's QoS and the video quality.
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
To supervise and guarantee a network security, the administrator uses different security components, such
as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be
configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of
anomalies between filtering rules and alerting rules, particularly in distributed multi-component
architectures is very likely to degrade the network security. The main objective of this paper is to check if a
set of security components are interoperable. A case study using a firewall and an IDS as examples will
illustrate the usefulness of our approach.
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
With the availability of low cost, short range sensor technology along with advances in wireless networking, sensor networks has become a hot topic of discussion. The International Journal of Advanced Smart Sensor Network Systems is an open access peer-reviewed journal which focuses on applied research and applications of sensor networks. While sensor networks provide ample opportunities to provide various services, its effective deployment in large scale is still challenging due to various factors. This journal provides a forum that impacts the development of high performance computing solutions to problems arising due to the complexities of sensor network systems. It also acts as a path to exchange novel ideas about impacts of sensor networks research.
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
In wireless sensor networks (WSN), data fusion
should be energy efficient. But, determining the optimal
number of aggregators in an energy efficient manner is a
challenging task. Moreover, the existing data fusion
techniques mostly use the same path for transmitting
aggregated data to the sink which reduces the nodes lifetime.
In this paper, we propose a technique which combines energy
efficiency and multiple path selection for data fusion in WSN.
The network is partitioned into various clusters and the node
with highest residual energy is selected as the cluster head.
The sink computes multiple paths to each cluster head for
data transmission. The distributed source coding and the
lifting scheme wavelet transform are used for compressing
the data at the CH. During each round of transmission, the
path is changed in a round robin manner, to conserve the
energy. This process is repeated for each cluster. From our
simulation results we show that this data fusion technique
has less energy consumption with increased packet delivery
ratio, when compared with the existing schemes.
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...chokrio
The major challenge for wireless sensor networks is energy consumption minimization. Wireless transmission consumes much more of energy. In the clustered network, a few nodes become cluster heads which causes the energetic heterogeneity. Therefore the behavior of the sensor network becomes very unstable. Hence, the need to apply the balancing of energy consumption across all nodes of the heterogeneous network is very important to prevent the death of those nodes and thereafter increase the
lifetime of the network. DEEC (Distributed Energy Efficient Clustering) is one of routing protocols
designed to extend the stability time of the network by reducing energy consumption. A disadvantage of
DEEC, which doesn’t takes into account the cluster size and the density of nodes in this cluster to elect the
cluster heads. When multiple cluster heads are randomly selected within a small area, a big extra energy
loss occurs. The amount of lost energy is approximately proportional to the number of cluster heads in this
area. In this paper, we propose to improve DEEC by a modified energy efficient algorithm for choosing
cluster heads that exclude a number of low energy levels nodes due to their distribution density and their
dimensions area. We show by simulation in MATLAB that the proposed approach increases the number of
received messages and prolong the lifetime of the network compared to DEEC. We conclude by studying
the parameters of heterogeneity that proposed technique provides a longer stability period which increases
by increasing the number of nodes which are excluded from the cluster head selection.
Energy efficient data communication approach in wireless sensor networksijassn
Wireless sensor network has a vast variety of applications. The adoption of energy efficient cluster-based
configuration has many untapped desirable benefits for the WSNs. The limitation of energy in a sensor
node creates challenges for routing in WSNs. The research work presents the organized and detailed
description of energy conservation method for WSNs. In the proposed method reclustering and multihop
data transmission processes are utilized for data reporting to base station by sensor node. The accurate use
of energy in WSNs is the main challenge for exploiting the network to the full extent. The main aim of the
proposed method is that by evenly distributing the energy all over the sensor nodes and by reducing the
total energy dissipation, the lifetime of the network is enhanced, so that the node will remain alive for
longer times inside the cluster. The result shows that the proposed clustering approach has higher stable
region and network life time than Topology-Controlled Adaptive Clustering (TCAC) and Low-Energy
Adaptive Clustering Hierarchy (LEACH) for WSNs.
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
In wireless sensor network, lifetime of sensor nodes is the most essential parameters. sensor node's lifetime may be extended using LEACH and HEED scheme which is allowing to move the cluster head surrounded by the sensor nodes try to allocate the energy consumption over all nodes in the network. Energy efficiency is depends on the selection of cluster head. In this paper, we proposed the clustering algorithm to minimize the overhead of control packets by using LEACH and HEED and Efficient utilization of node near sink and to implements the hybrid protocol which would be better than the existing protocol.
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
Telecommunications is increasingly vital to the society at large, and has become essential to
business, academic, as well as social activities. Due to the necessity to have access to
telecommunications, the deployment requires regulations and policy. Otherwise, the deployment
of the infrastructures would contribute to environment, and human complexities rather than
ease of use.
However, the formulation of telecommunication infrastructure deployment regulation and
policy involve agents such as people and processes. The roles of the agents are critical, and are
not as easy as it meant to belief. This could be attributed to different factors, as they produce
and reproduce themselves overtime.
This paper presents the result of a study which focused on the roles of agents in the formulation
of telecommunication infrastructures deployment regulation and policy. In the study, the
interactions that take place amongst human and non-human agents were investigated. The study
employed the duality of structure, of Structuration theory as lens to understand the effectiveness
of interactions in the formulation of regulations, and how policy is used to facilitate the
deployment of telecommunications infrastructure in the South African environment.
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...chokrio
Ameliorating the lifetime in heterogeneous wireless sensor network is an important task because the sensor nodes are limited in the resource energy. The best way to improve a WSN lifetime is the clustering based algorithms in which each cluster is managed by a leader called Cluster Head. Each other node must communicate with this CH to send the data sensing. The nearest base station nodes must also send their data to their leaders, this causes a loss of energy. In this paper, we propose a new approach to ameliorate a threshold distributed energy efficient clustering protocol for heterogeneous wireless sensor networks by excluding closest nodes to the base station in the clustering process. We show by simulation in MATLAB that the proposed approach increases obviously the number of the received packet messages and prolongs the lifetime of the network compared to TDEEC protocol.
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...IOSR Journals
Abstract: In WSN sensors are randomly deployed in the sensor field which brings the coverage problem and limited energy resources. Hence energy and coverage problem are very scarce resources for such sensor systems and has to be managed wisely in order to extend the life of the sensors and maximizing coverage for the duration of a particular mission. In past a lot of cluster based algorithm and techniques were used. In this paper we propose combination of PSO based algorithm and cluster based Least Spanning Tree algorithm, which are very effective alone for WSN, and we also obtain life of sensor node and data transmission by LST based PSO algorithm. These techniques effectively overcome the problems of low energy and coverage of sensor range. Keywords: Energy efficient clustering, Least Spanning Tree algorithm, PSO algorithm, Wireless Sensor Networks.
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...Editor IJCATR
Wireless Sensor Network (WSN) consists of spatially distributed autonomous devices that cooperatively sense physical or
environmental conditions. Due to the non-uniform node deployment, the energy consumption among nodes are more
imbalanced in cluster-based wireless sensor networks this factor will affect the network life time. Cluster-based routing and EADC
algorithm through an efficient energy aware clustering algorithm is employed to avoid imbalance network distribution. Our proposed
protocol EADC aims at minimizing the overall network overhead and energy expenditure associated with the multi hop data retrieval
process while also ensuring balanced energy consumption among SNs and prolonged network life time .A optimal one-hop based
selective node in building cluster structures consisted of member nodes that route their measured data to their assigned cluster head is
identified to ensure efficient communication. The proposed routing algorithm increases forwarding tasks of the nodes in scarcely
covered areas by forcing cluster heads to choose nodes with higher energy and fewer member nodes and finally, achieves
imbalanced among cluster head and improve the network life time.
Review Paper on Energy Efficient Protocol in Wireless Sensor NetworkIJERA Editor
Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long network life time. The lifetime of Wireless Sensor Networks (WSN) is crucial. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Hence, this paper aims to study different energy balance routing protocols of WSNs. In this paper, we have compared different protocols of WSN, ensuring maximum network lifetime by balancing the load as equally as possible
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...IJECEIAES
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on KMeans clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...IJCNCJournal
This research work propounds a simple graph theory semblance Divide and Conquer Quad tree based Multi-hop Static Leach (DCQMS-Leach) energy efficient routing protocol for wireless sensor networks. The pivotal theme of this research work is to demonstrate how divide and conquer plays a pivotal role in a multi-hop static leach energy efficient routing protocol. This research work motivates, enforces, reckons the DCQMS-Leach energy efficient routing protocol in wireless sensor networks using Mat lab simulator.This research work also computes the performance concepts of DCQMS-Leach routing protocol using various performance metrics such as Packet Drop Rate (PDR), Throughput, and End to End Delay (EED) by comparing and contrasting alive nodes with number of nodes, number of each packets sent to the cluster heads with rounds, number of cluster heads with rounds, number of packets forwarded to the base station with rounds and finally dead nodes with number of rounds. In order to curtail energy consumption this research work proffers a routing methodology such as DCQMS-Leach in energy efficient wireless,sensor routing protocol. The recommended DCQMS-Leach overcomes the in adequacies of all other different leach protocols suggested by the previous researchers.
A NODE DEPLOYMENT MODEL WITH VARIABLE TRANSMISSION DISTANCE FOR WIRELESS SENS...ijwmn
The deployment of network nodes is essential to ensure the wireless sensor network's regular operation and affects the multiple network performance metrics, such as connectivity, coverage, lifetime, and cost. This paper focuses on the problem of minimizing network costs while meeting network requirements, and proposes a corona-based deployment method by using the variable transmission distance sensor. Based on the analysis of node energy consumption and network cost, an optimization model to minimize Cost Per Unit Area is given. The transmission distances and initial energy of the sensors are obtained by solving the model. The optimization model is improved to ensure the energy consumption balance of nodes in the same corona. Based on these parameters, the process of network node deployment is given. Deploying the
network through this method will greatly reduce network costs.
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
Regressive admission control enabled by real time qos measurementsIJCNCJournal
We propose a novel regressive principle to Admission Control (AC) assisted by real-time passive QoS
monitoring. This measurement-based AC scheme acceptsflows by default, but based on the changes in the
network QoS, it makes regressive decisions on the possible flow rejection, thus bringing cognition to the
network path. TheREgressive Admission Control (REAC) system consists of three modules performing the
necessary tasks:QoS measurements, traffic identification, and the actual AC decision making and flow
control. There are two major advantages with this new scheme; (i) significant optimization of the
connection start-up phase, and (ii) continuous QoS knowledge of the accepted streams. In fact, the latter
combined with the REAC decisions can enable guaranteed QoS without requiring any QoS support from
the network. REAC was tested on a video streaming test bed and proved to have a timely and realistic
match between the network's QoS and the video quality.
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
To supervise and guarantee a network security, the administrator uses different security components, such
as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be
configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of
anomalies between filtering rules and alerting rules, particularly in distributed multi-component
architectures is very likely to degrade the network security. The main objective of this paper is to check if a
set of security components are interoperable. A case study using a firewall and an IDS as examples will
illustrate the usefulness of our approach.
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
This paper studies a method of investigating effect of IP performance (QoS) degradation on quality of experience (QoE) for a Web service; it considers the usability based on the ISO 9241-11 as multidimensional QoE of a Web service (QoE-Web) and the QoS parameters standardized by the IETF. Moreover, the paper tackles clarification of the relationship between ISO-based QoE-Web and IETF-based QoS by the multiple regression analysis. The experiment is intended for the two actual Japanese online shopping services and utilizes 35 subjects. From the results, the paper quantitatively discusses how the QoE-Web deteriorates owing to the QoS degradation and shows that it is appropriate to evaluate the proposed method
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
Evaluation of scalability and bandwidthIJCNCJournal
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
Home network (HOMENET) performs multiple important functions such as energy management,
multimedia sharing, lighting and climate control in smart grid (SG). In HOMENET there are numerous
challenges among which mobility and security are the basic requirements that need to be addressed with
priority. The information-centric networking (ICN) is regarded as the future Internet that subscribes data
in a content-centric manner irrespective of its location. Furthermore, it has pecial merit in mobility and
security since ICN supports in-network caching and self-contained security, these make ICN a potential
solution for home communication fabric. This paper aims to apply the ICN approach on HOMENET
system, which we called ICN-HOMENET. Then, a proof-of-concept evaluation is employed to evaluate the
effectiveness of the proposed ICN-HOMENET approach in data security, device mobility and efficient
content distribution for developing HOMENET system in SG. In addition, we proposed a cost-efficient
residential energy management (REM) scheme called ICN-REM scheme for ICN-HOMENET system which
encourages consumers to shift the start time of appliances from peak hours to off-peak hours to reduce the
energy bills. To the best of our knowledge, this is the first attempt to propose an ICN-based REM scheme
for HOMENET system. In this proposal, we not only consider the conflicting requests from appliances and
domestic power generation, but also think the energy management unit (EMU) should cooperate with
measurement sensors to control some specific appliances in some specific conditions. Moreover, the
corresponding performance evaluation validates its correctness and effectiveness.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
The impetus for this paper is the development of Fuzzy Basis Function “FBF” that assigns in an optimal fashion, a function approximation for a nonlinear dynamic system. A fuzzy basis function is applied to find the best location of the characteristic points by specifying the set of fuzzy rules. The advantage of this technique is that, it may produce a simple and well-performing system because it selects the most significant fuzzy basis functions to minimize an objective function in the output error for the fuzzy rules. The fuzzy basis function is a linguistic fuzzy IF_THEN rule. It provides a combination of the numerical information and the linguistic information in the form input-output pairs and in the form of fuzzy rules. The proposed control scheme is applied to a magnetic ball suspension system.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
In video data transmission over Wireless Multimedia Sensor Networks (WMSNs), in which network
congestion and link failures are main characteristics, providing Quality-of-Service (QoS) is challenging. In
such situation, using multipath routing protocols along with efficient packet scheduling can improve the
performance of video delivery over sensor networks. In this paper we propose a new packet scheduling
mechanism for multipath video transmission over WMSN. Since, different video frame types in a
compressed video stream have different impact on the perceived video at the receiver; our proposed
scheme for video packet scheduling is content aware that schedules transmission of different video packets
over different paths. For this purpose, condition of each routing path is periodically evaluated and the high
priority video packets are transmitted through high quality paths. Simulation results show that our
proposed scheduling improves the quality of the perceived video at the receiver, considerably.
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
Wireless sensor network has a vast variety of applications. The adoption of energy efficient cluster-based configuration has many untapped desirable benefits for the WSNs. The limitation of energy in a sensor node creates challenges for routing in WSNs. The research work presents the organized and detailed description of energy conservation method for WSNs. In the proposed method reclustering and multihop data transmission processes are utilized for data reporting to base station by sensor node. The accurate use of energy in WSNs is the main challenge for exploiting the network to the full extent. The main aim of the proposed method is that by evenly distributing the energy all over the sensor nodes and by reducing the total energy dissipation, the lifetime of the network is enhanced, so that the node will remain alive for longer times inside the cluster. The result shows that the proposed clustering approach has higher stable region and network life time than Topology-Controlled Adaptive Clustering (TCAC) and Low-Energy Adaptive Clustering Hierarchy (LEACH) for WSNs.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...IJEEE
In Wireless Sensor Network, due to the
energy restriction of each nodes, efficient routing is very
important in order to save the energy of the hybrid
optimization technique. The results of new protocol i.e.
hybrid have been compared with EEPB and IEEPB.
Simulation results show that the lifetime of Hybrid is better
as compared to EEPB and IEEPB.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
Recent developments in processor, memory and radio technology have enabled wireless sensor networks
which are deployed to collect useful information from an area of interest. The sensed data must be
gathered and transmitted to a base station where it is further processed for end-user queries. Since the
network consists of low-cost nodes with limited battery power, power efficient methods must be employed
for data gathering and aggregation in order to achieve long network lifetimes. In an environment where in
a round of communication each of the sensor nodes has data to send to a base station, it is important to
minimize the total energy consumed by the system in a round so that the system lifetime is maximized. With
the use of data fusion and aggregation techniques, while minimizing the total energy per round, if power
consumption per node can be balanced as well, a near optimal data gathering and routing scheme can be
achieved in terms of network lifetime. Several application specific sensor network data gathering protocols
have been proposed in research literatures. However, most of the proposed algorithms have been some
attention to the related network lifetime and saving energy are two critical issues for wireless sensor
networks. In this paper we have explored general network lifetime in wireless sensor networks and made an
extensive study to categorize available data gathering techniques and analyze possible network lifetime on
them.
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
Nowadays, wireless sensor networks, clustering protocol based on the neighboring nodes into separate clusters and fault
tolerance for each cluster exists for sensors to send information to the base station, to gain the best performance in terms of increased
longevity and maintain tolerance than with other routing methods. However, most clustering protocols proposed so far, only
geographical proximity (neighboring) cluster formation is considered as a parameter. In this study, a new clustering protocol and fault
tolerance based on the fuzzy algorithms are able to clustering nodes in sensor networks based on fuzzy logic and fault tolerance. This
protocol uses clustering sensor nodes and fault tolerance exist in the network to reduce energy consumption, so that faulty sensors
from neighboring nodes are used to cover the errors, work based on the most criteria overlay neighbor sensors with defective sensors,
distance neighbor sensors from fault sensor and distance neighbor sensors from central station is done. Superior performance of the
protocol can be seen in terms of increasing the network lifetime and maintain the best network tolerance in comparison with previous
protocols such as LEACH in the simulation results.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
In this paper, we focus on improving wireless networks survivability in terms of increasing network lifetime and its energy efficiency via clustering the network in an efficient way. Clustering the network is the procedure of partitioning it into groups, where each of them is known as a cluster. Each cluster elects the station with the highest power to be a cluster head. The remaining stations follow the nearest cluster head. Instead of having each station sends its packets to a remote receiver, the cluster head receives packets from all stations within its cluster, aggregates them, and forwards the resulting packets to the remote receiver. The most significant benefit of clustering the network that we focus on is to decrease distances between sending and receiving stations, which in turn reduces the transmission energy. This reduction in the energy yields an increase in the network lifetime and its survivability.
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless...IJCNCJournal
Wireless sensor networks (WSNs) are networks of sensor nodes that interact wirelessly to gather information about the surrounding environment. Nodes are often low-powered and dispersed in an ad hoc, decentralized manner. Although WSNs have gained in popularity, they still have several serious shortcomings, like limited battery life and bandwidth. In this paper, the cluster head (CH) selection, the Compressive Sensing (CS) theory, the Connection-based Decentralized Clustering (CDC), the relay node selection, and the Multi Objective Genetic Algorithm (MOGA)are all taken into account The initial stage provided a theoretical revision to the concepts of network construction, compressive sensing, and MOGA, which impacted the improvement of network lifetime. In the second stage developed a novel model such as Energy Aware Talented Clustering with Compressive Sensing (TCCS) for the sensor network. This approach considers increasing longevity but also raises the network's overall quality of service (QoS). In the analysis, the TCCS model is applied to both the centralized and distributed networks and compared with the existing methods. When compared to the previous methods, the simulation results show that the proposed work performs better in terms of the calculation of maximum packet delivery ratio of 93.93 percent, minimum energy consumption of 8.04J, maximum energy efficiency of 91.04 percent, maximum network throughput of 465.51kbps, minimum packet loss of 282 packets, and minimum delay of 63.82 msec.
ENERGY AWARE TALENTED CLUSTERING WITH COMPRESSIVE SENSING (TCCS) FOR WIRELESS...IJCNCJournal
Wireless sensor networks (WSNs) are networks of sensor nodes that interact wirelessly to gather
information about the surrounding environment. Nodes are often low-powered and dispersed in an ad hoc,
decentralized manner. Although WSNs have gained in popularity, they still have several serious
shortcomings, like limited battery life and bandwidth. In this paper, the cluster head (CH) selection, the
Compressive Sensing (CS) theory, the Connection-based Decentralized Clustering (CDC), the relay node
selection, and the Multi Objective Genetic Algorithm (MOGA)are all taken into account The initial stage
provided a theoretical revision to the concepts of network construction, compressive sensing, and MOGA,
which impacted the improvement of network lifetime. In the second stage developed a novel model such as
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for the sensor network. This
approach considers increasing longevity but also raises the network's overall quality of service (QoS). In
the analysis, the TCCS model is applied to both the centralized and distributed networks and compared
with the existing methods. When compared to the previous methods, the simulation results show that the
proposed work performs better in terms of the calculation of maximum packet delivery ratio of 93.93
percent, minimum energy consumption of 8.04J, maximum energy efficiency of 91.04 percent, maximum
network throughput of 465.51kbps, minimum packet loss of 282 packets, and minimum delay of 63.82 msec.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...IJCSES Journal
The extension of the sensor node's life span is an essential requirement in a Wireless Sensor Network.
Cluster head selection algorithms undertake the task of cluster head election and rotation among nodes,
and this has significant effects on the network's energy consumption. The objective of this paper is to
analyze existing cluster head selection algorithms and the parameters they implement to enhance energy
efficiency. To achieve this objective, systematic literature review methodology was used. Relevant papers
were extracted from major academic databases Elsevier, Springer, Wiley, IEEE, ACM Digital Library,
Citeseer Library, and preprints posted on arXiv. The results show that there are many existing Cluster
Head Selection Algorithms and they are categorized as deterministic, adaptive and hybrid. These
algorithms use different parameters to elect Cluster Heads. In future the researchers should derive more
parameters that can be used to elect cluster heads to improve on energy consumption
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...IJCSES Journal
The extension of the sensor node's life span is an essential requirement in a Wireless Sensor Network.
Cluster head selection algorithms undertake the task of cluster head election and rotation among nodes,
and this has significant effects on the network's energy consumption. The objective of this paper is to
analyze existing cluster head selection algorithms and the parameters they implement to enhance energy
efficiency. To achieve this objective, systematic literature review methodology was used. Relevant papers
were extracted from major academic databases Elsevier, Springer, Wiley, IEEE, ACM Digital Library,
Citeseer Library, and preprints posted on arXiv. The results show that there are many existing Cluster
Head Selection Algorithms and they are categorized as deterministic, adaptive and hybrid. These
algorithms use different parameters to elect Cluster Heads. In future the researchers should derive more
parameters that can be used to elect cluster heads to improve on energy consumption.
Lifetime enhanced energy efficient wireless sensor networks using renewable e...IJECEIAES
In this paper, we consider a remote environment with randomly deployed sensor nodes, with an initial energy of E0 (J) and a solar panel. A hierarchical clustering technique is implemented. At each round, the normal nodes send the sensed data to the nearest cluster head (CH) which is chosen on the probability value. Data after aggregation at CHs is sent to the base station (BS). CH requires more energy than normal nodes. Here, we energize only CHs if their energy is less than 5% of its initial value with the use of solar energy. We evaluate parameters like energy consumption, the lifetime of the network, and data packets sent to CH and BS. The obtained results are compared with existing techniques. The proposed protocol provides better energy efficiency and network lifetime. The results show increased stability with delayed death of the first node. The network lifetime of the proposed protocol is compared to the multi-level hybrid energy efficient distributed (MLHEED) technique and low-energy adaptive clustering hierarchy (LEACH) variants. Network lifetime is enhanced by 13.35%. Energy consumption is reduced with respect to MLHEED-4, 5, and 6 by 7.15%, 12.10%, and 14.975% respectively. The no. of packets transferred to the BS is greater than the MLHEED protocol by 39.03%.
Similar to Energy efficient clustering in heterogeneous (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI:10.5121/ijcnc.2015.7202 19
ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS
WIRELESS SENSOR NETWORKS USING DEGREE OF
CONNECTIVITY
Ajay Sikandar1
and Sushil Kumar2
School of Computer and Systems Sciences,Jawaharlal Nehru University,New Delhi-
110067
ABSTRACT
Cluster head election is a key technique used to reduce energy consumption and enhancing the throughput
of wireless sensor networks. In this paper, a new energy efficient clustering (E2C) protocol for
heterogeneous wireless sensor networks is proposed. Cluster head is elected based on the predicted
residual energy of sensors, optimal probability of a sensor to become a cluster head, and its degree of
connectivity as the parameters. The probability threshold to compete for the role of cluster head is derived.
The probability threshold has been extended for multi-levels energy heterogeneity in the network. The
proposed E2C protocol is simulated in MATLAB. Results obtained in the simulationshowthat performance
of the proposed E2Cprotocol is betterthan stable election protocol (SEP), and distributed energy efficient
clustering (DEEC) protocol in terms of energy consumption, throughput, and network lifetime.
KEYWORDS
Cluster Head Election, Degree of Connectivity, Residual Energy, Energy Heterogeneity, Wireless sensor
Network
1. INTRODUCTION
Wireless sensor networks (WSNs) consist of large number of tiny and limited battery powered
sensors. Sensors monitor the physical environment in a specified region; the sensed data are
fused, and forwardedusing multi-hops to the sink. WSNs have wide range of applications such as
security surveillance, traffic surveillance, environment monitoring, and healthcare. Such networks
have ability to operate without human interaction in a harsh environment. Once the sensors are
deployed in such environment, their batteries cannot be recharged or replaced. Therefore, to
prolong the network lifetime, energy efficient algorithm need to be developed [1, 2]. Due to their
limited battery power, energy consumption is a key issue in designingthe network protocols and
applications of WSNs. Energy is consumed in WSNs at three levels: sensing, transmission and
network operation/processing. The major part of energy is consumed in transmission whereas
sensing and operational cost of the network is minimal [3-5].
Grouping sensors into clusters has been pursued in order to gather sensed data,and then fuse at
the cluster head. Cluster head election is the key for minimization of energy consumption.
Researchers face difficulties in designing cluster protocols for WSNs due to dynamic and
complex nature of network topology. A clustering protocol is designed in such a way that energy
can be saved and reliable data transmission is achieved. All members transmit data to their cluster
heads, which forward data to sink after data aggregation. It reduces redundancy in the data which,
in turn, minimize the number of transmissions thus saving energy and bandwidth resources [6, 7].
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
20
Clustered WSNs can be classified into two categories: homogeneous and heterogeneous
networks. A homogeneous WSN is composed of tiny, resource constrainedsensors having the
same hardware capabilities. A heterogeneous WSN consists of sensors with different energy
levels and functionalities. In the network, those sensors are farthest from the cluster head sensor
always spend more energy as compare to the sensors that are closer to the cluster heads. The
cluster head election is one of the key problems in sensor network applications and can consume
significantly more energy for networks communication.This problem can be resolved
considering the degree of connectivityand residual energy of a sensor while electing it as cluster
head.The sensor is elected as a cluster head if it has highest node connectivity and residual
energy. We are motivated by the fact that extra battery energy can be embedded in some of the
cluster head sensors. The lifetime of the sensor network is a main problem that requires special
attention, hence, to extend the network lifetime, addition of sensors having more energy can be a
better option[8,9,10,23,24].
In this paper, a novel clustering protocol, Energy Efficient Clustering (E2C), has been for multi-
levels energy heterogeneous wireless sensor networks. A new cluster head election strategy has
been presented. The formula of the cluster head election probability threshold has been derived.
E2C uses the residual energy, optimal probability of a sensor to become a cluster head, and
degree of sensors as the parameters to elect a sensor as cluster head. The simulation results have
been compared with the existing clustering protocols: SEP and DEEC.
The rest of the paper is organized as follows: In section 2 we present the overview of the related
work. In section 3, the detail of the proposed protocol is presented. Section 4 presents the
simulation results and discussion. Finally we conclude paper in section 5.
2. RELATED WORK
Clustering in WSN is a method to organize and manage the network effectively. In [11], authors
suggested an energy efficient distributed clustering algorithm which defines suitable cluster sizes
depending on the hop distance to the sink. Energy efficient clustering algorithm effectively
controls the cluster size which allows an appropriately uniform use of the overall energy. In [12],
authors propose a stable election protocol (SEP) for a heterogeneous WSN to prolong the time
interval before the death of the first sensor. SEP and energy efficient heterogeneous clustering
scheme are based on weighted election probabilities of each sensor to become cluster head
according to the remaining energy in each sensor.
Authors suggested an energy efficient prediction clustering algorithm for better performance of
network in [13]. It is a new model with heterogeneity of monitored objects and energy
heterogeneity of all sensors. To achieve the balance of energy consumption among non-uniform
sensors and to prolong network lifetime, authors suggested a clustering based routing protocol for
wireless sensor networks with non-uniform node distribution whose cores are an energy aware
clustering algorithm in [14]. In [15] authors advise heterogeneous network model with energy
heterogeneity and computational heterogeneity according to clustering structure are given in [16].
In [17] authors suggested an energy efficient multilevel heterogeneous routing protocol for
WSNs. Operation of multilevel heterogeneity is analyzed by k-level of sensor heterogeneity using
suitable heterogeneity parameters. A variable threshold is defined as the ratio of number of alive
sensors for current round to the total number of sensors.The threshold is used to elect the cluster
headsensors. Authors in [18] implemented a distributed energy-efficient clustering algorithm to
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
21
improve coverage of wireless sensor networks. They suggested a clustering technique with the
least number of cluster heads to cover the whole network. It periodically updates cluster heads
according to the joint information of sensor’s residual energy. From the perspective of energy
consumption minimization, authors presented energy efficient solution for data forwarding using
cooperative communication because of it is more desirable in harsh environment with long haul
distance [19].
In [20] authors proposed hybrid energy efficient distributed clustering algorithm. It elects cluster
head according to sensor’s residual energy and a secondary parameter such as sensor proximity to
its neighbor or node degree. In [21] authors designed and evaluated a distributed energy efficient
clustering scheme for heterogeneous wireless sensor network. In this scheme, cluster head is
elected on the basis of probability of the ratio between residual energy of each sensor and average
energy of the network.
3. E2CPROTOCOL
In this section, we describe the details of architecture of E2C and discuss how efficiently it
improves the network lifetime considering the different metrics such as node degree and residual
energy of a sensor that is being elected as cluster head.
3.1 Network and Energy Model Assumption
We consider the following assumptionsto describe the network model used in this work.
1. Sensors and sinks are stationary after deployment.
2. There are ݊sensors uniformly dispersed with in a square field of area ܯ × ܯ square
meters.
3. Sink is located at the center of the network field.
4. Sensorsare continuously forwarding data to its appropriate cluster head and cluster head
sends data to the sink.
5. Sensors have heterogeneity in term of energy and node degree. Sensors have different
initial energy.
6. Sink is not energy limited in comparison to energy of the other sensor in the network.
We calculated the energy consumed for transmitting or receiving messages by adopting the radio
dissipation model given in [16]. In this model, energy consumed in the transmission of sensor
depends on the sum of constant electronic components energy consumption and amplifier energy
proportional to distance between sender and receiver sensors. In the transmission of al bits
message energy consumed by radio is given by
E୶ሺl, dሻ = ൜
lሺφ + αdଶሻ d ≤ d
lሺφ + βdସሻ d > d
(1)
whereφ is constant energy by electronic components, α and β are the amount of energy per bit
dissipated in the transmitter amplifier. d is the distance between sender and receiver.The energy
consumed Eୖ୶ሺlሻ to receive thel bit message is given by
Eୖ୶ሺlሻ = l × φ
(2)
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
22
3.2 Optimal Clustering
We assume that distance of any sensor to the sink or it’s cluster head is less than or equal to
thresholdvalued. Total energy dissipated in the network per round is equal to
E୲୭୲ୟ୪ = lሺ2nφ + nEୢୟ + αሺkdୱ
ଶ
+ ndେୌ
ଶ
ሻሻ (3)
whereEୢୟ is representing energy consumed in data aggregation, and k is the number of cluster
heads. dୱ is the average distance between the cluster head and the sink, and dେୌisthe average
distance between member sensors in cluster and cluster head. The distance dେୌ can be expresses
as
dେୌ
ଶ
= ρሺx, yሻdxdy
୷୫ୟ୶
୶୫ୟ୶
(4)
whereߩሺ,ݔ ݕሻ is the node distribution. The average distance between cluster head to sink is given
by
d୲୭ ୗ =
ඥ୶మା୷మ
ସୟమ
dA = 0.765a (5)
Where a = M
2ൗ . By differentiating E୲୭୲ୟ୪ with respect to k and equating it to zero,optimal
number of cluster heads can be calculated as
k୭୮୲ =
ଵ
.ହ
ට
ଶ୬
ට
ஒ
(6)
Any sensor can be chosen as cluster head. The optimal probability of a sensor to become a cluster
head is expresses as
P୭୮୲ =
ଵ
.ହ
ට
ଶ
୬
ට
ஒ
(7)
The optimal probability for a sensor to become cluster head is a key aspect. Authors in [9]
mentioned that if clusters are not arranged in an optimal way, total energy consumed per round
increases exponentially.
3.3 Cluster Head Election
In LEACH protocol, all sensors have the same initial energy. It guarantees that every one of them
becomes cluster head exactly once every 1
P୭୮୲
ൗ round. Let P୧ୀ
1
r୧
ൗ which can be considered as the
average probability of sensors to become cluster head during r୧round. There are average n ∗ P୭୮୲
cluster head per round and all sensors die approximately at the same time. Suppose that r୧ be the
number of rounds to become cluster head for sensorb୧ ሺi = 1,2, … nሻ. For the homogeneous
sensors, choosing the average probability P୧equal toP୭୮୲ can ensure that there areP୭୮୲ ∗ n cluster
headsin every round, and energy of all sensors will be depleted at same time. InHWSNs, we
consider that a cluster head sensorhas more energy and higher node degree than non-cluster head
sensors. Since the energy of a cluster head is depleted quickly as compare to non-cluster head
sensors,this requires that each sensoracts its turn as a cluster head. The average energy at round
k of the network can be calculated as
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
23
Eഥሺkሻ =
ଵ
∑ Eሺkሻ
୧ୀଵ (8)
Let us consider that all sensors have the same transmission range r randomly uniformly placed
in a large area A. Sensors are deployed with density ρ = n/A in the network area. Assume that a
sensoris placed at a point (0, 0) and another sensor is randomly placed according to some
arbitrary probability density functionfଡ଼ሺxᇱ
ሻ. Thesetwo sensors established a link if second
sensoris placed within the transmission range of first sensor. Assume that coverage area of a
sensor is denoted byA. The probability of the link betweentwo sensors is expressed as [22]
P = ඵ fଡ଼ሺxᇱሻ dxᇱ
బ
= fଡ଼ሺxᇱ
, yᇱሻ dxᇱ
dyᇱ
ට୰బష୷ᇲమ
ିට୰బష୷ᇲమ
୰బ
ି୰బ
(9)
The degree of a sensoris defined as the number of links it has. The probability that a sensor has
degree d୩ is given by
Pሺd୩ሻ = ሺ
n − 1
d୩
ሻP
ୢౡ
ሺ1 − Pሻ୬ିୢౡିଵ
(10)
where Pሺd୩ሻdenotes the probability that asensor has degree d୩ in round k. In the network, each
sensor should have the knowledge of energy of all its neighboring sensors. A sensor with more
residual energy and maximum degree has higher probability of becoming cluster head after the
operation of current round. Using equation (8) and equation (10), the probability for sensorb୧ to
become cluster head is
P୧ = P୭୮୲ ∗
ሺ୩ሻ
ഥሺ୩ሻ
∗ Pሺd୩ሻሻ (11)
Each sensorb୧ becomesa cluster head for the current round if arandom number is drawn between
0 and 1, and is less than the following probability threshold.
Tሺb୧ሻ = ൝
ଵିሺ୩ ୫୭ୢ
భ
ౌ
ሻ
if b୧ ε G
0 otherwise
(12)
where G is the set of sensors that are eligible to be cluster head at round k.
3.4 Cluster Head Election with Heterogeneous Sensors
In this section, we calculate the probability of electing a sensor as a cluster head in the case of
multilevel heterogeneity. Different initial energy levels for different types of sensors are
considered as heterogeneity factor. First we derive the probability ofelecting a sensor as a cluster
head with two types of sensors: normal and advancesensors.Assume that there are m advance
sensors and n ሺ1 − mሻ normal sensors. The energy of each advance sensorsis ሺ1 + a)times more
than the energy of each normal sensor, where a is the energy factor. The total energy of the
network is increased by a factor of ሺ1 + amሻ. The weight is defined as the ratio of the initial
energy of a sensor to the initial energy of normal sensor. The average number of cluster heads
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
24
from normal sensors equal to P୭୮୲ n = P୬୰୫ n ሺ1 + amሻ,where P୬୰୫ is the weighted election
probability for normal sensor. The weighted election probabilities of normal and advanced sensor
are given by[12]
ቐ
Pnrm =
Popt
ሺ1+amሻ
Padv =
ሺ1+aሻPopt
ሺ1+amሻ
(13)
Now, we define the probability ܲto become a cluster head from normal and advanced
sensors in two case of heterogeneity as
P୧ = ቐ
౦౪
ሺଵାୟ୫ሻ
∗
ሺ୩
ഥሺ୩ሻ
∗ Pሺd୧ሻ For normal sensors
ሺଵାୟሻ౦౪
ሺଵାୟ୫ሻ
ሺ୩
ഥሺ୩ሻ
∗ Pሺd୧ሻ For advanced sensors
(14)
Now, we introduce third type of sensors: super sensors in the network.Let m is the percentage of
the total number of sensorsmhaving b times more energy than the energy of the normal sensors.
The total energy of the network is increased by a factor of ሺ1 + mሺa + mbሻሻ. The weighted
election probabilities for these three types of sensors: normal, advanced and super sensoras [9]
ە
ۖ
۔
ۖ
ۓP୬୰୫ =
౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
Pୟୢ୴ =
ሺଵାୟሻ౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
Pୱ୳୮ =
ሺଵାୠሻ౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
(15)
Similarly, we define the probability ܲ to become a cluster head from normal, advanced
and super sensors in three case of heterogeneity as
P୧ =
ە
ۖ
۔
ۖ
ۓ
౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
∗
ሺ୩
ഥሺ୩ሻ
∗ Pሺd୧ሻ for normal sensors
ሺଵାୟሻ౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
∗
ሺ୩
ഥሺ୩ሻ
∗ Pሺd୧ሻ for advanced sensors
ሺଵାୠሻ౦౪
ሺଵା୫ሺୟା୫బୠሻሻ
∗
ሺ୩
ഥሺ୩ሻ
∗ Pሺd୧ሻ for super sensors
(16)
We can generalizeit for multilevel heterogeneous network. The probability of a sensor to be a
cluster head in case of multilevel heterogeneity is given by
P୧ =
∗౦౪ሺଵାୟሻ
ሺା∑ ୟ
ొ
సభ ሻ
∗
ሺ୩ሻ
ഥሺ୩ሻ
∗ Pሺd୧ሻ (17)
Each sensor to become a cluster head for current round can be determined from equation (12) for
equations (14), (16), and (17). Thus, the probability threshold value of cluster head depends on
the residual energy, initial energy, and degree of a sensor. The cluster heads act as local control
center to manage the data transmission in their cluster. Cluster heads transmit TDMA schedule to
the sensors in their cluster. This makes sure that there is no collision among the transmission of
data messages. Cluster heads allow radio component of each non cluster head sensor to be turnoff
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
25
at all-time except during transmission time, thus minimizing energy consumption of individual
sensor of the network.
4. SIMULATION RESULTSAND DISCUSSION
In this section, we simulatedtheE2C protocol in MATLAB and the results obtained in the
simulation have been compared with the exiting clustering protocols: SEP, and DEEC.In the
simulation, the network area of 100 x 100m2 has been taken for heterogeneous clustered wireless
sensor network. Different types of sensors having different level of energy are distributed over
the network area. It is assumed that sink node is placed at the center of network area. The distance
between sensors and sink is assumed to be 70m. We neglect the effect caused by signal collision
and interference in wireless channel. In HWSNs, we used radio parameters mentioned in Table 1.
The simulations have been carried out for the cases of two, three and multi-types of sensors
having two, three and multi-levels of energy correspondingly in heterogeneous WSNs.
Table1. Simulation Parameter
n 100
M×M 100×100 m2
Eୢୟ 5nj/bit
φ 50 nj/bit
α 10/nj/bit/m2
β 0.0013pj/bit/m4
Message size 5000 bits
Initial energy of normal sensor 0.5j
P୭୮୲ 0.1
4.1 Heterogeneity with two levels of energy
In this case, 25 advance sensorshave been deployed with 2 times energy that of the normal
sensors. The numbers of normal sensors deployed are 75. The value of the rest simulation
parameters are given in table –1. Figure 1 depicts total number of sensors that remain alive over
the simulation time period.The first sensor dies at after rounds 2050 and the last sensor dies
around at 5700 rounds. For the round 2700 the number of alivesensorsof E2Cis same as that of
SEP. For rounds between 2050and 2700, it is observedthatthe number of alivesensor is more for
E2C as compared toSEP and DEEC. After round 2700, the SEP performs better than E2C.
Additionally, E2C performsbetter than DEEC. It is observed that overall performance of E2C is
better as compared to SEP and DEEC.It is because it elects a cluster head usingthe residual
energy, and degree of the sensors, and makesthe optimum number of cluster heads.
Figure1. Number of alive sensors over rounds under heterogeneity with two level of energy of SEP, DEEC
and E2C
0 1000 2000 3000 4000 5000 6000
0
20
40
60
80
100
number of rounds
numberofalivesensors
E2C
DEEC
SEP
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
26
Figure 2 illustrates that number of received data packets at sink verses the simulation time period.
The result obtained in the simulation shows that the number of packets received by sink of the
proposed protocol E2C is increasing rapidly as compared to DEEC and SEP when the number of
rounds is less 2500. It is because the cluster head sensors of the E2C are better connected than
that of DEEC and SEP. For rounds between 2500 and 6000, growth in the received packets at
sink is constant. This can be attributed the fact that the number of cluster heads per round is
stable. When there are no cluster head selected in some rounds, the data packet cannot be
transmitted to sink. As a result, the data packets received at the sink per round of E2C is more
than that of DEEC and SEP.
Figure 2. Data packets received over rounds under heterogeneity with two level of energy of SEP, DEEC
and E2C
Figure 3 shows the total residual energy of network over simulation time period for different
clustering protocols. In the simulation, total initial energy of the network was 85 joules. The
simulation is performed for 6000 rounds. The total energy of network is almost depleted upto
4000 rounds for all the protocols considered in the simuation. From the result, it is observed that
the total residual energy of E2C protocol is more than that of SEP and DEEC protocols in the
same number of rounds. This due the fact that the sensors with more residual energy and higher
degree have higher probability of becoming cluster heads.
Figure3. The total residual energy of network over rounds under heterogeneity with two level of energy of
SEP, DEEC and E2C
0 1000 2000 3000 4000 5000 6000
0
20
40
60
80
100
number of rounds
networkresidualenergyinjoules
E2C
DEEC
SEP
0 1000 2000 3000 4000 5000 6000
0
0.5
1
1.5
2
2.5
3
3.5
x 10
4
number of rounds
numberofpacketsreceivedatsink
E2C
DEEC
SEP
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
27
4.2 Heterogeneity with three levels of energy
In this case, 20 advance sensors and 30 super sensors have been deployed consisting of 1.5 and
2.5 times more energy than normal sensors correspondingly. The numbers of normal sensors
deployed are 50. The value of the rest simulation parameters are given in table –1.
Figure4. Number of alive sensors over rounds under heterogeneity with three levels of energy of SEP,
DEEC and E2C
Figure 4 shows the total number of sensors alive over simulation time period. In the E2C, the first
sensor dies at rounds 2200 and last sensor dies around at round 5100. From rounds 2400 to 4500,
it is observed that the number of dead sensorsis very small.The sensor death rate of SEP and
DEEC is substantial as compared to E2C. Thesensors remain alive for longer duration in E2Cas
compared with SEP and DEEC.
Figure 5. Data packets over rounds under heterogeneity with three levels of energy of SEP, DEEC and E2C
Figure 5 represents the number of data packets received at sink verses simulation time period.
The result obtained in the simulation shows that the number of packets received by sink of E2C is
increasing rapidly as compared to DEEC and SEP when the number of rounds is less 4000. It is
because the cluster head sensors of E2C are elected considering the degree of sensors as an
0 1000 2000 3000 4000 5000 6000
0
20
40
60
80
100
number of rounds
numberofalivesensors
E2C
DEEC
SEP
0 1000 2000 3000 4000 5000 6000
0
1
2
3
4
5
6
x 10
4
number of rounds
numberofpacketsreceivedatsink
E2C
DEEC
SEP
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
28
additional parameter. Between the rounds 4000 to 6000, the number of data packets received at
sink is almost constant. This is due to the fact that sensor field becomes sparse andthe growth in
cluster head election is became constant. As the result, it is observed that data packets received at
sink per round for E2C is more as compared to DEEC and SEP.
Figure6.Totalresidual energy of network over rounds under heterogeneity with three levels of energy of
SEP, DEEC and E2C
Figure6 showstotal residual energy of networkover simulation time period.In the beginning of the
simulation, the total residual energy of network was 95 joules. From the result, it is clear thatthe
total residual energy of E2C is better than that of SEP and DEEC. This due the fact that death of
sensors changes the degree of connectivity, which increases the probability of becoming cluster
head having higher degree after the current round.
4.3 Heterogeneity with multi-levelsenergy
In this case, the initial energy of sensors is randomly distributed with in the set [0.5, 4.0].The
value of the rest simulation parameters are given in table –1.
Figure7. Number of alive nodes over rounds under heterogeneity with multi-levelsenergy of SEP, DEEC
and E2C
Figure 7 depicts that total number of sensors remains alive verses simulation time. In the E2C,
that first sensor dies in 2550 round and last sensor dies in 5500 round. All the protocols have the
same number of alive sensors at rounds 3500. As result, it is observed that the number of alive
0 1000 2000 3000 4000 5000 6000
0
20
40
60
80
100
numberof rounds
networkresidualenergyinjoules
E2C
DEEC
SEP
0 1000 2000 3000 4000 5000 6000
0
20
40
60
80
100
number of rounds
numberofalivesensors
E2C
DEEC
SEP
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
29
sensors is more than that of SEP and DEEC in all rounds. Figure 8 depicts that the number of data
packets received by sink over simulation time period. In E2C, the number of data packet received
at sink increases linearly as thenumber of rounds increases upto 3000 rounds in all the protocol
considered in the simulation. After 3000 rounds, the increment in the number of received packets
declines for SEP and DEEC, however the increment in the received packets for E2C continues.
This indicates that thecluster heads election of E2C is better than SEP and DEEC.
Figure 8. Data Packets over rounds underheterogeneity with multi-levels energy of SEP, DEEC and E2C
Figure9.Totalresidual energy over rounds under heterogeneity with multi-levels energy of SEP, DEEC and
E2C
Figure 9 shows that total initial energy of network was 140 joules. The total energy decrease
linearly upto 4900 rounds for all protocols considered in the simulation. The rate of energy
dissipation for all sensors in E2C is comparatively less than that of DEEC and SEP.
0 1000 2000 3000 4000 5000 6000
0
50
100
150
number of rounds
networkresidualenergyinjoules
E2C
DEEC
SEP
12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
30
5. CONCLUSION
In this paper, we propose a novel clusteringprotocol,E2C, in which a new cluster head election
strategy is developed, which uses the predicted residual energy of sensors, optimal probability of
a sensor to become a cluster head, and degree of connectivity as the parameters to contends for
the role of the cluster head. The mathematical model for electing the cluster head has been
presented. Multi-levels energy heterogeneity in the network has been considered. E2C improvesin
energy saving of the heterogeneous wireless sensor network and prolongsthe lifetimeof
thenetwork. Proposed protocol was simulated on MATLAB platform. Analysis of simulation
results show thatthe performance of E2Cprotocol is better than the considered state of the art
protocols in terms of total residual energy, the number of data packets received, and the number
of alive sensors.
REFERENCES
[1] I. Akyildz, W. Su, Y. Sankarasubramaniam, &E. Cayirci, (2000) “A Survey on sensor network”,
IEEE Communication Magzine, Vol.40, No. 8, pp.102-114.
[2] A. Sikandar, S. Kumar, G. U. K. Murya (2014) “Optimizing delay for MAC in randomly distributed
wireless sensor networks”, International Conference on advance Computing, Networking and
informatics (ICACNI), Springer, Vol.243,pp. 609-618.
[3] G. Anastasi, M. Conti, M. D. Francesco, A. Passarella, (2009) “Energy conservation in wireless
sensor networks: A survey”, Ad Hoc Networks, Vol. 7, No. 3, pp. 537-568.
[4] A. Sikandar, S. Kumar,(2014) “Performance analysis of channel access model for MAC in randomly
distribute4d wireless sensor networks” International Journal of computer network and
communication, Aircc,Vol.6 no. 5, pp.99-110.
[5] A. Sikandar, S. Kumar, (2014) “Performance analysis of interference aware power control scheme for
TDMA in wireless sensor networks”, International Conference on advance Computing, Networking
and informatics (ICACNI), Springer, Vol. 28, pp. 95-101.
[6] W. Heinzelman, A. Chandrakasan&H. balakrishnan, (2000) “Energy-Efficient communication
protocol for wireless sensor network”,In the Proceeding of the Hawaii international Conference
System Sciences, Hawaii, pp. 1-10.
[7] A. A. Abbasi& M. F. Younis, (2007) “A survey on clustering algorithms for wireless sensor
networks”, Computer Communications, Vol. 30, No. (14-15), PP. 2826-2841.
[8] V. Mhatre&C. Rosenberg, (2004) “Homogeneous vs Heterogeneous Clustered Networks: A
comparative study”, in Proceedings of IEEE international conference on communication (ICC 2004),
pp. 1-6.
[9] D. Kumar, T. C. Aseri, R. B. Patel, (2009) “EEHC: Energy efficient heterogeneous clustering scheme
for wireless sensor networks”, Computer Communication, Elsevier, Vol. 32, No. 4, pp. 662-667.
[10] P. Saini, A. K. Sharma, (2010) “ Energy Efficient Scheme for Clustering Protocol Prolonging the
Lifetime of Heterogeneous Wireless Sensor Network” International Journal of Computer Application,
Vol. 6, No. 2, pp. 30-36.
[11] D. Wei, Y. Jin, S.Vural, K.Moessner& R. Tafazolli, (2011) “An Energy-Efficient clustering solution
for wireless sensor networks”, IEEE transactions on wireless communications, Vol. 10, no. 11, pp.
3973-3983.
[12] G. Smaragdakis, I. Matta &A. Bestavros, (2004) “SEP: A stable election protocol for clustered
heterogeneous wireless sensor networks”, in second international Workshop on sensor and Actor
Network protocols and Application (SANPA), pp.1-11.
[13] J. Peng, T. Liu, H. Li, B. Guo,(2013) “Energy-Efficient prediction clustering algorithm multilevel
heterogeneous wireless sensor network”, International Journal of Distributed Sensor Networks,
Hindawi, Vol.2013, pp.1-7.
[14] J. Yu, Y. Qi, G. Wang &X, Gu (2012) “A cluster-based routing protocol for wireless sensor networks
with non-uniform node distribution”, International Journal of Electronic and Communication,
Elsevier,pp.54-61.
13. International Journal of Computer Networks & Communi
[15] H. Zhou, Y. Wu, Y. Hu & G. Xie,(2010) “A novel stable selection and reliable transmission protocol
for clustered heterogeneous wireless sensor network”, Computer Communication, Elsevier, Vol.
33,No. 15,pp. 1843-1849.
[16] W. B. Heinzelman, A. P. Chanra
architecture for wireless micro sensor network” IEEE Transection on Wireless Communications, Vol.
1, No. 4, pp. 660-670.
[17] S. Tanwar, N. Kumar & J. W. Niu,(2014) “EEMHR: Energy
routing protocol for wireless sensor networks”,International Journal of Communication Systems,
Wiley, Vol. 27, No.9, pp.1289
[18] Z. Liu, Q. Zhenga, L. Xuea, X. Guana,(2012) “A distributed energy
with improved coverage in wireless sensor networks”, Future Generation Computer Systems,
Elsevier, Vol. 28, No. 5, pp. 780
[19] D. Zhang & Z. Chen (2013) “Energy
reliability in WSNs”, International Journal of Distributed Sensor Network, Hindawi, Vol. 2013, pp.1
11.
[20] O. Younis, S. Fahmy “HEED: A Hybrid, Energy
Hoc Sensor Networks” IEEE Transactions on Mobile Computing, Vol. 3, No.
[21] L. Qing, Q. Zhu &M. Wang, (2006) “Design of a distributed energy
heterogeneous wireless sensor network”, Computer communication, Elsevier, pp.2230
[22] C. Bettstetter, (2004) “On the connectivity
on Mobile and Pervasive Computing, Oxford University Press, Vol. 47, No. 4, pp. 432
[23] R. Tandon, (2012) “Determination of optimal number of clusters in wireless sensor networks”,
International Journal of Computer Network and Communication, Aircc, Vol. 4, No. 4, pp. 235
[24] S. Kumar, S. Kumar, B. Bhusan, (2014) “Energy aware clustering protocol (EACP) for
Heterogeneous WSNs”, International Journal of Computer Network and Communication, Air
6, No. 4, pp.23-37.
Authors
Ajay Sikandar is currently a Ph.D. research scholar at School of Computer and
Systems Sciences, Jawaharlal Nehru University, New Delhi, India. His research
interests include Wireless Sensor Networks and Mobile Ad
received his MCA and M. Tech degrees in
School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi,
India in 2003 and 2010, respectively, and B.Sc. degree
PurvanchalUniversity Jaunpur, India in 1998.
Sushil Kumar received his Ph.D., M. Tech and MCA degrees in Computer Science
from School of Computer and Systems Sciences, Jawaharlal Nehru University, New
Delhi, India in 2014, 1999 and 1997 respectively, and B. Sc. degree in Mathematics
from Kanpur University, India in
Professor at School of Computer and Systems Sciences, Jawaharlal Nehru
University, New Delhi, India. His research interest includes vehicular ad hoc networks, mobile
ad hoc networks and wireless sensor networks.
International Journals and Conferences including ACM, IEEE, Springer, Inderscience,
and Hindawi.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
H. Zhou, Y. Wu, Y. Hu & G. Xie,(2010) “A novel stable selection and reliable transmission protocol
for clustered heterogeneous wireless sensor network”, Computer Communication, Elsevier, Vol.
W. B. Heinzelman, A. P. Chanrakasan, H. Balakrishana, (2002) “An application specific protocol
architecture for wireless micro sensor network” IEEE Transection on Wireless Communications, Vol.
S. Tanwar, N. Kumar & J. W. Niu,(2014) “EEMHR: Energy-efficient multilevel heterogeneous
routing protocol for wireless sensor networks”,International Journal of Communication Systems,
Wiley, Vol. 27, No.9, pp.1289-1318.
Z. Liu, Q. Zhenga, L. Xuea, X. Guana,(2012) “A distributed energy-efficient clustering algorithm
with improved coverage in wireless sensor networks”, Future Generation Computer Systems,
Elsevier, Vol. 28, No. 5, pp. 780–790.
D. Zhang & Z. Chen (2013) “Energy-Efficiency of cooperative communication with guaranteed E2E
ational Journal of Distributed Sensor Network, Hindawi, Vol. 2013, pp.1
O. Younis, S. Fahmy “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad
Hoc Sensor Networks” IEEE Transactions on Mobile Computing, Vol. 3, No. 4,pp.366-
L. Qing, Q. Zhu &M. Wang, (2006) “Design of a distributed energy- efficient clustering algorithm for
heterogeneous wireless sensor network”, Computer communication, Elsevier, pp.2230-2237.
C. Bettstetter, (2004) “On the connectivity of Adhoc network”, the Computer Journal, Special Issue
on Mobile and Pervasive Computing, Oxford University Press, Vol. 47, No. 4, pp. 432-
R. Tandon, (2012) “Determination of optimal number of clusters in wireless sensor networks”,
Journal of Computer Network and Communication, Aircc, Vol. 4, No. 4, pp. 235
S. Kumar, S. Kumar, B. Bhusan, (2014) “Energy aware clustering protocol (EACP) for
Heterogeneous WSNs”, International Journal of Computer Network and Communication, Air
is currently a Ph.D. research scholar at School of Computer and
Systems Sciences, Jawaharlal Nehru University, New Delhi, India. His research
interests include Wireless Sensor Networks and Mobile Ad-hoc Networks. He
received his MCA and M. Tech degrees in Computer Science and Technology from
School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi,
India in 2003 and 2010, respectively, and B.Sc. degree in mathematics from
University Jaunpur, India in 1998.
ceived his Ph.D., M. Tech and MCA degrees in Computer Science
from School of Computer and Systems Sciences, Jawaharlal Nehru University, New
Delhi, India in 2014, 1999 and 1997 respectively, and B. Sc. degree in Mathematics
from Kanpur University, India in 1993. He is currently working as Assistant
Professor at School of Computer and Systems Sciences, Jawaharlal Nehru
University, New Delhi, India. His research interest includes vehicular ad hoc networks, mobile
ad hoc networks and wireless sensor networks. Dr. Kumar has published papers in
International Journals and Conferences including ACM, IEEE, Springer, Inderscience, MDPI,
cations (IJCNC) Vol.7, No.2, March 2015
31
H. Zhou, Y. Wu, Y. Hu & G. Xie,(2010) “A novel stable selection and reliable transmission protocol
for clustered heterogeneous wireless sensor network”, Computer Communication, Elsevier, Vol.
kasan, H. Balakrishana, (2002) “An application specific protocol
architecture for wireless micro sensor network” IEEE Transection on Wireless Communications, Vol.
ultilevel heterogeneous
routing protocol for wireless sensor networks”,International Journal of Communication Systems,
efficient clustering algorithm
with improved coverage in wireless sensor networks”, Future Generation Computer Systems,
Efficiency of cooperative communication with guaranteed E2E
ational Journal of Distributed Sensor Network, Hindawi, Vol. 2013, pp.1-
Efficient, Distributed Clustering Approach for Ad
-369.
efficient clustering algorithm for
2237.
of Adhoc network”, the Computer Journal, Special Issue
-447.
R. Tandon, (2012) “Determination of optimal number of clusters in wireless sensor networks”,
Journal of Computer Network and Communication, Aircc, Vol. 4, No. 4, pp. 235-249.
S. Kumar, S. Kumar, B. Bhusan, (2014) “Energy aware clustering protocol (EACP) for
Heterogeneous WSNs”, International Journal of Computer Network and Communication, Aircc, Vol.
in mathematics from
University, New Delhi, India. His research interest includes vehicular ad hoc networks, mobile
Dr. Kumar has published papers in
MDPI,