SlideShare a Scribd company logo
1 of 10
Download to read offline
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
DOI : 10.5121/acij.2012.3504 35
Enhancement of Improved Balanced LEACH for
Heterogeneous Wireless Sensor Networks
Yogesh Kumar1
and Kanwaljit Singh2
1
ECE Department, Guru Nanak Dev Engg. College, Ludhiana
kumar_yogesh1087@rediffmail.com
2
Associate Professor ECE Department, Guru Nanak Dev Engg. College, Ludhiana, India
kjitsingh@gndec.ac.in
Abstract
Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor
nodes where each sensor node has very low battery life. Purpose is to conserve the transmitted energy
from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses
distributed cluster formation & randomized rotation of the cluster head to minimize the network energy
consumption. Our paper is proposing an algorithm which is the enhancement of existing IB-LEACH. It
reduces the energy consumption by using energy bank. This energy bank stores the energy after each
round in both routing and clustering phase which overall increases the life time of the network. In this
approach, ACTIVE_ROUTE_TIMEOUT is also enhanced by shamming the static parameters of
HELLO_INTERVAL, RREQ_RETRIES and NET_DIAMETER. Results are compared through MATLAB
and provide better approach than previous ones.
Keywords
Enhanced, IB-LEACH, Clustering, AODV protocol, Simulation
1. INTRODUCTION
WSANs consists of small nodes called as sensors, these networks provides three essential
functions. Firstly they are used in real time system to monitor physical and environmental
conditions such as humidity, temperature, pressure etc. secondly these networks provide reliable
and efficient communication via wireless network. Third, these networks are used to monitor
and control traffic conditions. These networks can operate on switches and monitor and other
devices. Sensors of wireless networks are disturbed in an Adhoc manner. These networks have
various algorithms and protocols which is having self-organizing capabilities. These sensor
nodes work together to perform various tasks and then gathered information is processed to get
required results.
1.1 Layered Architecture
Layered architecture of wireless sensor network consists of three layers.
1) Base Station (BS): It is a powerful base station from where other layers arrive.
2) Sensor nodes Layer: Layers of sensor nodes around BS.
3) I Layer: All nodes i-hop away from BS
Base station location is very significant and for multihop networks it is very challenging. Size of
sensor nodes can be changed and these changes put a great impact on the wireless sensor
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
36
networks. Various layers are used in this network. Size of sensor nodes puts the effect on
resources of the network. Today sensor networks are used in all fields such as Industrial,
commercial and other number of applications.
Figure1: Layered Architecture of WSN
2. ROUTING IN SENSOR NETWORKS
Routing is a big challenge in wireless sensor networks, because these networks have some
specific characteristics. First sensor nodes are power constrained, they have very less energy and
it is very difficult to reserve the energy while the nodes are transmitting the bits. Second, these
networks are dynamic in nature and must be able to adapt environment changes and
requirements automatically. It may be the case that sometime new nodes are inserted in the
network and previous nodes are deleted from the network. With this position of the networks
may change, which sometimes lead to change in position, energy, tasks and reach ability of the
network. Third these networks must be self-configured because of dynamic environment
changes. Fourth global IP addressing scheme of wired networks can’t be applied to wireless
sensor networks. Fifth, transmitted data contains redundant data as multiple sensors can send
redundant data at the same time. So many protocols are used to conserve the energy level of the
various sensor nodes. Sixth there are so many nodes in the network, so it is very difficult to trace
hundreds, thousands nodes of the networks. Seventh, sensor nodes are application specific in
nature. So protocols must be designed with care.
One Hop Layer
BS
Two Hop Layer
Three Hop Layer
Sensor nodes
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
37
Routing protocol can be divided into two categories. First is flat routing and second is
hierarchical routing. These routing depends on the structure of the network. In flat routing, there
is no ay hierarchy; all the nodes play some role. In hierarchical routing, clustering method is
used in which some nodes are assigned specific functionalities. A cluster is a set of
geographically proximal sensor nodes in which one node acts as a cluster head. These cluster
heads are further organized into hierarchical levels.
2.1 AODV Routing Protocol
This is an On Demand Routing Protocol. In this routes are discovered on the spot. When a
sender wants to send the data then this protocol start to sense the nodes. This protocol gives
quick response to node or link breakage and if there is any change in the network. As this
protocol gives quick response to changing network topology, so this protocol is widely used in
wireless sensor networks. This protocol has two stages:
1) Route Discovery
2) Route Maintenance
This protocol discovers the route by sending RREQ (Route Request) and RREP (Route Reply)
messages. In establishment phase, it uses HELLO messages and RERR (Route Error) messages.
Source sends data to the destination by broadcasting PREQ, with this it finds the destination
routes. If the nodes related the destination route has been expired then a fresh node will be
inserted immediately and this fresh node having a sequence number which is always greater than
RREQ.
Destination route becomes available by sending a unicast message RREP back to the source of
the RREQ. RREQ contains broadcast id, source IP address, source sequence number, destination
IP address, destination sequence number and hop count. Source IP address and broadcast-id
uniquely identifies any RREQ. After receiving the RREP the source node start transmitting the
data to the destination.
All the nodes send HELLO messages periodically to each other. So, that if link breakage occurs
then nodes will be able to inform each other using RERR (route error) message. This breakage
will be informed to source node, after receiving the RERR the source node cancel the route and
if desired start to discover new route. New route is discovered again by sending a broadcast route
request (RREQ) over the network and destination again gives the reply by unicast the message.
The intermediate nodes store this state for a length of time which is given by the parameter
ACTIVE-ROUTETIMEOUT. This time is used to send data, if any link breaks or failure occurs
then time will be expired and AODV protocol cancels the route and again search for new routes.
Default value of ACTIVE-ROUTETIMEOUT is 2 seconds. This is static value which defines
how long a route is kept in the routing table after the last transmission of a packet on this route.
This ACTIVE-ROUTE-TIMEOUT value is selected with care, because a small value can lead to
a new route discovery even if the route is valid and large value can create a risk of sending the
packets on an invalid route. In the first case, the cost is related with new route discovery and in
the second case it is the loss of one or more packets.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
38
3. PREVIOUS CLUSTERING METHOD OF LEACH
The Sensor node which is having 2AA battery can last up to three years, this makes routing a
challenge in wireless sensor networks. To increase the life time of the sensor nodes, clustering
approach is used. Cluster is the combination of various sensor nodes. In this technique cluster
head is selected after every round. Residual energy is selected so that equal energy is given to all
the nodes.
LEACH is a hierarchical clustering algorithm for sensor networks. It has two phases. One is
Cluster set up phase and other is a steady state phase. Each node start with a random number 0
and 1, if the number is less than threshold T(n), the node becomes cluster-head for current round.
Figure2: Clustering Based on LEACH
Every cluster head sends the data to its own cluster head with in the TDMA time schedule, so
that data will be sent timely. It is transmitted in two ways. Firstly, data is transmitted to cluster
head nodes in their assigned TDMA slot and in second step the data aggregation take place from
cluster head to sink. The frame time for this purpose is defined as follows:
Frame Time = (CAT+S) X Ts
CAT - It is the number of time slots for data aggregation and transmission from cluster head to
Base station.
S - Number of nodes during a particular round in TDMA schedule of clusters.
Ts - Time required for sensor node to transmit data frame to their corresponding cluster head.
Sensor nodes move to sleep mode after sending the data, as the sensor node are adaptable.
Sink
Cluster Head
Sensor Nodes
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
39
3.1 IB- LEACH
IB-LEACH transmitted the data through gateways. With this, capacity of the nodes increases
called as life time of the sensor nodes.
Figure3: IB-LEACH using gateway
A Stable Election Protocol) protocol was used to improve the LEACH protocol. It provides
heterogeneity in the wireless sensor networks. This protocol provides LEACH like operation but
this protocol has two different level of energy. Two tier clustering is used in SEP. in this
approach, cluster head election is randomly selected and distributed based on the fraction of
energy of each node assuring a uniform use of the nodes energy. SEP based on weighted election
probabilities of each node to become cluster head according to their respective energy. In this
some NCG are selected as cluster head and others as gateways. IB-LEACH distributes the
energy load evenly among various sensor nodes. IB_LEACH is a self-organizing, adaptive
clustering protocol. It does randomized rotation of the high-energy cluster-head position in such
a way that various sensor nodes drain the energy from a single sensor. At any time sensor nodes
can elect themselves to be a gateway. Base station confirms gateway nodes whether the node
elected are suitable for gateway or not. Gateway nodes or cluster head nodes broadcast their
status via advertisement message (ADV) to the other sensor nodes in the network. Non gateway
nodes can also elect themselves as a cluster head with a certain probability. These cluster head
nodes broadcast their status via advertisement message (ADV) to the other sensor nodes in the
network.
The non-cluster-head nodes wait the cluster-head announcement from other nodes. Each sensor
node determines to which cluster it wants to belong by choosing the cluster-head that requires
the minimum communication energy, and send the join-request (Join-REQ) message to the
chosen cluster head, and the cluster-head nodes wait for join-request message from other nodes.
NCG selected
as gateway
NCG selected
as cluster head
Sink
Cluster Head
Sensor Nodes
Gateway
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
40
4. PROPOSED WORK
4.1 Enhanced IB- LEACH
Proposed method is the extension of existing IB-LEACH. In this method, NCG nodes are
distributed based on the cluster head which reduces the energy consumption of the cluster head
and thus increases the life time of the network. Results are checked through MATLAB, which
shows that enhanced IB-LEACH gives better performance than the existing IB- LEACH.
4.2 MATLAB parameters
100m×100m region of 100 sensor nodes are scattered randomly. MATLAB is used to implement
the simulation. Fair comparison is done by introducing advanced energy levels to LEACH and
SEP nodes with same settings as in IBLEACH protocol, so as to assess the performance of these
protocols in the presence of heterogeneity.
4.3 MATLAB Results:
a) CHs are shown from Base Station and chain leader.
Figure 4: Base Station CHs
Normal nodes are combined together to make a cluster head.
b) Comparison is done using various different parameters as shown in graph.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
41
Figure 5: comparison with different data
c) Various parameters are used to show the difference between existing and enhanced IB-
LEACH. This graph is between numbers of alive nodes versus number of rounds.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
42
Figure 5: Alive nodes Vs. Round
d) Proposed IB-LEACH: Enhanced IB-LEACH is shown in two graphs 6(a) and 6(b) for
both homogenous and heterogeneous networks.
Figure 6a): Enhanced IB-LEACH
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
43
Figure 6b): Enhanced IB-LEACH
5. CONCLUSION AND FUTURE WOK
Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional
sensor nodes where each sensor node has very low battery life. Various energy efficient
algorithms have been designed for this. LEACH uses distributed cluster formation &
randomized rotation of the cluster head to minimize the network energy consumption. This paper
is proposing an algorithm which is the enhancement of existing IB-LEACH. MATLAB is used
to implement the simulation. Fair comparison is done by introducing advanced energy levels to
LEACH and SEP nodes with same settings as in IBLEACH protocol, so as to assess the
performance of these protocols in the presence of heterogeneity. Enhanced IB-LEACH is
designed for both homogenous and heterogeneous networks. The field of wireless sensor
network is very challenging and recent. Various static methods and parameters can improve the
performance of the network. Research can be done on choice of cluster head. Cluster head can
be chosen based on the density of nodes.
REFERENCES
[1] G. Smaragdakis, I. Matta, A. Bestavros, SEP: A Stable Election Protocol for clustered heterogeneous
wireless sensor networks, in: Second International Workshop on Sensor and Actor Network Protocols and
Applications (SANPA 2004), 2004.
[2] W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan “An application-specific protocol
architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1,
no. 4, pp. 660–670, October 2002.
[3] A. HosseinAlipour, D. KeyKhosravi, A.Mirzaei Somarin “New method to decrease probability of
failure nodes in WSNs”, (IJCNS) International Journal of Computer and Network Security,Vol. 2, No. 2,
February 2010 .
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
44
[4] V. Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A
comparative study,” in Proceedings of 2004 IEEE International Conference on Communications (ICC
2004), June 2004.
[5] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE
Communications Magazine, vol. 40, no. 8, pp. 102–114, August 2002.
[6] I.F. Akyildiz, W.J. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey,
Computer Networks 38 (2002) 393–422.
[7] K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, Ad Hoc Networks
3 (3) (2005) 325–349.
[8] Gaurav Gupta, Mohamed Younis "Fault-Tolerant Clustering of Wireless Sensor Networks" 2003 IEEE
[9] Ameer Ahmed Abbasi and Mohamed Younis: A survey on clustering algorithms for wireless sensor
networks,
Authors
Yogesh Kumar is doing part time M.TECH from India's most reputed Institute Guru Nanak
Dev Engg. College Ludhiana, situated in Punjab. He is also working as an Assistant Professor in ECE
Department in Ludhiana College of Engg. And Technology, Punjab. He had total 8 years of experience in
Teaching and Industry. His area of interest is Optical Communication and Wireless Sensor Networks.
Kanwaljit Singh is working as an Associate Professor in India's most reputed Institute Guru
Nanak Dev Engg. College Ludhiana, situated in Punjab. He had done his M.E. in Electronics in 1992 and
having 25 years of teaching experience. His area of interest is Optical Communications, Microprocessors.

More Related Content

What's hot

Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approachShubhi Singh chauhan
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkEditor IJCATR
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 

What's hot (20)

Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Routing
RoutingRouting
Routing
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approach
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor Network
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
69 122-128
69 122-12869 122-128
69 122-128
 

Similar to Enhanced IB-LEACH Algorithm Improves WSN Lifetime

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
De31486489
De31486489De31486489
De31486489IJMER
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...IRJET Journal
 

Similar to Enhanced IB-LEACH Algorithm Improves WSN Lifetime (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
De31486489
De31486489De31486489
De31486489
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 
B05630814
B05630814B05630814
B05630814
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 

Enhanced IB-LEACH Algorithm Improves WSN Lifetime

  • 1. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 DOI : 10.5121/acij.2012.3504 35 Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Networks Yogesh Kumar1 and Kanwaljit Singh2 1 ECE Department, Guru Nanak Dev Engg. College, Ludhiana kumar_yogesh1087@rediffmail.com 2 Associate Professor ECE Department, Guru Nanak Dev Engg. College, Ludhiana, India kjitsingh@gndec.ac.in Abstract Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Purpose is to conserve the transmitted energy from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the cluster head to minimize the network energy consumption. Our paper is proposing an algorithm which is the enhancement of existing IB-LEACH. It reduces the energy consumption by using energy bank. This energy bank stores the energy after each round in both routing and clustering phase which overall increases the life time of the network. In this approach, ACTIVE_ROUTE_TIMEOUT is also enhanced by shamming the static parameters of HELLO_INTERVAL, RREQ_RETRIES and NET_DIAMETER. Results are compared through MATLAB and provide better approach than previous ones. Keywords Enhanced, IB-LEACH, Clustering, AODV protocol, Simulation 1. INTRODUCTION WSANs consists of small nodes called as sensors, these networks provides three essential functions. Firstly they are used in real time system to monitor physical and environmental conditions such as humidity, temperature, pressure etc. secondly these networks provide reliable and efficient communication via wireless network. Third, these networks are used to monitor and control traffic conditions. These networks can operate on switches and monitor and other devices. Sensors of wireless networks are disturbed in an Adhoc manner. These networks have various algorithms and protocols which is having self-organizing capabilities. These sensor nodes work together to perform various tasks and then gathered information is processed to get required results. 1.1 Layered Architecture Layered architecture of wireless sensor network consists of three layers. 1) Base Station (BS): It is a powerful base station from where other layers arrive. 2) Sensor nodes Layer: Layers of sensor nodes around BS. 3) I Layer: All nodes i-hop away from BS Base station location is very significant and for multihop networks it is very challenging. Size of sensor nodes can be changed and these changes put a great impact on the wireless sensor
  • 2. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 36 networks. Various layers are used in this network. Size of sensor nodes puts the effect on resources of the network. Today sensor networks are used in all fields such as Industrial, commercial and other number of applications. Figure1: Layered Architecture of WSN 2. ROUTING IN SENSOR NETWORKS Routing is a big challenge in wireless sensor networks, because these networks have some specific characteristics. First sensor nodes are power constrained, they have very less energy and it is very difficult to reserve the energy while the nodes are transmitting the bits. Second, these networks are dynamic in nature and must be able to adapt environment changes and requirements automatically. It may be the case that sometime new nodes are inserted in the network and previous nodes are deleted from the network. With this position of the networks may change, which sometimes lead to change in position, energy, tasks and reach ability of the network. Third these networks must be self-configured because of dynamic environment changes. Fourth global IP addressing scheme of wired networks can’t be applied to wireless sensor networks. Fifth, transmitted data contains redundant data as multiple sensors can send redundant data at the same time. So many protocols are used to conserve the energy level of the various sensor nodes. Sixth there are so many nodes in the network, so it is very difficult to trace hundreds, thousands nodes of the networks. Seventh, sensor nodes are application specific in nature. So protocols must be designed with care. One Hop Layer BS Two Hop Layer Three Hop Layer Sensor nodes
  • 3. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 37 Routing protocol can be divided into two categories. First is flat routing and second is hierarchical routing. These routing depends on the structure of the network. In flat routing, there is no ay hierarchy; all the nodes play some role. In hierarchical routing, clustering method is used in which some nodes are assigned specific functionalities. A cluster is a set of geographically proximal sensor nodes in which one node acts as a cluster head. These cluster heads are further organized into hierarchical levels. 2.1 AODV Routing Protocol This is an On Demand Routing Protocol. In this routes are discovered on the spot. When a sender wants to send the data then this protocol start to sense the nodes. This protocol gives quick response to node or link breakage and if there is any change in the network. As this protocol gives quick response to changing network topology, so this protocol is widely used in wireless sensor networks. This protocol has two stages: 1) Route Discovery 2) Route Maintenance This protocol discovers the route by sending RREQ (Route Request) and RREP (Route Reply) messages. In establishment phase, it uses HELLO messages and RERR (Route Error) messages. Source sends data to the destination by broadcasting PREQ, with this it finds the destination routes. If the nodes related the destination route has been expired then a fresh node will be inserted immediately and this fresh node having a sequence number which is always greater than RREQ. Destination route becomes available by sending a unicast message RREP back to the source of the RREQ. RREQ contains broadcast id, source IP address, source sequence number, destination IP address, destination sequence number and hop count. Source IP address and broadcast-id uniquely identifies any RREQ. After receiving the RREP the source node start transmitting the data to the destination. All the nodes send HELLO messages periodically to each other. So, that if link breakage occurs then nodes will be able to inform each other using RERR (route error) message. This breakage will be informed to source node, after receiving the RERR the source node cancel the route and if desired start to discover new route. New route is discovered again by sending a broadcast route request (RREQ) over the network and destination again gives the reply by unicast the message. The intermediate nodes store this state for a length of time which is given by the parameter ACTIVE-ROUTETIMEOUT. This time is used to send data, if any link breaks or failure occurs then time will be expired and AODV protocol cancels the route and again search for new routes. Default value of ACTIVE-ROUTETIMEOUT is 2 seconds. This is static value which defines how long a route is kept in the routing table after the last transmission of a packet on this route. This ACTIVE-ROUTE-TIMEOUT value is selected with care, because a small value can lead to a new route discovery even if the route is valid and large value can create a risk of sending the packets on an invalid route. In the first case, the cost is related with new route discovery and in the second case it is the loss of one or more packets.
  • 4. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 38 3. PREVIOUS CLUSTERING METHOD OF LEACH The Sensor node which is having 2AA battery can last up to three years, this makes routing a challenge in wireless sensor networks. To increase the life time of the sensor nodes, clustering approach is used. Cluster is the combination of various sensor nodes. In this technique cluster head is selected after every round. Residual energy is selected so that equal energy is given to all the nodes. LEACH is a hierarchical clustering algorithm for sensor networks. It has two phases. One is Cluster set up phase and other is a steady state phase. Each node start with a random number 0 and 1, if the number is less than threshold T(n), the node becomes cluster-head for current round. Figure2: Clustering Based on LEACH Every cluster head sends the data to its own cluster head with in the TDMA time schedule, so that data will be sent timely. It is transmitted in two ways. Firstly, data is transmitted to cluster head nodes in their assigned TDMA slot and in second step the data aggregation take place from cluster head to sink. The frame time for this purpose is defined as follows: Frame Time = (CAT+S) X Ts CAT - It is the number of time slots for data aggregation and transmission from cluster head to Base station. S - Number of nodes during a particular round in TDMA schedule of clusters. Ts - Time required for sensor node to transmit data frame to their corresponding cluster head. Sensor nodes move to sleep mode after sending the data, as the sensor node are adaptable. Sink Cluster Head Sensor Nodes
  • 5. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 39 3.1 IB- LEACH IB-LEACH transmitted the data through gateways. With this, capacity of the nodes increases called as life time of the sensor nodes. Figure3: IB-LEACH using gateway A Stable Election Protocol) protocol was used to improve the LEACH protocol. It provides heterogeneity in the wireless sensor networks. This protocol provides LEACH like operation but this protocol has two different level of energy. Two tier clustering is used in SEP. in this approach, cluster head election is randomly selected and distributed based on the fraction of energy of each node assuring a uniform use of the nodes energy. SEP based on weighted election probabilities of each node to become cluster head according to their respective energy. In this some NCG are selected as cluster head and others as gateways. IB-LEACH distributes the energy load evenly among various sensor nodes. IB_LEACH is a self-organizing, adaptive clustering protocol. It does randomized rotation of the high-energy cluster-head position in such a way that various sensor nodes drain the energy from a single sensor. At any time sensor nodes can elect themselves to be a gateway. Base station confirms gateway nodes whether the node elected are suitable for gateway or not. Gateway nodes or cluster head nodes broadcast their status via advertisement message (ADV) to the other sensor nodes in the network. Non gateway nodes can also elect themselves as a cluster head with a certain probability. These cluster head nodes broadcast their status via advertisement message (ADV) to the other sensor nodes in the network. The non-cluster-head nodes wait the cluster-head announcement from other nodes. Each sensor node determines to which cluster it wants to belong by choosing the cluster-head that requires the minimum communication energy, and send the join-request (Join-REQ) message to the chosen cluster head, and the cluster-head nodes wait for join-request message from other nodes. NCG selected as gateway NCG selected as cluster head Sink Cluster Head Sensor Nodes Gateway
  • 6. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 40 4. PROPOSED WORK 4.1 Enhanced IB- LEACH Proposed method is the extension of existing IB-LEACH. In this method, NCG nodes are distributed based on the cluster head which reduces the energy consumption of the cluster head and thus increases the life time of the network. Results are checked through MATLAB, which shows that enhanced IB-LEACH gives better performance than the existing IB- LEACH. 4.2 MATLAB parameters 100m×100m region of 100 sensor nodes are scattered randomly. MATLAB is used to implement the simulation. Fair comparison is done by introducing advanced energy levels to LEACH and SEP nodes with same settings as in IBLEACH protocol, so as to assess the performance of these protocols in the presence of heterogeneity. 4.3 MATLAB Results: a) CHs are shown from Base Station and chain leader. Figure 4: Base Station CHs Normal nodes are combined together to make a cluster head. b) Comparison is done using various different parameters as shown in graph.
  • 7. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 41 Figure 5: comparison with different data c) Various parameters are used to show the difference between existing and enhanced IB- LEACH. This graph is between numbers of alive nodes versus number of rounds.
  • 8. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 42 Figure 5: Alive nodes Vs. Round d) Proposed IB-LEACH: Enhanced IB-LEACH is shown in two graphs 6(a) and 6(b) for both homogenous and heterogeneous networks. Figure 6a): Enhanced IB-LEACH
  • 9. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 43 Figure 6b): Enhanced IB-LEACH 5. CONCLUSION AND FUTURE WOK Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the cluster head to minimize the network energy consumption. This paper is proposing an algorithm which is the enhancement of existing IB-LEACH. MATLAB is used to implement the simulation. Fair comparison is done by introducing advanced energy levels to LEACH and SEP nodes with same settings as in IBLEACH protocol, so as to assess the performance of these protocols in the presence of heterogeneity. Enhanced IB-LEACH is designed for both homogenous and heterogeneous networks. The field of wireless sensor network is very challenging and recent. Various static methods and parameters can improve the performance of the network. Research can be done on choice of cluster head. Cluster head can be chosen based on the density of nodes. REFERENCES [1] G. Smaragdakis, I. Matta, A. Bestavros, SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks, in: Second International Workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004), 2004. [2] W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, October 2002. [3] A. HosseinAlipour, D. KeyKhosravi, A.Mirzaei Somarin “New method to decrease probability of failure nodes in WSNs”, (IJCNS) International Journal of Computer and Network Security,Vol. 2, No. 2, February 2010 .
  • 10. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 44 [4] V. Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A comparative study,” in Proceedings of 2004 IEEE International Conference on Communications (ICC 2004), June 2004. [5] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, August 2002. [6] I.F. Akyildiz, W.J. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks 38 (2002) 393–422. [7] K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, Ad Hoc Networks 3 (3) (2005) 325–349. [8] Gaurav Gupta, Mohamed Younis "Fault-Tolerant Clustering of Wireless Sensor Networks" 2003 IEEE [9] Ameer Ahmed Abbasi and Mohamed Younis: A survey on clustering algorithms for wireless sensor networks, Authors Yogesh Kumar is doing part time M.TECH from India's most reputed Institute Guru Nanak Dev Engg. College Ludhiana, situated in Punjab. He is also working as an Assistant Professor in ECE Department in Ludhiana College of Engg. And Technology, Punjab. He had total 8 years of experience in Teaching and Industry. His area of interest is Optical Communication and Wireless Sensor Networks. Kanwaljit Singh is working as an Associate Professor in India's most reputed Institute Guru Nanak Dev Engg. College Ludhiana, situated in Punjab. He had done his M.E. in Electronics in 1992 and having 25 years of teaching experience. His area of interest is Optical Communications, Microprocessors.