SlideShare a Scribd company logo
1 of 9
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2727
Energy Efficient Optimized LEACH-C
Protocol using PBO Algorithm For Wireless Sensor Network
Kadambini Sahoo1 , Suman Bala Behera2
1 PG Scholar ,Department of Electronics and Instrumentation Engineering, Odisha University of Technology and
Research (OUTR), Bhubaneswar ,India
2 Assistant Professor Department of Electronics and Instrumentation Engineering, Odisha University of
Technology and Research (OUTR), Bhubaneswar ,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Wirelesssensornetworkshavegainedpopularity
because they have the potential to completely transform a
variety of facets automation in the transportation and
healthcare industries, as well as environmental monitoring
and conservation, manufacturing, and commercial asset
management. The number of nodes in a wireless sensor
network is large ranging in number from a fewtothousands,
each of which is connected to a single sensor. Lifetime and
energy usage is this network'smostdifficultassignment.The
most widely recognised routing methodsforwirelesssensor
networks arecluster-basedonessincetheyincreasenetwork
longevity anduselessenergy.Numerousprotocols,including
LEACH, Multi-hop-LEACH,LEACH-V,LEACH-C,andOLEACH-
C, have been created.. To enhance the functionality of the
LEACH-C protocol, we will concentrate on an optimization
technique based on pollination, commonly known as
OLEACH-C. The PBO technique is used forclusteringin WSN.
The cluster head will be determined by which node has the
most energy remaining. The cluster head will be chosen by
the distance between two nodes if their energies are equal.
Based on which node is closest to the base station, the CH
will be decided. The optimal CHs that ensure routing
optimization with the least amount of energy consumption
and the least expensive communicationlinesbetweennodes
inside of each other are chosen using the OLEACH-C
protocol.
Key Words: LEACH,Multihop-LEACH,LEACH-V,LEACH-C,
OLEACH-C
I.INTRODUCTION
The creation of intelligent environments for data
collection and transmission that rely on sensory data from
the actual world is made possible by the widespread use of
wireless sensor networks (WSNs). Figure 1 depicts the
fundamental construction of a smart sensor. The batteries
are referred to as the power source. The sensor nodes often
have a restricted battery capacity. At the moment, sensors
can replenish their energy through vibration, temperature
differential, or solar sources. The microcontroller analyses
the information and operates the various parts of the sensor
node's capabilities. On-chip memory and flash memory are
the only types of external memory. In WSN, the base station
(BS), which may serve as an internet gateway, or other
sensors, are connected via the transceiver.
Figure1.1-Sensor Architecture
Cluster-based routing is one of the various protocols, and it
uses a mechanism for data aggregation to save energy. Data
aggregation is the process of collecting data from all sensor
nodes and sending it to the aggregator. Data aggregation
algorithms' major goal is to collect and aggregate data in an
energy-efficient way to extend network lifetime. Noneofthe
nodes in a wireless sensor network can directly
communicate with the base station. A sensor node, also
called a "cluster head" (CH), gathers information from
nearby nodes, combines it, and then transmits the resulting
information to the base station.
Figure 1.2Communication in Wireless Sensor
Networks with Clustering
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2728
Up until now, altering the MAC layer and network layer
has been the main method of reducingenergyloss.Thereare
two additional pressing issues: how to arrange the cluster
heads over the grid and how manyclusters wouldbepresent
in a network. The network's lifespan will be extended and
energy loss will be decreased if the cluster heads are placed
correctly over the grid and enough clusters form.
II. HIERARCHICAL ROUTING PROTOCOLS
Routing is one of the greatest issues WSNs face. The key
factors contributing to the complexityofroutingprotocolsin
WSNs include the dynamic nature of nodes, computational
overhead, lack of a standardised addressing scheme, self-
organization, and the limited transmission range of sensor
nodes. The battery life of the sensor nodes is limited. The
initial battery capacity of the sensor nodesdictateshowlong
the network will last because of the environment in which
they are located, where batteries are typically non-
replaceable and non-rechargeable. Several routing methods
are now available for WSNs. The hierarchical architectureof
the flat, hierarchical, and location-based routing protocols
enables the use of higher energy nodes for data processing
and transmission and lower energy nodes for environment
sensing. As a result, a hierarchy of nodes with high and low
energy. Low Energy Adoptive Clustering Hierarchyisa basic
energy-efficient hierarchical routing technique (LEACH).
Numerous protocols have developed from LEACH with the
help of various upgrades and the application of cutting-edge
routing algorithms. Energy-efficient, well-defined routing
protocols include LEACH, LEACH-Centralized (LEACH-C),
LEACH-V, Multi-Hop LEACH, and Optimized LEACH-C.
(OLEACH-C). Hierarchical routing systems separate several
clusters into distinct network nodes. Each clusterhasa node
that follows the leading rule. In clustering routing systems,
Cluster-Heads (CHs) are the only nodes that can speak
directly to the BS [2]. Normal nodes must communicate to
closer CHs as a result, which dramatically lowers their long
distance transmission overhead.
1. LEACH Protocol
One of the first hierarchical routing systems for WSNs,
LEACH compresses data before sending it to thebasestation
to save energy and increase the network lifetime.
Figure 2.1-LEACH Protocol
Sensor nodes cluster togetherinLEACH,asdepictedinfigure
2.1. For each round, LEACH undertakes self-organizing and
re-clustering tasks. One sensor node serves as the cluster
head (CH) for each cluster, and the other sensor nodes serve
as the cluster's member nodes. Data is gathered from all
nodes by CHs, who then combine thedata theyhavereceived
and send all useful compress information to BS. Due of these
new tasks, CH uses up more energy and will quickly perishif
it continues to be CH, as is the case with static clustering. To
solve this issue, LEACH uses randomised CH rotation, which
preserves individual node batteries. LEACH prolongs
network lifetime while also minimising energyconsumption
by compressing data before sending it to BS. Every iteration
of the LEACH process normally consists of two stage. These
are the setup phase and the steady state phase.
Setup Phase-
During setup, clusters and CHs are constructed. To manage
all the nodes, several clusters are employed. Some nodes
independently select themselves as CHs without seeking
input from other nodes.TherecommendedpercentageP and
the CHs' historical performance as CHs are used to selectthe
CHs. Every node that wasn't a CH in the prior 1/p rounds
generates a number between 0 and 1, and if that number is
lower than the T (n) threshold, that node becomes a CH. The
value of the Threshold established by this formula
If n belongs to G , then T(n)=P/1-p*(rmod1)p 0,Otherwise
Here, G stands for the group of nodes that weren't picked as
cluster heads in the first 1/p rounds, where p representsthe
projected percentage of cluster heads. or the round that is
now underway. After the subsequent 1/prounds,nodesthat
become CHs in the current round will remain CHs[1]. This
means that the energy will disperse uniformly throughout
the network and that each node will behave similarly to a
CH.
Steady State Phase-
In the steady state phase, data transfer happens. Once a
candidate has been chosen, each CH will broadcast an
advertisement message to the othernodesviatheCSMAMAC
protocol. By comparing received signal strength indication,
non-CHs choose their cluster heads. The non-CH nodesbegin
gathering data and sending it to the CH once for each TDMA
frame that is provided to them. The nodeisthoughttoalways
have data to send in this scenario. The node enters a sleep
state in order to conserve energy until the next time slot is
approved. Data from cluster nodes must be continuously
received by the CH, which requires that itsreceiverbeturned
on. CH combines all of the data before transmitting it to the
base station.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2729
2. Multi-hop LEACH Protocol
Another improved LEACH extensiontoimprove WSN energy
efficiency is multi-hop LEACH. Another distributed
clustering routing protocol is multi-hop LEACH. The section
3.1 description of Multi-Hop LEACH communication
architecture. Like LEACH, CH rotates inanarbitrarymanner.
The optimal route with the lowest energy consumption is
selected using Multi-Hop LEACH. Keep overall distancefrom
BS to intermediate CH as one of the selection criteria since
distance substantially correlates with energy dissipation.
Consequently, the route with the fewest hops between
source CH and destination BS is picked.
Figure 3.1-Multi-hop LEACH Protocol
The Multi-hop LEACH protocol primarily takes into account
inter-cluster and intra-cluster multi-hop communication.
This protocol has the advantage of allowing sensor nodes to
expand inside the monitored area of the network. Thus, it
exhibits its capacity for scalability and flexibility. Without a
doubt, throughput is higher than that of the LEACHprotocol.
3. LEACH-V Protocol
In the V-LEACH protocol, the cluster also has a vice-CHSince
the data from the cluster nodes always reaches the BS, there
is no longer a need to elect a new CH each time the existing
CH dies. The entire network lifespan will be extended.
Figure 3.2-LEACH-V Protocol
Figure 3.2 demonstrates how Vice ClusterHead,analternate
Cluster Head, is used by V Leach. The Vice Cluster Head
succeeds the deceased ClusterHead[3]. Thenetwork rapidly
starts utilising less energy until it completely shuts down if
the Vice Cluster Head fails to provide a repair.
4. LEACH-Centralized (LEACH-C) Protocol.
Each node communicates the basestationinformationabout
its location, node ID, and energy condition during the
LEACH-Centralized setupphase. TheCentral Control method
is used by BS to specify CHs and non-CH nodes. The central
control algorithm is used by BS to compare each node's
energy to a predetermined average energy level. If a node's
energy is below the norm, BS classifies it as a member node.
The node IDs of these nodes are broadcast to all network
nodes by BS, who selects them as the nodes with the highest
potential number of CHs. Minimizing the distance between
member nodes and CHs is the aim of BS. LEACH-C lessens
member node energy dissipation in this manner because of
the close transmission distance between them and CH [4].
Compared to the distributed control method, this central
control methodology yields significantlysuperiorclustering.
The underlying idea of LEACH-Centralized means that each
node can compute its energy, is aware of its location, and
may broadcast this information to CH even while the BS is
remote from the node. As a result of nodes' ability to alter
their communicationrangeforintra-clusterandinter-cluster
communication to accommodate varying transmission
power levels.
5. Optimized LEACH-C Protocol
To lower energy usage and increase the lifetime of the WSN
network, a new version of LEACH-C has been suggested.
Below is a schematic that illustrates the OptimizedLEACH-C
(OLEACH-C) procedure. A list ofnodesindecreasingorderof
energy is compiled by the base station when usingLEACH-C,
using a sorting algorithm. The cluster head for the current
round will be chosen as the nodewiththegreatestamountof
energy remaining. The protocol is functioning effectively
overall. The LEACH-C technique does have certain
drawbacks, though. The cluster head will be determined by
the node's id rather than by distance if two or more network
nodes have the same energy level. Therefore, the
effectiveness of the current LEACH methodology won't be
considerably improved by this strategy. It costs more and
consumes more energy.
Figure 3.3- Optimized LEACH-C Protocol
In the proposed study, a methodology for selecting the
cluster head will be developed using the PBO (pollination-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2730
based optimization) optimization technique, in which the
cluster head nodes are selected based on their energy and
distance . If there is a tie in energy between the two nodes
that can be chosen as the cluster head, the cluster head will
be picked based on distance rather than ID. Based on which
node is closest to the base station, the CH will be decided.
With the suggested system paradigm, the current LEACH
protocol's cost, network, and energy efficiency can all be
significantly increased.
III. PBO ALGORITHM
By utilising the optimization technique known as
pollination-based optimization, the suggested work
improves the LEACH-C protocol. The pollination-based
optimization (PBO) method increases network lifetime and
reduces node energy usage. Pollination base optimization,
the most recent population-based optimization technique,
imitates flower pollination procedures. With regards to
optimization, integer programming, wireless sensor
networks, etc., the PBO algorithm is applied.ThePBOtriesto
encourage plant reproductionandthe"survival ofthefittest"
principle. The process of pollination essentially entails the
transfer of pollen from a flower's male stigma to its female
stigma, resulting in plant reproduction. There are two
methods for pollinating an object:
1..Self pollination
2.Cross pollination
BS stands for base station, AE for network average energy, C
H for cluster head, CM for cluster member, and disti and distj
for nodes' distances from base station, according to the follo
wing suppositions.
N is the total number of nodes when the set of energy from al
l nodes, E, is taken into account.
(a) Each node updates the BS with its position and energy lev
el.
(b) BS estimates the AE of the network and only labels the
nodes with higher energy (AE, CM, N, CH, E).
1. I 1
2. While I <= N
3. If (Ei >AE) then
4. CH (i) = True
5. Else
6. CM (i) = True
7. End if
8.For(j = 1; j < N; j++)
9. If (Ei = Ej )
10. i++ then
11. Apply the PBO algorithm
12. If (disti < distj ) from BS, then
13. CH (i) = True
14. Else
15. CH (j) = True
16. End if
17. End if
18. End while
IV. ANALYTICAL COMPARISON OF HIERARCHICAL
ROUTING PROTOCOLS
To do analytical comparisons, it is essential to understand
the radio model assumption thattheenergy-efficientrouting
algorithms employ. Each routing protocol makes a number
of assumptions about radio uniqueness.. The energy
efficiency of routing protocols significantly varies due to
these various factors.
1. First Order Radio Energy Model
We employ an easy-to-understandfirstorderradio model,as
shown in Fig. 4.1, in which the transmitter dissipates energy
to drive the radio electronics, as well as the power amplifier
and receiver.
(𝑙, 𝑑) = 𝐸𝑇π‘₯βˆ’π‘’π‘™π‘’π‘(𝑙) + 𝐸𝑇π‘₯βˆ’π‘Žπ‘šπ‘(𝑙, 𝑑)
𝑙𝐸𝑒𝑙𝑒𝑐 + 𝑙𝐸ƒ𝑠𝑑2 ,𝑑 < 𝑑0
={
𝑙𝐸𝑒𝑙𝑒𝑐 + 𝑙𝐸ƒ𝑠𝑑4,𝑑 β‰₯ 𝑑0
and to receive this message, the radio expends
𝐸𝑅π‘₯(𝑙) = 𝐸𝑅π‘₯βˆ’π‘’π‘™π‘’π‘(𝑙) = 𝑙𝐸𝑒𝑙𝑒𝑐
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2731
Figure 4.1-First Order Radio Energy Model
Tables 4.1 and 4.2 compare the LEACH, Multi-hop LEACH,
LEACH-V, LEACH-C, and Optimized LEACH-C procedures.
According to performance analyses, both routing methods
exhibit many of the same behaviours. All routing protocols
aggregate data, are homogeneous, and operate at
predetermined bit rates (BS). For CH selection, the
distributed algorithms LEACH, Multi-hop LEACH, and
LEACH-V are used. For CH selection, LEACH-C employs a
central control mechanism. We employ a mechanism based
on pollination for Optimized LEACH-C Thedistancebetween
BS and CHs is one hop in the routing protocols LEACH,
LEACH-V, LEACH-C, and Optimized LEACH-C; it may be
several hops in Multi-Hop LEACH .The LEACH protocol
allows for some scaling. Multi-Hop LEACH scales the best
thanks to the multi-hop communication option for CHs,
while LEACH-C, LEACH-V, and Optimized LEACH-C also
support good scaling. Compared to Multi-hop LEACH and
LEACH-V, theLEACHprotocol usesmore energyinefficiently.
LEACH-C and Optimized LEACH-C, on the other hand, offer
exceptionally high energy efficiency.
Table 4.1 –Comparing based on routing protocol type,
CH choice, scalability, and energy efficiency
Table 4.2 -Comparison based on data aggregation,
homogeneity, mobility and hop-count
PROTOCOLS DATA
AGGREG
ATION
HOMOG
ENEOUS
MOBILI
TY
HOP
COUNT
LEACH Yes Yes Fixed BS Single
MULTI-HOP
LEACH
Yes Yes Fixed BS Multi
LEACH-V Yes Yes Fixed BS Single
LEACH-C Yes Yes Fixed BS Single
OPTIMIZED
LEACH-C
Yes Yes Fixed BS Single
V. RESULTS AND ANALYSIS FROM SIMULATIONS
We construct a wirelesssensornetwork tovalidateOLEACH-
functionality. C's The simulation of the outcomes was done
using the MATLAB software. Nodes are initially introduced
into the network. Nodes are fixed in number. selecting the
simulation's parameters.
The list of requirements for simulating various LEACH
protocols with encryption techniques is provided below.
Parameter Value
Network Size 100m*100m
Total no. of nodes 100
Number of rounds at most 10,000
Initial energy 0.75J
P(CH percentage) 0.1J
Energy requiredtoconvey
each bit (ETX)
50 nJ/bit
energy requiredtoreceive
each bit (ERX)
50 nJ/bit
Model of the energy of
empty space (Efs)
10pJ/bit
Multipath model's energy
(Emp)
0.0013 pJ/bit
Aggregation of Data and
Energy (EDA)
5 nJ/bit
Node Deployment
According to Figure 5.1, the network consists of 100 nodes.
The nodes are evenly dispersedthroughouta 100m by100m
area. The nature of each node taken into consideration is
homogeneous. Every operation in the network uses a
sizeable percentage of the nodes' energy.
PROTOC
OLS
CLASSIFI
CATION
HOMOG
ENEOUS
MOBILI
TY
HOP
COUNT
LEACH Hierarchi
cal
Random Limited Poor
MULTI-
HOP
LEACH
Hierarchi
cal
Random Good High
LEACH-V Hierarchi
cal
Random Good High
LEACH-C Hierarchi
cal
Based
on
residual
energy
Very
Good
Very
High
OPTIMIZ
ED
LEACH-C
Hierarchi
cal
Based
on
residual
energy
Very
Good
Very
High
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2732
Figure 5.1(100 nodes Network)
Wireless Sensor Network in Figure 5.1 with 100 nodes
In this case, 100 nodes are formed over a 100m*100m
region.
The base station is located at BS (50,50). 2. Results of the
LEACH protocol analysis.
Figure 5.2 The LEACH protocol's alive node v/s roundplot is
displayed in Figure 5.2. About 90% of nodes survive the
protocol's 2200 rounds, or almost all nodes. One of the
current practises is this.
Figure 5.2- LEACH protocol live nodes vs. rounds plot
Figure 5.3 depicts the LEACH protocol's dead nodes v/s
round plot. The node runs out of roundsafter1500.Between
1900 and 2200 rounds, the 50th and last nodes perish.
Figure 5.3- LEACH protocol Dead nodes v/s rounds
plot
Fig. 5.4 displays the alive node v/s roundplotfortheLEACH-
C protocol. Nearly all nodes are still infunctioningafter2700
rounds. It yields better results in comparison to the LEACH
protocol, which calls for nodes to communicate for 2200
cycles.
Figure 5.4- LEACH-C protocol live nodes vs. rounds
plot
Figure 5.5 depicts the dead no v/s round plot for theLEACH-
C protocol. The first and last nodes die between 1700 and
2700 rounds. After around 2200 cycles, the LEACH
protocol's last node expired. Therefore, LEACH-C performs
better than the LEACH protocol.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2733
Figure 5.5- LEACH-C protocol Dead nodes v/s rounds
plot
The OLEACH-C protocol, which isthebestofthethreeshown
in Fig. 5.6, allows all nodes to communicate for 3200 cycles.
When choosing the cluster head, this technique takes the
remaining energy and the distance into account.
Figure 5.6- OLEACH-C protocol Alive nodes v/s rounds
plot
Figure 5.7 displays a study of the dead nodes vs. rounds plot
for the OLEACH-C protocol. Around 1950 rounds later, the
first node expires. Between 2000 and 3200 rounds pass
before the tenth and last nodes pass away. The fact that this
protocol can communicate for up to 3200 rounds makes it
the best one we've discussed so far.
Figure 5.7- OLEACH-C protocol Dead nodes v/s Rounds
plot
The comparison of the LEACH, LEACH-C, and OLEACH-C
protocols is shown in Fig. 5.8. Cluster creation causes the
LEACH protocol to lose energysincemore energyisrequired
because clusters form after each round. However, the base
station forms the LEACH-C clusters, whereas the OLEACH-C
clusters are formed based on residual energy and distance
utilising an optimizationmethodknownasPollinationBased
Optimization (PBO).
Figure 5.8- Comparison of the proposed OLEACH-C
with various existing protocols using an alive nodes
vs. rounds plot
In Fig. 5.9, dead nodes for the LEACH, LEACH-C, and
OLEACH-C protocols are contrasted. When compared to
other methods, OLEACH-C produces better outcomes. Here,
the first node runs out of rounds after roughly 1950. In
LEACH and LEACH-C, the initial node expires after 1500 and
1700 cycles, respectively.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2734
Figure 5.9- Comparison of the proposed OLEACH-C
with various existing protocols using a dead nodes vs.
rounds plot
The packet transmitted to the base stations in response to
the specified round is shown in Fig. 5.10. The OLEACH-C
protocol sends more data to base stations and cluster heads
than the LEACH and LEACH-C protocols, which extends
network lifetime and lowers energy usage.
Figure 5.10- Rounds plotting the proposed OLEACH-C
against various existing protocols are broadcast to BS
packets.
Figure 5.11 compares the network lifetime of the OLEACH-C
protocol to that of other active protocols.Thefirstdead node
for the LEACH(1), LEACH-C(2), and OLEACH-C(3) protocols
has been used as the basis for this comparison.Figureshows
that compared to older protocols, the proposed Optimized
LEACH-C protocol provides a longer network lifetime.
Figure 5.11- OLEACH-planned C's network lifetime in
contrast to other existing protocols
The OLEACH-C protocol therefore extends the life of the
wireless sensor network by selecting the cluster head based
on their remaining energy as well as distance and attaching
the cluster nodes according to the distance to the ideal
cluster head. With the least amount of energy consumption
and the most affordable communication connections
between nodes, the OLEACH-C protocol and other energy-
efficient communication protocols for wireless sensor
networks select the ideal CHs to ensure route optimization.
VI. CONCLUSIONS
Due to the limited energy resources available, one of the
major issues while developing routing protocolsfor WSNs is
how to use energy effectively. The routing protocol's main
goal is to maintain the sensors' usefulness for as long as is
practical while simultaneously prolonging the network's
lifespan. The majority of the energy used by the sensors is
used for sending and receiving data. As a result, to increase
the lifespan of individual sensors and, by extension, the
network as a whole, routing algorithms created for WSNs
must be as energy-efficient as is practicable. We have
discussed numerous LEACH-based techniques in this work.
This study's primary goal was to evaluate the effectiveness
of various energy management and throughput-improving
strategies. With the use of analytical comparison and the
outcomes of We examined the durability and data transfer
characteristics in our simulation .Because it chooses the
cluster head by taking into account the node's remaining
energy and distance, the proposed OLEACH-C protocol
outperforms the existing LEACH, Multi-hop LEACH, LEACH-
V, and LEACH-C protocols, according to the simulation
results. These processes still need to be refined. The
establishment phases of all routing systems should be
improved by the development of distributedandcentralised
algorithms. Application standards also need to be improved
for the electronics of sensor nodes, deployment
management, and the choice ofeffectiveandefficientrouting
protocols for WSNs, among many other areas.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2735
FUTURE SCOPE
Future work on energy efficiency at the MAC layer and the
viability of these protocols in heterogeneous environments
are both priorities for us. Only two dimensions for node
position are taken into consideration in the proposed
protocol because nodes are deployed on the same surface in
this case. Future study will concentrate on simulating the
outcomes while taking into account the third dimension.
REFERENCES
[1] N. Nasri, A. WEI, A. Kachouri, S. E. Khediri , "A New
Approach for Clustering in Wireless Sensors
Networks,β€– International Workshop on Wireless
Networks and Energy Saving Techniques (WNTEST),
vol.32, pp.1180-1185 ,Elsevier 2014.
[2] N. Jamal . A. Karaki and A. E. Kamal, "Routing
Techniques in wireless sensor networks," in
International Workshop on Wireless Networks and
Energy Saving Techniques (WNTEST), 2009.
[3] R. V. N. Sindhwani, "V LEACH: An Energy Efficient
Communication," vol. 2(2), 2013.
[4] M. Tripathi,, M.S. Gaur, V. Laxmi and R.B. Battula, ―
Energy Efficient LEACH-C Protocol for Wirelesssensor
Network,β€– In computational intelligence and
information technology, pp. 402 - 405, IET 2013.
[5] V.A. Geetha , P.V. Kallapurb, S. Tellajeera, ―Clustering
in Wireless Sensor Networks: Performance
Comparison of LEACH & LEACH-C Protocols Using
NS2,β€– Procedia technology,vol. 4pp.163-170,Elsevier
2012.
[6] M. Tripathi,, M.S. Gaur, V. Laxmi and R.B. Battula, ―
Energy Efficient LEACH-C Protocolfor Wirelesssensor
Network,β€– In computational intelligence and
information technology, pp. 402 - 405, IET 2013.
[7] R.M.B. Hani and A.A. Ijjeh, ―A Survey on LEACH-Based
Energy Aware Protocols for Wireless Sensor
Networks,β€– Journal of Communications vol. 8(3), pp.
192-206, 2013.
[8] H.M. Abdulsalam, B.A. Ali, A. AlYatama, E.S. AlRoumi,
―Deploying a LEACH Data Aggregation Technique for
Air Quality Monitoring in Wireless Sensor Network,β€–
The 2nd International Workshop on
Communications and Sensor Networks, vol. 34, pp
499-504, Elsevier 2014.
[9] ] Altakhayneh, Walaa A., et al. "Cluster head selection
using PBO algorithm in wireless network." 2019IEEE
14th Malaysia International Conference on
Communication (MICC). IEEE, 2019.

More Related Content

Similar to Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless Sensor Network

ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
Β 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
Β 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
Β 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Β 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Β 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
Β 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
Β 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A ReviewIRJET Journal
Β 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
Β 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652IJERA Editor
Β 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
Β 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
Β 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
Β 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
Β 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
Β 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
Β 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Β 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...IRJET Journal
Β 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
Β 
H0421043049
H0421043049H0421043049
H0421043049ijceronline
Β 

Similar to Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless Sensor Network (20)

ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
Β 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Β 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
Β 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Β 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
Β 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
Β 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
Β 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
Β 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Β 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
Β 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
Β 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Β 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
Β 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
Β 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
Β 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
Β 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Β 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Β 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Β 
H0421043049
H0421043049H0421043049
H0421043049
Β 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
Β 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
Β 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
Β 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
Β 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
Β 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
Β 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
Β 
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
Β 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
Β 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
Β 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
Β 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
Β 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
Β 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
Β 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
Β 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
Β 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
Β 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
Β 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
Β 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
Β 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Β 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Β 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Β 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Β 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Β 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Β 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Β 
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of β€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
Β 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Β 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Β 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Β 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Β 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Β 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Β 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
Β 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Β 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Β 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Β 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Β 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Β 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Β 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Β 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Β 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Β 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”soniya singh
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Β 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
Β 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Β 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Β 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Β 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Β 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Β 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Β 
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRβ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Β 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Β 
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Model Call Girl in Narela Delhi reach out to us at πŸ”8264348440πŸ”
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Β 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Β 

Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2727 Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless Sensor Network Kadambini Sahoo1 , Suman Bala Behera2 1 PG Scholar ,Department of Electronics and Instrumentation Engineering, Odisha University of Technology and Research (OUTR), Bhubaneswar ,India 2 Assistant Professor Department of Electronics and Instrumentation Engineering, Odisha University of Technology and Research (OUTR), Bhubaneswar ,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Wirelesssensornetworkshavegainedpopularity because they have the potential to completely transform a variety of facets automation in the transportation and healthcare industries, as well as environmental monitoring and conservation, manufacturing, and commercial asset management. The number of nodes in a wireless sensor network is large ranging in number from a fewtothousands, each of which is connected to a single sensor. Lifetime and energy usage is this network'smostdifficultassignment.The most widely recognised routing methodsforwirelesssensor networks arecluster-basedonessincetheyincreasenetwork longevity anduselessenergy.Numerousprotocols,including LEACH, Multi-hop-LEACH,LEACH-V,LEACH-C,andOLEACH- C, have been created.. To enhance the functionality of the LEACH-C protocol, we will concentrate on an optimization technique based on pollination, commonly known as OLEACH-C. The PBO technique is used forclusteringin WSN. The cluster head will be determined by which node has the most energy remaining. The cluster head will be chosen by the distance between two nodes if their energies are equal. Based on which node is closest to the base station, the CH will be decided. The optimal CHs that ensure routing optimization with the least amount of energy consumption and the least expensive communicationlinesbetweennodes inside of each other are chosen using the OLEACH-C protocol. Key Words: LEACH,Multihop-LEACH,LEACH-V,LEACH-C, OLEACH-C I.INTRODUCTION The creation of intelligent environments for data collection and transmission that rely on sensory data from the actual world is made possible by the widespread use of wireless sensor networks (WSNs). Figure 1 depicts the fundamental construction of a smart sensor. The batteries are referred to as the power source. The sensor nodes often have a restricted battery capacity. At the moment, sensors can replenish their energy through vibration, temperature differential, or solar sources. The microcontroller analyses the information and operates the various parts of the sensor node's capabilities. On-chip memory and flash memory are the only types of external memory. In WSN, the base station (BS), which may serve as an internet gateway, or other sensors, are connected via the transceiver. Figure1.1-Sensor Architecture Cluster-based routing is one of the various protocols, and it uses a mechanism for data aggregation to save energy. Data aggregation is the process of collecting data from all sensor nodes and sending it to the aggregator. Data aggregation algorithms' major goal is to collect and aggregate data in an energy-efficient way to extend network lifetime. Noneofthe nodes in a wireless sensor network can directly communicate with the base station. A sensor node, also called a "cluster head" (CH), gathers information from nearby nodes, combines it, and then transmits the resulting information to the base station. Figure 1.2Communication in Wireless Sensor Networks with Clustering
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2728 Up until now, altering the MAC layer and network layer has been the main method of reducingenergyloss.Thereare two additional pressing issues: how to arrange the cluster heads over the grid and how manyclusters wouldbepresent in a network. The network's lifespan will be extended and energy loss will be decreased if the cluster heads are placed correctly over the grid and enough clusters form. II. HIERARCHICAL ROUTING PROTOCOLS Routing is one of the greatest issues WSNs face. The key factors contributing to the complexityofroutingprotocolsin WSNs include the dynamic nature of nodes, computational overhead, lack of a standardised addressing scheme, self- organization, and the limited transmission range of sensor nodes. The battery life of the sensor nodes is limited. The initial battery capacity of the sensor nodesdictateshowlong the network will last because of the environment in which they are located, where batteries are typically non- replaceable and non-rechargeable. Several routing methods are now available for WSNs. The hierarchical architectureof the flat, hierarchical, and location-based routing protocols enables the use of higher energy nodes for data processing and transmission and lower energy nodes for environment sensing. As a result, a hierarchy of nodes with high and low energy. Low Energy Adoptive Clustering Hierarchyisa basic energy-efficient hierarchical routing technique (LEACH). Numerous protocols have developed from LEACH with the help of various upgrades and the application of cutting-edge routing algorithms. Energy-efficient, well-defined routing protocols include LEACH, LEACH-Centralized (LEACH-C), LEACH-V, Multi-Hop LEACH, and Optimized LEACH-C. (OLEACH-C). Hierarchical routing systems separate several clusters into distinct network nodes. Each clusterhasa node that follows the leading rule. In clustering routing systems, Cluster-Heads (CHs) are the only nodes that can speak directly to the BS [2]. Normal nodes must communicate to closer CHs as a result, which dramatically lowers their long distance transmission overhead. 1. LEACH Protocol One of the first hierarchical routing systems for WSNs, LEACH compresses data before sending it to thebasestation to save energy and increase the network lifetime. Figure 2.1-LEACH Protocol Sensor nodes cluster togetherinLEACH,asdepictedinfigure 2.1. For each round, LEACH undertakes self-organizing and re-clustering tasks. One sensor node serves as the cluster head (CH) for each cluster, and the other sensor nodes serve as the cluster's member nodes. Data is gathered from all nodes by CHs, who then combine thedata theyhavereceived and send all useful compress information to BS. Due of these new tasks, CH uses up more energy and will quickly perishif it continues to be CH, as is the case with static clustering. To solve this issue, LEACH uses randomised CH rotation, which preserves individual node batteries. LEACH prolongs network lifetime while also minimising energyconsumption by compressing data before sending it to BS. Every iteration of the LEACH process normally consists of two stage. These are the setup phase and the steady state phase. Setup Phase- During setup, clusters and CHs are constructed. To manage all the nodes, several clusters are employed. Some nodes independently select themselves as CHs without seeking input from other nodes.TherecommendedpercentageP and the CHs' historical performance as CHs are used to selectthe CHs. Every node that wasn't a CH in the prior 1/p rounds generates a number between 0 and 1, and if that number is lower than the T (n) threshold, that node becomes a CH. The value of the Threshold established by this formula If n belongs to G , then T(n)=P/1-p*(rmod1)p 0,Otherwise Here, G stands for the group of nodes that weren't picked as cluster heads in the first 1/p rounds, where p representsthe projected percentage of cluster heads. or the round that is now underway. After the subsequent 1/prounds,nodesthat become CHs in the current round will remain CHs[1]. This means that the energy will disperse uniformly throughout the network and that each node will behave similarly to a CH. Steady State Phase- In the steady state phase, data transfer happens. Once a candidate has been chosen, each CH will broadcast an advertisement message to the othernodesviatheCSMAMAC protocol. By comparing received signal strength indication, non-CHs choose their cluster heads. The non-CH nodesbegin gathering data and sending it to the CH once for each TDMA frame that is provided to them. The nodeisthoughttoalways have data to send in this scenario. The node enters a sleep state in order to conserve energy until the next time slot is approved. Data from cluster nodes must be continuously received by the CH, which requires that itsreceiverbeturned on. CH combines all of the data before transmitting it to the base station.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2729 2. Multi-hop LEACH Protocol Another improved LEACH extensiontoimprove WSN energy efficiency is multi-hop LEACH. Another distributed clustering routing protocol is multi-hop LEACH. The section 3.1 description of Multi-Hop LEACH communication architecture. Like LEACH, CH rotates inanarbitrarymanner. The optimal route with the lowest energy consumption is selected using Multi-Hop LEACH. Keep overall distancefrom BS to intermediate CH as one of the selection criteria since distance substantially correlates with energy dissipation. Consequently, the route with the fewest hops between source CH and destination BS is picked. Figure 3.1-Multi-hop LEACH Protocol The Multi-hop LEACH protocol primarily takes into account inter-cluster and intra-cluster multi-hop communication. This protocol has the advantage of allowing sensor nodes to expand inside the monitored area of the network. Thus, it exhibits its capacity for scalability and flexibility. Without a doubt, throughput is higher than that of the LEACHprotocol. 3. LEACH-V Protocol In the V-LEACH protocol, the cluster also has a vice-CHSince the data from the cluster nodes always reaches the BS, there is no longer a need to elect a new CH each time the existing CH dies. The entire network lifespan will be extended. Figure 3.2-LEACH-V Protocol Figure 3.2 demonstrates how Vice ClusterHead,analternate Cluster Head, is used by V Leach. The Vice Cluster Head succeeds the deceased ClusterHead[3]. Thenetwork rapidly starts utilising less energy until it completely shuts down if the Vice Cluster Head fails to provide a repair. 4. LEACH-Centralized (LEACH-C) Protocol. Each node communicates the basestationinformationabout its location, node ID, and energy condition during the LEACH-Centralized setupphase. TheCentral Control method is used by BS to specify CHs and non-CH nodes. The central control algorithm is used by BS to compare each node's energy to a predetermined average energy level. If a node's energy is below the norm, BS classifies it as a member node. The node IDs of these nodes are broadcast to all network nodes by BS, who selects them as the nodes with the highest potential number of CHs. Minimizing the distance between member nodes and CHs is the aim of BS. LEACH-C lessens member node energy dissipation in this manner because of the close transmission distance between them and CH [4]. Compared to the distributed control method, this central control methodology yields significantlysuperiorclustering. The underlying idea of LEACH-Centralized means that each node can compute its energy, is aware of its location, and may broadcast this information to CH even while the BS is remote from the node. As a result of nodes' ability to alter their communicationrangeforintra-clusterandinter-cluster communication to accommodate varying transmission power levels. 5. Optimized LEACH-C Protocol To lower energy usage and increase the lifetime of the WSN network, a new version of LEACH-C has been suggested. Below is a schematic that illustrates the OptimizedLEACH-C (OLEACH-C) procedure. A list ofnodesindecreasingorderof energy is compiled by the base station when usingLEACH-C, using a sorting algorithm. The cluster head for the current round will be chosen as the nodewiththegreatestamountof energy remaining. The protocol is functioning effectively overall. The LEACH-C technique does have certain drawbacks, though. The cluster head will be determined by the node's id rather than by distance if two or more network nodes have the same energy level. Therefore, the effectiveness of the current LEACH methodology won't be considerably improved by this strategy. It costs more and consumes more energy. Figure 3.3- Optimized LEACH-C Protocol In the proposed study, a methodology for selecting the cluster head will be developed using the PBO (pollination-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2730 based optimization) optimization technique, in which the cluster head nodes are selected based on their energy and distance . If there is a tie in energy between the two nodes that can be chosen as the cluster head, the cluster head will be picked based on distance rather than ID. Based on which node is closest to the base station, the CH will be decided. With the suggested system paradigm, the current LEACH protocol's cost, network, and energy efficiency can all be significantly increased. III. PBO ALGORITHM By utilising the optimization technique known as pollination-based optimization, the suggested work improves the LEACH-C protocol. The pollination-based optimization (PBO) method increases network lifetime and reduces node energy usage. Pollination base optimization, the most recent population-based optimization technique, imitates flower pollination procedures. With regards to optimization, integer programming, wireless sensor networks, etc., the PBO algorithm is applied.ThePBOtriesto encourage plant reproductionandthe"survival ofthefittest" principle. The process of pollination essentially entails the transfer of pollen from a flower's male stigma to its female stigma, resulting in plant reproduction. There are two methods for pollinating an object: 1..Self pollination 2.Cross pollination BS stands for base station, AE for network average energy, C H for cluster head, CM for cluster member, and disti and distj for nodes' distances from base station, according to the follo wing suppositions. N is the total number of nodes when the set of energy from al l nodes, E, is taken into account. (a) Each node updates the BS with its position and energy lev el. (b) BS estimates the AE of the network and only labels the nodes with higher energy (AE, CM, N, CH, E). 1. I 1 2. While I <= N 3. If (Ei >AE) then 4. CH (i) = True 5. Else 6. CM (i) = True 7. End if 8.For(j = 1; j < N; j++) 9. If (Ei = Ej ) 10. i++ then 11. Apply the PBO algorithm 12. If (disti < distj ) from BS, then 13. CH (i) = True 14. Else 15. CH (j) = True 16. End if 17. End if 18. End while IV. ANALYTICAL COMPARISON OF HIERARCHICAL ROUTING PROTOCOLS To do analytical comparisons, it is essential to understand the radio model assumption thattheenergy-efficientrouting algorithms employ. Each routing protocol makes a number of assumptions about radio uniqueness.. The energy efficiency of routing protocols significantly varies due to these various factors. 1. First Order Radio Energy Model We employ an easy-to-understandfirstorderradio model,as shown in Fig. 4.1, in which the transmitter dissipates energy to drive the radio electronics, as well as the power amplifier and receiver. (𝑙, 𝑑) = 𝐸𝑇π‘₯βˆ’π‘’π‘™π‘’π‘(𝑙) + 𝐸𝑇π‘₯βˆ’π‘Žπ‘šπ‘(𝑙, 𝑑) 𝑙𝐸𝑒𝑙𝑒𝑐 + 𝑙𝐸ƒ𝑠𝑑2 ,𝑑 < 𝑑0 ={ 𝑙𝐸𝑒𝑙𝑒𝑐 + 𝑙𝐸ƒ𝑠𝑑4,𝑑 β‰₯ 𝑑0 and to receive this message, the radio expends 𝐸𝑅π‘₯(𝑙) = 𝐸𝑅π‘₯βˆ’π‘’π‘™π‘’π‘(𝑙) = 𝑙𝐸𝑒𝑙𝑒𝑐
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2731 Figure 4.1-First Order Radio Energy Model Tables 4.1 and 4.2 compare the LEACH, Multi-hop LEACH, LEACH-V, LEACH-C, and Optimized LEACH-C procedures. According to performance analyses, both routing methods exhibit many of the same behaviours. All routing protocols aggregate data, are homogeneous, and operate at predetermined bit rates (BS). For CH selection, the distributed algorithms LEACH, Multi-hop LEACH, and LEACH-V are used. For CH selection, LEACH-C employs a central control mechanism. We employ a mechanism based on pollination for Optimized LEACH-C Thedistancebetween BS and CHs is one hop in the routing protocols LEACH, LEACH-V, LEACH-C, and Optimized LEACH-C; it may be several hops in Multi-Hop LEACH .The LEACH protocol allows for some scaling. Multi-Hop LEACH scales the best thanks to the multi-hop communication option for CHs, while LEACH-C, LEACH-V, and Optimized LEACH-C also support good scaling. Compared to Multi-hop LEACH and LEACH-V, theLEACHprotocol usesmore energyinefficiently. LEACH-C and Optimized LEACH-C, on the other hand, offer exceptionally high energy efficiency. Table 4.1 –Comparing based on routing protocol type, CH choice, scalability, and energy efficiency Table 4.2 -Comparison based on data aggregation, homogeneity, mobility and hop-count PROTOCOLS DATA AGGREG ATION HOMOG ENEOUS MOBILI TY HOP COUNT LEACH Yes Yes Fixed BS Single MULTI-HOP LEACH Yes Yes Fixed BS Multi LEACH-V Yes Yes Fixed BS Single LEACH-C Yes Yes Fixed BS Single OPTIMIZED LEACH-C Yes Yes Fixed BS Single V. RESULTS AND ANALYSIS FROM SIMULATIONS We construct a wirelesssensornetwork tovalidateOLEACH- functionality. C's The simulation of the outcomes was done using the MATLAB software. Nodes are initially introduced into the network. Nodes are fixed in number. selecting the simulation's parameters. The list of requirements for simulating various LEACH protocols with encryption techniques is provided below. Parameter Value Network Size 100m*100m Total no. of nodes 100 Number of rounds at most 10,000 Initial energy 0.75J P(CH percentage) 0.1J Energy requiredtoconvey each bit (ETX) 50 nJ/bit energy requiredtoreceive each bit (ERX) 50 nJ/bit Model of the energy of empty space (Efs) 10pJ/bit Multipath model's energy (Emp) 0.0013 pJ/bit Aggregation of Data and Energy (EDA) 5 nJ/bit Node Deployment According to Figure 5.1, the network consists of 100 nodes. The nodes are evenly dispersedthroughouta 100m by100m area. The nature of each node taken into consideration is homogeneous. Every operation in the network uses a sizeable percentage of the nodes' energy. PROTOC OLS CLASSIFI CATION HOMOG ENEOUS MOBILI TY HOP COUNT LEACH Hierarchi cal Random Limited Poor MULTI- HOP LEACH Hierarchi cal Random Good High LEACH-V Hierarchi cal Random Good High LEACH-C Hierarchi cal Based on residual energy Very Good Very High OPTIMIZ ED LEACH-C Hierarchi cal Based on residual energy Very Good Very High
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2732 Figure 5.1(100 nodes Network) Wireless Sensor Network in Figure 5.1 with 100 nodes In this case, 100 nodes are formed over a 100m*100m region. The base station is located at BS (50,50). 2. Results of the LEACH protocol analysis. Figure 5.2 The LEACH protocol's alive node v/s roundplot is displayed in Figure 5.2. About 90% of nodes survive the protocol's 2200 rounds, or almost all nodes. One of the current practises is this. Figure 5.2- LEACH protocol live nodes vs. rounds plot Figure 5.3 depicts the LEACH protocol's dead nodes v/s round plot. The node runs out of roundsafter1500.Between 1900 and 2200 rounds, the 50th and last nodes perish. Figure 5.3- LEACH protocol Dead nodes v/s rounds plot Fig. 5.4 displays the alive node v/s roundplotfortheLEACH- C protocol. Nearly all nodes are still infunctioningafter2700 rounds. It yields better results in comparison to the LEACH protocol, which calls for nodes to communicate for 2200 cycles. Figure 5.4- LEACH-C protocol live nodes vs. rounds plot Figure 5.5 depicts the dead no v/s round plot for theLEACH- C protocol. The first and last nodes die between 1700 and 2700 rounds. After around 2200 cycles, the LEACH protocol's last node expired. Therefore, LEACH-C performs better than the LEACH protocol.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2733 Figure 5.5- LEACH-C protocol Dead nodes v/s rounds plot The OLEACH-C protocol, which isthebestofthethreeshown in Fig. 5.6, allows all nodes to communicate for 3200 cycles. When choosing the cluster head, this technique takes the remaining energy and the distance into account. Figure 5.6- OLEACH-C protocol Alive nodes v/s rounds plot Figure 5.7 displays a study of the dead nodes vs. rounds plot for the OLEACH-C protocol. Around 1950 rounds later, the first node expires. Between 2000 and 3200 rounds pass before the tenth and last nodes pass away. The fact that this protocol can communicate for up to 3200 rounds makes it the best one we've discussed so far. Figure 5.7- OLEACH-C protocol Dead nodes v/s Rounds plot The comparison of the LEACH, LEACH-C, and OLEACH-C protocols is shown in Fig. 5.8. Cluster creation causes the LEACH protocol to lose energysincemore energyisrequired because clusters form after each round. However, the base station forms the LEACH-C clusters, whereas the OLEACH-C clusters are formed based on residual energy and distance utilising an optimizationmethodknownasPollinationBased Optimization (PBO). Figure 5.8- Comparison of the proposed OLEACH-C with various existing protocols using an alive nodes vs. rounds plot In Fig. 5.9, dead nodes for the LEACH, LEACH-C, and OLEACH-C protocols are contrasted. When compared to other methods, OLEACH-C produces better outcomes. Here, the first node runs out of rounds after roughly 1950. In LEACH and LEACH-C, the initial node expires after 1500 and 1700 cycles, respectively.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2734 Figure 5.9- Comparison of the proposed OLEACH-C with various existing protocols using a dead nodes vs. rounds plot The packet transmitted to the base stations in response to the specified round is shown in Fig. 5.10. The OLEACH-C protocol sends more data to base stations and cluster heads than the LEACH and LEACH-C protocols, which extends network lifetime and lowers energy usage. Figure 5.10- Rounds plotting the proposed OLEACH-C against various existing protocols are broadcast to BS packets. Figure 5.11 compares the network lifetime of the OLEACH-C protocol to that of other active protocols.Thefirstdead node for the LEACH(1), LEACH-C(2), and OLEACH-C(3) protocols has been used as the basis for this comparison.Figureshows that compared to older protocols, the proposed Optimized LEACH-C protocol provides a longer network lifetime. Figure 5.11- OLEACH-planned C's network lifetime in contrast to other existing protocols The OLEACH-C protocol therefore extends the life of the wireless sensor network by selecting the cluster head based on their remaining energy as well as distance and attaching the cluster nodes according to the distance to the ideal cluster head. With the least amount of energy consumption and the most affordable communication connections between nodes, the OLEACH-C protocol and other energy- efficient communication protocols for wireless sensor networks select the ideal CHs to ensure route optimization. VI. CONCLUSIONS Due to the limited energy resources available, one of the major issues while developing routing protocolsfor WSNs is how to use energy effectively. The routing protocol's main goal is to maintain the sensors' usefulness for as long as is practical while simultaneously prolonging the network's lifespan. The majority of the energy used by the sensors is used for sending and receiving data. As a result, to increase the lifespan of individual sensors and, by extension, the network as a whole, routing algorithms created for WSNs must be as energy-efficient as is practicable. We have discussed numerous LEACH-based techniques in this work. This study's primary goal was to evaluate the effectiveness of various energy management and throughput-improving strategies. With the use of analytical comparison and the outcomes of We examined the durability and data transfer characteristics in our simulation .Because it chooses the cluster head by taking into account the node's remaining energy and distance, the proposed OLEACH-C protocol outperforms the existing LEACH, Multi-hop LEACH, LEACH- V, and LEACH-C protocols, according to the simulation results. These processes still need to be refined. The establishment phases of all routing systems should be improved by the development of distributedandcentralised algorithms. Application standards also need to be improved for the electronics of sensor nodes, deployment management, and the choice ofeffectiveandefficientrouting protocols for WSNs, among many other areas.
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 Β© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2735 FUTURE SCOPE Future work on energy efficiency at the MAC layer and the viability of these protocols in heterogeneous environments are both priorities for us. Only two dimensions for node position are taken into consideration in the proposed protocol because nodes are deployed on the same surface in this case. Future study will concentrate on simulating the outcomes while taking into account the third dimension. REFERENCES [1] N. Nasri, A. WEI, A. Kachouri, S. E. Khediri , "A New Approach for Clustering in Wireless Sensors Networks,β€– International Workshop on Wireless Networks and Energy Saving Techniques (WNTEST), vol.32, pp.1180-1185 ,Elsevier 2014. [2] N. Jamal . A. Karaki and A. E. Kamal, "Routing Techniques in wireless sensor networks," in International Workshop on Wireless Networks and Energy Saving Techniques (WNTEST), 2009. [3] R. V. N. Sindhwani, "V LEACH: An Energy Efficient Communication," vol. 2(2), 2013. [4] M. Tripathi,, M.S. Gaur, V. Laxmi and R.B. Battula, ― Energy Efficient LEACH-C Protocol for Wirelesssensor Network,β€– In computational intelligence and information technology, pp. 402 - 405, IET 2013. [5] V.A. Geetha , P.V. Kallapurb, S. Tellajeera, ―Clustering in Wireless Sensor Networks: Performance Comparison of LEACH & LEACH-C Protocols Using NS2,β€– Procedia technology,vol. 4pp.163-170,Elsevier 2012. [6] M. Tripathi,, M.S. Gaur, V. Laxmi and R.B. Battula, ― Energy Efficient LEACH-C Protocolfor Wirelesssensor Network,β€– In computational intelligence and information technology, pp. 402 - 405, IET 2013. [7] R.M.B. Hani and A.A. Ijjeh, ―A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks,β€– Journal of Communications vol. 8(3), pp. 192-206, 2013. [8] H.M. Abdulsalam, B.A. Ali, A. AlYatama, E.S. AlRoumi, ―Deploying a LEACH Data Aggregation Technique for Air Quality Monitoring in Wireless Sensor Network,β€– The 2nd International Workshop on Communications and Sensor Networks, vol. 34, pp 499-504, Elsevier 2014. [9] ] Altakhayneh, Walaa A., et al. "Cluster head selection using PBO algorithm in wireless network." 2019IEEE 14th Malaysia International Conference on Communication (MICC). IEEE, 2019.