SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 4, August 2021, pp. 3106∼3113
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3106-3113 r 3106
Improved LEACH protocol for increasing the lifetime of
WSNs
Ikram Daanoune, Abdennaceur Baghdad, Abdelhakim Ballouk
Department of Electrical Engineering, Laboratory of Electronics, Energy, Automatics and Data Processing, Faculty of
Sciences and Techniques of Mohammedia, Hassan II University of Casablanca, Morocco
Article Info
Article history:
Received Sep 5, 2020
Revised Sep 29, 2020
Accepted Dec 5, 2020
Keywords:
Energy-efficiency
Improved LEACH
Network lifetime
Routing protocol
WSN
ABSTRACT
Recently, wireless sensor network (WSN) is taking a high place in several applications:
military, industry, and environment. The importance of WSNs in current applications
makes the WSNs the most developed technology at the research level and especially
in the field of communication and computing. However, WSN’s performance deals
with a number of challenges. Energy consumption is the most considerable for many
researchers because nodes use energy to collect, treat, and send data, but they have re-
stricted energy. For this reason, numerous efficient energy routing protocols have been
developed to save the consumption of power. Low energy adaptive clustering hierarchy
(LEACH) is considered as the most attractive one in WSNs. In the present document,
we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and
in data transmission, then we propose an enhanced protocol. The proposed algorithm
aims to improve energy consumption and prolong the lifetime of WSN through se-
lecting CHs depending on the remaining power, balancing the number of nodes in
clusters, determining abandoned nodes in order to send their data to the sink. Then
CHs choose the optimal path to achieve the sink. Simulation results exhibit that the
enhanced method can decrease the consumption of energy and prolong the life-cycle
of the network.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ikram Daanoune
Department of Electrical Engineering
Laboratory of Electronics, Energy, Automatics and Data Processing, Hassan II University
FST Mohammedia-Casablanca (B.P. 146 Mohammedia 20650 Morocco)
Email: ikrame.daanoune-etu@etu.univh2c.ma
1. INTRODUCTION
Recently, information technology has seen enormous progress in all domains, everything has been
digitized. WSN offers a better solution for efficiently gathering data from anywhere, even difficult areas where
human activity is impossible [1]. Various domains use WSN to ameliorate their production or quality of service
(QoS) [2]. Each sensor node has at least one sensor that serves to collect data. These micro-sensor nodes char-
acterize by self-configuration and self-adaptation, generally, they are alimented by non-rechargeable batteries.
Numerous applications use the WSN by reason of the weak-cost, the self-organization of nodes, the sensing
ability of sensors, the miniature dimension of the node which allows it to be deployed in hard environments to
supervise different types of physical and environmental conditions, easy in positioning, scattering over an large
region and giant fault tolerance [3–5]. However, the WSN faces several issue related to the power source.
The great use of energy in the various units of the sensor node limits the lifespan of these batteries,
which limits the lifespan of the entire network because batteries are the principal reasons for the lifetime of
Journal homepage: http://ijece.iaescore.com
Int J Elec & Comp Eng ISSN: 2088-8708 r 3107
the sensor node [6]. Consequently, the major constraint within the WSN is energy consumption. Therefore, it
is requisite to conserve energy in order to prolong the network life cycle. For this reason, numerous research
problems are defined as optimization issues referred at discovery useful design strategies, like deployment
coverage issue, data routing problem, cluster-head selection [7]. Thus several routing protocols have been
scheduled by researchers to reduce the energy consumption of network nodes [8, 9].
Routing protocols are divided mainly to 3 classes: hierarchical, data-centric, and location [9] as we
can see in Figure 1. Each class contains several protocols, such as LEACH [10], SPIN [11], HEED [12], MG-
LEACH [13], EDMHT [14], MBER [15], BRE-LEACH [16], and so on. Among the existing and the famous
routing protocols, there is LEACH protocol. LEACH has been the first and the oldest algorithm, it has been
considered as it is an energy-efficient clustering protocol which partitions the network to many groups of sensor
nodes. Thus, in any group, there are common nodes responsible to collect data and a randomly elected cluster
head which aggregates cluster data, compresses it then transmits it toward the collector. Even if LEACH aims
to extend the duration of the network, it remains limited by many constraints, such as the random selection
of CHs, single-hop between CHs and the sink regardless of the space and the remaining power. To improve
the energy efficiency in WSN various energy efficient routing protocol are proposed, such as EESRA [17],
O-LEACH [18], BPA-CRP [19], and so forth.
In this work, we suggest an ameliorated efficient-energy routing approach based on the clustering
method. This work is different from other existing studies because it is based on the remaining energy to select
CHs, it limits the number of nodes in each cluster which serves to balance the energy of the CHs, determines
abandoned nodes that can not join any cluster in order to send their data to the sink. Then every CH chooses the
optimal path to achieve the sink. Our enhanced protocol serves to prolong the life cycle of the network more
than LEACH by minimizing energy consumption.
The organization of the content of the present document is as pursue: the second part exposes the
related work. The third part introduces the proposed work. The fourth part exhibits the simulation results of
our protocol compared with the LEACH algorithm. A discussion of results is given in the fifth part. Finally,
the sixth part presents a conclusion of the paper.
Figure 1. Routing protocols classification
2. RELATED WORK
LEACH is the fundamental and the oldest protocol of hierarchical routing protocols, focused on clus-
tering [20], suggested by Heinzelman et al. in 2000 [10]. LEACH is characterized by the self-adaptation as well
as the self-organization; nodes organize themselves into clusters [21]. LEACH generates clusters in the net-
work and it provides a turn conception. Each turn includes two main stages. In the first stage, CHs are selected
randomly according to the threshold function defined in (1), then clusters are established in self-adaptation
[22]. In the second stage, it includes communication between normal nodes and their corresponding CHs, thus
communication between CHs and the collector. So, this last stage presents data transmission.
In the cluster formation, LEACH adopts a probability function to elect CHs. Each sensor node makes
choice an aleatory value betwixt zero and one. This node turns into a CH in the present period if the random
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3108 r ISSN: 2088-8708
value is inferior to the threshold function described in (1). Otherwise, it becomes a normal node [23]. Thereby,
normal nodes are looking for their CHs depending on the received signal from CHs.
TL(s) =
(
PL
1−PL∗(i mod(1/PL)) , s ∈ C
0 else
(1)
Here PL represents the CHs probability in the network, i is the number of the period; C is the number
of the sensor nodes that have not become CH in the previously 1/PL iterations.
In the stable stage, Once CHs are elected and clusters are formed, the data transfer begins. Every
normal node gathers its environment information, forward it to its CH. When data achieve CHs, these latter
aggregate their cluster data, then send them to the sink.
LEACH-centralized (LEACH-C) [24] is a centralized clustering algorithm. It is an enhancement of
the conventional LEACH approach. With similar to LEACH, LEACH-C splits every round into a set-up and
steady-state phase. In the beginning phase, unlike LEACH, in LEACH-C the base station (BS) selects CHs
at the hand of the average energy of nodes and the location. Based on this information, alone the nodes with
higher energy can be a CH.
Balanced residual energy-LEACH (BRE-LEACH) [16] selects CHs in terms of the remaining energy.
Then, it selects the CH that has the remaining energy more than the average remaining energy and the distance
to the BS less than the average distance as a root CH. This root is responsible to aggregate all CHs data and
sends them to the BS. Thereby, in the BRE-LEACH, CHs use the multi-hop technique to achieve the root CH.
3. THE PROPOSED PROTOCOL
In the LEACH protocol, the aleatory choice of CHs in the network results in an energy imbalance of
nodes, and not all nodes have the same opportunity to become CH. Thus, in the LEACH, the LEACH-C, and the
BRE-LEACH algorithms, the number of nodes in clusters is not the same, which creates an energy imbalance,
CHs with more cluster members can exhaust their energy early than others. Thereby, in these protocols, nodes
determine their clusters according to the power of the received signal from CHs. So, data of nodes that have
not accessed any cluster cannot achieve the BS.
For these causes, we propose in this paper a new LEACH-based routing protocol, it aims to minimize
energy consumption and extend the network lifetime. This approach is a new approach for picking out CHs
in the network depending on the residual energy of the sensor nodes and establishing clusters. Thereby, the
abandoned nodes that can not reach any cluster, can also send their data to the sink. Furthermore, it proposes
the multi-hop technique between CHs to choose the optimal route to the BS or the single hop directly to the sink
if it is the optimal path. The proposed approach supposes that in each round, there are clusters. The proposed
protocol introduces two phases:
3.1. First phase
The initial phase concerns CH selection and clusters formation. To save energy in the WSN, this new
approach proposes to select the CHs according to the remaining power of nodes. Thus, it forms clusters based
on a determined amount of nodes. The CH formation will be every round. At the starting of every iteration,
each sensor node designates an arbitrary value at interval zero and one. In case that, the chosen number is more
than the threshold function defined in (2), which is proposed in [16, 25], then this sensor node will be as a
common node (CN). In the other case, the sensor node will be picked out as a CH in the current iteration.
Tpr(s) =
(
PL
1−PL∗(i %(1/PL)) ∗ Erem
Ei
, s ∈ C
0 otherwise
(2)
Here PL represents the CHs probability in the network, i is the number of the period; C is a set of
sensor nodes that have not become CH in the previously 1/PL iterations. Ei presents the beginning energy of
nodes and Erem is the remaining energy at the i iteration.
Once CHs are elected, common nodes are looking for their corresponding CHs according to the power
of the received signal from CHs. The number of nodes in each cluster is determined Ncl in terms of the total
amount of nodes in the network and the number of CH desired.
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3109
Each common node constructs its table of CHs according to the received announcement message from
CHs. This table contains the distance between this node and the CHs. For selecting the CH corresponding,
the proposed approach suggests that the distance between the sensor node and its CH belongs will be less than
the threshold distance do defined in (3), and this CH has a number of nodes less than Ncl. In this way, the
node forwards a message to join the CH with the lowest distance in its table if there is a frame available in the
TDMA. On the other hand, when the first cluster in the table is filled, the node does the same procedure to the
second CH with the lowest distance, and so forth.
d0 =
s
Efs
Emp
(3)
Where, Efs is the energy consumed by the amplifier in the free space, and Emp in the multipath propagation.
Once clusters are established, nodes with distances in their tables equal to or greater than do, or the
availability on the TDMA schedule is not available, they can not join any cluster. These nodes called abandoned
nodes (ANs).
3.2. Second phase
Once the clusters are formed and ANs are determined, the second phase starts. This phase presents
the data transmission phase. Each CH receives data from the cluster member (that collects information from
the surrounding environment) and aggregates it. Then, every CH uses the multi-hop technique between CHs to
choose the optimal path to the BS or the single hop directly to the sink if it is the optimal route. Furthermore,
ANs can also send their data to the sink through the single hop. Finally, the closest CH to the sink sends its
own information with the aggregated packet of others CHs to the sink. Figure 2 illustrates the flow diagram of
the proposed protocol.
Figure 2. The flowchart of the proposed protocol
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3110 r ISSN: 2088-8708
4. SIMULATION AND RESULTS
In that part, we are used simulation to analyze and simulate the proposed protocol performance. Mat-
lab simulator is used to evaluate the proposed protocol and LEACH to put up a comparative analysis between
the proposed algorithm and the conventional LEACH algorithm. We considered 80 sensor nodes are distributed
haphazardly in the space of 100*100 m2
. The cluster probability is 5%, and the initial energy is 0.5 Joule. We
considered one BS that located outside the network with coordinates (50, 150), nodes and the BS are static, then
sensor nodes are homogeneous (having the same initial energy). Table 1 summarizes the simulation parameters
that we have made in evaluating the LEACH and the proposed protocol.
Table 1. The simulation criterion value
Parameter Value
Sensor nodes Number 80
Area 100 m*100 m
The cluster probability (PL) 5%
Initial energy (Ei) 0.5 J
BS location (x,y) (50,150)
ET x = ERx 50 nJ/bit
Efs 10 pJ/bit/m2
Emp 0.0013 pJ/bit/m4
Energy of data aggregation 5 nJ/bit
Size of packet 4000 bits
Number of rounds executed 2500
Figure 3 (a) shows the simulation results of the suggested approach as well as those of the origi-
nal LEACH according to the network lifetime metric. From these results, we drew the diagram depicted in
Figure 3 (b). The chart above shows a significant enhancement in the proposed protocol. In LEACH, the first
node die (FND) at the iteration 846th
while in the proposed protocol, the FND at the turn 609th
. Furthermore,
at the round 1003rd
, only the half of nodes that stay alive in the LEACH protocol, whereas in the developed
algorithm, the half node die (HND) at the 1714th
iteration. Thereby, In LEACH, at the turn 1615th
just one
node stills alive, so the network is almost finished, while at this round, more than the half nodes stay alive in the
proposed protocol (46 nodes). Finally, from the round 2499th
, 15 nodes remain alive in the proposed approach,
on the contrary, the network in LEACH is finished.
(a) (b)
Figure 3. The network lifetime in the LEACH and the proposed protocol, (a) Alive nodes in the network,
(b) Diagram of dead node in the network
Figure 4 compares the proposed solution against LEACH according to the remaining energy metric.
The remaining energy is the difference between the initial energy and the consumed energy. From these curves,
we can see that the remaining energy of total sensor nodes in the proposed protocol is gradually decrease
compared to the classical LEACH approach. Then, at the round 1200, it is almost null in the LEACH while
in the proposed protocol, it is still more than 15% of the initial energy of all the network nodes. From these
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3111
results, we can see that the proposed protocol in this paper can optimize the energy consumption and extend
the stability of the network better than the original LEACH protocol.
Figure 4. Total remaining energy of nodes in LEACH and the proposed protocol
5. DISCUSSION OF RESULTS
The LEACH protocol ameliorates the energy-efficiency compared to classical protocols used in WSN.
The LEACH-C uses the centralization method to improve the traditional LEACH approach by enhancing the
CH selection. The BRE-LEACH enhances the conventional LEACH algorithm by selecting CH according to
the residual energy, and picks out a root. But each of these protocols has several limitations. Table 2 illustrates
the advantages and disadvantages of the discussed protocols.
Table 2. The advantages and disadvantages of the proposed protocol with others protocols
Protocol Advantages Disadvantages
LEACH Improves the life-cycle of the network through us-
ing the TDMA schedule.
Selects CHs aleatory/ Uses the single hop.
Decrease energy dissipation of nodes. The number of nodes in clusters is randomly.
Decreases the no. of transmission packets. Abandoned nodes can not send their data to the BS
LEACH-C The centralization provides a better distribution. The centralization method needs an extra energy.
Achieves a large no. of turns in a minor area Uses the single-hop technique.
CH selection in accordance to remaining power. The number of nodes in each cluster is unbalanced.
Abandoned nodes data can not achieve the BS.
BRE-LEACH Enhances the network lifetime. No. of nodes in clusters is unbalanced.
CH choice depending on the residual energy. Abandoned nodes can not send their data to the BS.
Chooses a root CH according to the residual energy
and the distance to the BS
All CHs send aggregated data to the root even if the
BS is closer than the root.
The Proposed Protocol CH selection according to the remaining energy.
No. of nodes in cluster can not exceed a maximum. Abandoned nodes send data directly to the BS.
Abandoned nodes can send data to the BS. Does not consider other QoS parameters.
CHs use either the single or the multi-hop to choice
the optimal path.
6. CONCLUSION AND FUTURE WORK
In the present work, we have suggested a new approach for improving the performance of the con-
ventional LEACH protocol. Instead of selecting CHs randomly in LEACH, the developed protocol uses the
remaining energy to decide which nodes become as CH in the monitoring area. Furthermore, in LEACH, the
total amount of nodes in the clusters is not the same, which leads to an energy consumption imbalance, the
proposed protocol determines the maximum amount of nodes in every cluster. Rather than forwarding the ag-
gregated packets by CHs to the BS in a single hop, the proposed solution uses the multi-hop technique. The
result of simulation illustrates that the proposed approach prolongs the life-cycle of WSNs and decreases energy
consumption. For future extensions to this work, we intend to compare this protocol to other enhanced-LEACH
protocols. Thereby, we hope to make various enhancements in the present work such as determining the optimal
number of clusters in the network, enhancing the throughput, and other quality of service parameters.
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3112 r ISSN: 2088-8708
REFERENCES
[1] I. Daanoune, A. Baghdad, and A. Ballouk, “An enhanced energy-efficient routing protocol for wireless sensor net-
work,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5462-5469, 2020,
doi: 10.11591/ijece.v10i5.pp5462-5469.
[2] A. Mahboub, E. M. E., M. Arioua, H. Barkouk, Y. El Assari, and A. El Oualkadi, “An energy- efficient clustering
protocol using fuzzy logic and network segmentation for heterogeneous WSN,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4192-4203, Oct. 2019.
[3] T.-P. Hong and G.-N. Shiu, “Solving the K-of-N Lifetime Problem by PSO,” International Journal of Engineering,
Science and Technology, vol. 1, no. 1, pp. 136–147, 2009.
[4] S. Alnajdi and F. Bajaber, “Determination of the K-optimal number of chains-based routing protocol formed by the
K-Means algorithm for the WSN,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS),
vol. 19, no. 2, pp. 917–930, 2020.
[5] P. A. Y and R. Balakrishna, “Implementation of optimal solution for network lifetime and energy consumption metrics
using improved energy efficient LEACH protocol in MANET,” TELKOMNIKA Telecommunication, Computing,
Electronics and Control, vol. 17, no. 4, pp. 1758–1766, Aug. 2019.
[6] N. A., N. J., and L. A. Raj, “Comparative analysis of energy based optimized dynamic source mul- tipath routing
protocol in WSNs,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 1,
pp. 441-455, Oct. 2019.
[7] C.-W. Tsai, T.-P. Hong, and G.-N. Shiu, “Metaheuristics for the Lifetime of WSN: A Review,” IEEE Sensors Journal,
vol. 16, no. 9, pp. 2812–2831, May 2016.
[8] R. K. Kodali and N. K. Aravapalli, “Multi-level LEACH protocol model using NS-3,” in 2014 IEEE International
Advance Computing Conference (IACC), Feb. 2014, pp. 375–380.
[9] I. Daanoune, A. Baghdad, and A. Balllouk, “A comparative study between ACO-based protocols and
PSO-based protocols in WSN,” in 7th Mediterranean Congress of Telecommunications, 2019, pp. 1–4,
doi: 10.1109/CMT.2019.8931320.
[10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless
microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,
vol. 1, 2000, p. 10.
[11] W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor
networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and network-
ing, 1999, pp. 174–185.
[12] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor net-
works,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, Oct. 2004, doi: 10.1109/TMC.2004.41.
[13] H. Ouldzira, H. Lagraini, M. Mouhsen, A.and Chhiba, and A. Tabyaoui, “MG-leach: an enhanced leach protocol for
wireless sensor network,” IJECE, vol. 9, no. 4, pp. 3139-3145, 2019.
[14] E. A. and I. M., “EDMHT-LEACH: Enhancing the performance of the DMHT-LEACH protocol for wireless sensor
networks,” in 16th Conference: Networking in Education and Research, 2017, pp. 1–6.
[15] M. Al-Jumaili and B. Karimi, “Maximum bottleneck energy routing (MBER) — An energy efficient routing
method for wireless sensor networks,” in 2016 IEEE Conference on Wireless Sensors (ICWiSE), 2016, pp. 38–44,
doi: 10.1109/ICWISE.2016.8187759.
[16] I. Daanoune, A. Baghdad, and A. Balllouk, “BRE-LEACH: A New Approach to Extend the Lifetime Of WSN,” in
Third Inter. Conference on Intelligent Computing in Data Sciences, IEEE, 2019, pp. 1–6.
[17] E. F. A. Elsmany, M. A. Omar, T.-C. W., and A. A. Altahir, “EESRA: Energy Efficient Scalable Routing Algorithm
for Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 96974–96983, 2019.
[18] W. Jerbi, A. Guermazi, and H. Trabelsi, “O-LEACH of Routing Protocol for Wireless Sensor Networks,”
in 13th International Conference on Computer Graphics, Imaging and Visualization, 2016, pp. 399–404,
doi: 10.1109/CGiV.2016.84.
[19] K. A. Darabkh, M. Z. El-Yabroudi, and A. H. El-Mousa, “BPA-CRP: A balanced power-aware clustering and routing
protocol for wireless sensor networks,” Ad Hoc Networks, vol. 82, pp. 155– 171, 2019.
[20] S. Smys, R. Bestak, J. I.-Z. Chen, and I. Kotuliak, Eds., International Conference on Computer Networks and Com-
munication Technologies. Springer, 2019, vol. 15.
[21] A. A. and V. M., “An extended vice-cluster selection approach to improve v leach protocol in WSN,”
in Third Int. Conference on Advanced Computing and Communication Technologies, 2013, pp. 236-240,
doi: 10.1109/ACCT.2013.60.
[22] F. X. and S. Y., “Improvement on LEACH Protocol of Wireless Sensor Network,” in International Conference on
Sensor Technologies and Applications (SENSORCOMM 2007), 2007, pp. 260–264.
[23] L. X., W. J., and B. L., “LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network,” in In-
ternational Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016, pp. 418-422,
doi: 10.1109/CyberC.2016.87.
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3113
[24] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wire-
less microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002,
doi: 10.1109/TWC.2002.804190.
[25] J. Xu, N. Jin, X. Lou, T. Peng, Q. Zhou, and Y. Chen, “Improvement of LEACH protocol for WSN,” in 9th Interna-
tional Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 2174–2177.
BIOGRAPHIES OF AUTHORS
Ikram Daanoune is a Ph.D. student in Computer Sciences and Telecommunications, from Elec-
tronics, Energy, Automatic and Information Processing (EEA&TI) laboratory, Hassan II university,
Faculty of Sciences & Techniques (FST), Mohammedia, Morocco. She obtained her engineering
diploma on electrical & telecommunications at FST, Hassan II University, in 2018. She obtained her
license degree in electronic engineering and telecommunications, from FST, Sultan Moulay Slimane
University, in 2015. Her research interests focus on wireless sensor networks, ad hoc networks, and
routing protocols. She authored many research documents in indexed journals and conferences.
Abdennaceur Baghdad is a university professor at FST Mohammedia, Hassan II University
Casablanca-Morocco whither he educates the hyper-frequencies, electronic engineering, antenna,
and systems of telecommunication. He obtained his doctorate in Electronics from Lille University
France in 1992. He is a member of the EEA&TI laboratory at Hassan II University. He has more
than 30 years of teaching experience The research of BAGHDAD are focused on optical communica-
tion, electronic and embedded systems, telecommunication systems and information technology. He
oversees and he co-supervises many doctoral theses. He is a member of the organizing committees
of several international congresses in the same research area.
Abdelhakim Ballouk is a university professor at FST Mohammedia, Hassan II University
Casablanca-Morocco where he educates regulation & digital control, and linear & non-linear auto-
matic. He got his doctorate in Electronics from Bordeaux University France in 1992, in the automatic
domain. He is a participant of the EEA&TI laboratory at Hassan II University. He oversees and he
co-supervises many doctoral theses. His researches concentrated on Automatic (robust commands,
and predictive controls). His researches focused also in Telecommunication systems (Antenna, and
wireless sensor network).
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)

More Related Content

What's hot

Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
Energy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cEnergy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cijwmn
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicastAravindM170274
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Performance evaluation of hierarchical clustering protocols with fuzzy C-means
Performance evaluation of hierarchical clustering protocols with fuzzy C-means Performance evaluation of hierarchical clustering protocols with fuzzy C-means
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
 
Impacts of structural factors on
Impacts of structural factors onImpacts of structural factors on
Impacts of structural factors onijasuc
 

What's hot (15)

Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
Energy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-cEnergy balanced on demand clustering algorithm based on leach-c
Energy balanced on demand clustering algorithm based on leach-c
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicast
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Performance evaluation of hierarchical clustering protocols with fuzzy C-means
Performance evaluation of hierarchical clustering protocols with fuzzy C-means Performance evaluation of hierarchical clustering protocols with fuzzy C-means
Performance evaluation of hierarchical clustering protocols with fuzzy C-means
 
Impacts of structural factors on
Impacts of structural factors onImpacts of structural factors on
Impacts of structural factors on
 

Similar to Improved LEACH protocol for increasing the lifetime of WSNs

Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...IJCNCJournal
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNOPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNIJCNCJournal
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
 
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORKA CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...ijcsa
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
 

Similar to Improved LEACH protocol for increasing the lifetime of WSNs (20)

Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSNOPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
C04501027035
C04501027035C04501027035
C04501027035
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor network
 
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORKA CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Improved LEACH protocol for increasing the lifetime of WSNs

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 4, August 2021, pp. 3106∼3113 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3106-3113 r 3106 Improved LEACH protocol for increasing the lifetime of WSNs Ikram Daanoune, Abdennaceur Baghdad, Abdelhakim Ballouk Department of Electrical Engineering, Laboratory of Electronics, Energy, Automatics and Data Processing, Faculty of Sciences and Techniques of Mohammedia, Hassan II University of Casablanca, Morocco Article Info Article history: Received Sep 5, 2020 Revised Sep 29, 2020 Accepted Dec 5, 2020 Keywords: Energy-efficiency Improved LEACH Network lifetime Routing protocol WSN ABSTRACT Recently, wireless sensor network (WSN) is taking a high place in several applications: military, industry, and environment. The importance of WSNs in current applications makes the WSNs the most developed technology at the research level and especially in the field of communication and computing. However, WSN’s performance deals with a number of challenges. Energy consumption is the most considerable for many researchers because nodes use energy to collect, treat, and send data, but they have re- stricted energy. For this reason, numerous efficient energy routing protocols have been developed to save the consumption of power. Low energy adaptive clustering hierarchy (LEACH) is considered as the most attractive one in WSNs. In the present document, we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and in data transmission, then we propose an enhanced protocol. The proposed algorithm aims to improve energy consumption and prolong the lifetime of WSN through se- lecting CHs depending on the remaining power, balancing the number of nodes in clusters, determining abandoned nodes in order to send their data to the sink. Then CHs choose the optimal path to achieve the sink. Simulation results exhibit that the enhanced method can decrease the consumption of energy and prolong the life-cycle of the network. This is an open access article under the CC BY-SA license. Corresponding Author: Ikram Daanoune Department of Electrical Engineering Laboratory of Electronics, Energy, Automatics and Data Processing, Hassan II University FST Mohammedia-Casablanca (B.P. 146 Mohammedia 20650 Morocco) Email: ikrame.daanoune-etu@etu.univh2c.ma 1. INTRODUCTION Recently, information technology has seen enormous progress in all domains, everything has been digitized. WSN offers a better solution for efficiently gathering data from anywhere, even difficult areas where human activity is impossible [1]. Various domains use WSN to ameliorate their production or quality of service (QoS) [2]. Each sensor node has at least one sensor that serves to collect data. These micro-sensor nodes char- acterize by self-configuration and self-adaptation, generally, they are alimented by non-rechargeable batteries. Numerous applications use the WSN by reason of the weak-cost, the self-organization of nodes, the sensing ability of sensors, the miniature dimension of the node which allows it to be deployed in hard environments to supervise different types of physical and environmental conditions, easy in positioning, scattering over an large region and giant fault tolerance [3–5]. However, the WSN faces several issue related to the power source. The great use of energy in the various units of the sensor node limits the lifespan of these batteries, which limits the lifespan of the entire network because batteries are the principal reasons for the lifetime of Journal homepage: http://ijece.iaescore.com
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 r 3107 the sensor node [6]. Consequently, the major constraint within the WSN is energy consumption. Therefore, it is requisite to conserve energy in order to prolong the network life cycle. For this reason, numerous research problems are defined as optimization issues referred at discovery useful design strategies, like deployment coverage issue, data routing problem, cluster-head selection [7]. Thus several routing protocols have been scheduled by researchers to reduce the energy consumption of network nodes [8, 9]. Routing protocols are divided mainly to 3 classes: hierarchical, data-centric, and location [9] as we can see in Figure 1. Each class contains several protocols, such as LEACH [10], SPIN [11], HEED [12], MG- LEACH [13], EDMHT [14], MBER [15], BRE-LEACH [16], and so on. Among the existing and the famous routing protocols, there is LEACH protocol. LEACH has been the first and the oldest algorithm, it has been considered as it is an energy-efficient clustering protocol which partitions the network to many groups of sensor nodes. Thus, in any group, there are common nodes responsible to collect data and a randomly elected cluster head which aggregates cluster data, compresses it then transmits it toward the collector. Even if LEACH aims to extend the duration of the network, it remains limited by many constraints, such as the random selection of CHs, single-hop between CHs and the sink regardless of the space and the remaining power. To improve the energy efficiency in WSN various energy efficient routing protocol are proposed, such as EESRA [17], O-LEACH [18], BPA-CRP [19], and so forth. In this work, we suggest an ameliorated efficient-energy routing approach based on the clustering method. This work is different from other existing studies because it is based on the remaining energy to select CHs, it limits the number of nodes in each cluster which serves to balance the energy of the CHs, determines abandoned nodes that can not join any cluster in order to send their data to the sink. Then every CH chooses the optimal path to achieve the sink. Our enhanced protocol serves to prolong the life cycle of the network more than LEACH by minimizing energy consumption. The organization of the content of the present document is as pursue: the second part exposes the related work. The third part introduces the proposed work. The fourth part exhibits the simulation results of our protocol compared with the LEACH algorithm. A discussion of results is given in the fifth part. Finally, the sixth part presents a conclusion of the paper. Figure 1. Routing protocols classification 2. RELATED WORK LEACH is the fundamental and the oldest protocol of hierarchical routing protocols, focused on clus- tering [20], suggested by Heinzelman et al. in 2000 [10]. LEACH is characterized by the self-adaptation as well as the self-organization; nodes organize themselves into clusters [21]. LEACH generates clusters in the net- work and it provides a turn conception. Each turn includes two main stages. In the first stage, CHs are selected randomly according to the threshold function defined in (1), then clusters are established in self-adaptation [22]. In the second stage, it includes communication between normal nodes and their corresponding CHs, thus communication between CHs and the collector. So, this last stage presents data transmission. In the cluster formation, LEACH adopts a probability function to elect CHs. Each sensor node makes choice an aleatory value betwixt zero and one. This node turns into a CH in the present period if the random Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 3. 3108 r ISSN: 2088-8708 value is inferior to the threshold function described in (1). Otherwise, it becomes a normal node [23]. Thereby, normal nodes are looking for their CHs depending on the received signal from CHs. TL(s) = ( PL 1−PL∗(i mod(1/PL)) , s ∈ C 0 else (1) Here PL represents the CHs probability in the network, i is the number of the period; C is the number of the sensor nodes that have not become CH in the previously 1/PL iterations. In the stable stage, Once CHs are elected and clusters are formed, the data transfer begins. Every normal node gathers its environment information, forward it to its CH. When data achieve CHs, these latter aggregate their cluster data, then send them to the sink. LEACH-centralized (LEACH-C) [24] is a centralized clustering algorithm. It is an enhancement of the conventional LEACH approach. With similar to LEACH, LEACH-C splits every round into a set-up and steady-state phase. In the beginning phase, unlike LEACH, in LEACH-C the base station (BS) selects CHs at the hand of the average energy of nodes and the location. Based on this information, alone the nodes with higher energy can be a CH. Balanced residual energy-LEACH (BRE-LEACH) [16] selects CHs in terms of the remaining energy. Then, it selects the CH that has the remaining energy more than the average remaining energy and the distance to the BS less than the average distance as a root CH. This root is responsible to aggregate all CHs data and sends them to the BS. Thereby, in the BRE-LEACH, CHs use the multi-hop technique to achieve the root CH. 3. THE PROPOSED PROTOCOL In the LEACH protocol, the aleatory choice of CHs in the network results in an energy imbalance of nodes, and not all nodes have the same opportunity to become CH. Thus, in the LEACH, the LEACH-C, and the BRE-LEACH algorithms, the number of nodes in clusters is not the same, which creates an energy imbalance, CHs with more cluster members can exhaust their energy early than others. Thereby, in these protocols, nodes determine their clusters according to the power of the received signal from CHs. So, data of nodes that have not accessed any cluster cannot achieve the BS. For these causes, we propose in this paper a new LEACH-based routing protocol, it aims to minimize energy consumption and extend the network lifetime. This approach is a new approach for picking out CHs in the network depending on the residual energy of the sensor nodes and establishing clusters. Thereby, the abandoned nodes that can not reach any cluster, can also send their data to the sink. Furthermore, it proposes the multi-hop technique between CHs to choose the optimal route to the BS or the single hop directly to the sink if it is the optimal path. The proposed approach supposes that in each round, there are clusters. The proposed protocol introduces two phases: 3.1. First phase The initial phase concerns CH selection and clusters formation. To save energy in the WSN, this new approach proposes to select the CHs according to the remaining power of nodes. Thus, it forms clusters based on a determined amount of nodes. The CH formation will be every round. At the starting of every iteration, each sensor node designates an arbitrary value at interval zero and one. In case that, the chosen number is more than the threshold function defined in (2), which is proposed in [16, 25], then this sensor node will be as a common node (CN). In the other case, the sensor node will be picked out as a CH in the current iteration. Tpr(s) = ( PL 1−PL∗(i %(1/PL)) ∗ Erem Ei , s ∈ C 0 otherwise (2) Here PL represents the CHs probability in the network, i is the number of the period; C is a set of sensor nodes that have not become CH in the previously 1/PL iterations. Ei presents the beginning energy of nodes and Erem is the remaining energy at the i iteration. Once CHs are elected, common nodes are looking for their corresponding CHs according to the power of the received signal from CHs. The number of nodes in each cluster is determined Ncl in terms of the total amount of nodes in the network and the number of CH desired. Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 r 3109 Each common node constructs its table of CHs according to the received announcement message from CHs. This table contains the distance between this node and the CHs. For selecting the CH corresponding, the proposed approach suggests that the distance between the sensor node and its CH belongs will be less than the threshold distance do defined in (3), and this CH has a number of nodes less than Ncl. In this way, the node forwards a message to join the CH with the lowest distance in its table if there is a frame available in the TDMA. On the other hand, when the first cluster in the table is filled, the node does the same procedure to the second CH with the lowest distance, and so forth. d0 = s Efs Emp (3) Where, Efs is the energy consumed by the amplifier in the free space, and Emp in the multipath propagation. Once clusters are established, nodes with distances in their tables equal to or greater than do, or the availability on the TDMA schedule is not available, they can not join any cluster. These nodes called abandoned nodes (ANs). 3.2. Second phase Once the clusters are formed and ANs are determined, the second phase starts. This phase presents the data transmission phase. Each CH receives data from the cluster member (that collects information from the surrounding environment) and aggregates it. Then, every CH uses the multi-hop technique between CHs to choose the optimal path to the BS or the single hop directly to the sink if it is the optimal route. Furthermore, ANs can also send their data to the sink through the single hop. Finally, the closest CH to the sink sends its own information with the aggregated packet of others CHs to the sink. Figure 2 illustrates the flow diagram of the proposed protocol. Figure 2. The flowchart of the proposed protocol Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 5. 3110 r ISSN: 2088-8708 4. SIMULATION AND RESULTS In that part, we are used simulation to analyze and simulate the proposed protocol performance. Mat- lab simulator is used to evaluate the proposed protocol and LEACH to put up a comparative analysis between the proposed algorithm and the conventional LEACH algorithm. We considered 80 sensor nodes are distributed haphazardly in the space of 100*100 m2 . The cluster probability is 5%, and the initial energy is 0.5 Joule. We considered one BS that located outside the network with coordinates (50, 150), nodes and the BS are static, then sensor nodes are homogeneous (having the same initial energy). Table 1 summarizes the simulation parameters that we have made in evaluating the LEACH and the proposed protocol. Table 1. The simulation criterion value Parameter Value Sensor nodes Number 80 Area 100 m*100 m The cluster probability (PL) 5% Initial energy (Ei) 0.5 J BS location (x,y) (50,150) ET x = ERx 50 nJ/bit Efs 10 pJ/bit/m2 Emp 0.0013 pJ/bit/m4 Energy of data aggregation 5 nJ/bit Size of packet 4000 bits Number of rounds executed 2500 Figure 3 (a) shows the simulation results of the suggested approach as well as those of the origi- nal LEACH according to the network lifetime metric. From these results, we drew the diagram depicted in Figure 3 (b). The chart above shows a significant enhancement in the proposed protocol. In LEACH, the first node die (FND) at the iteration 846th while in the proposed protocol, the FND at the turn 609th . Furthermore, at the round 1003rd , only the half of nodes that stay alive in the LEACH protocol, whereas in the developed algorithm, the half node die (HND) at the 1714th iteration. Thereby, In LEACH, at the turn 1615th just one node stills alive, so the network is almost finished, while at this round, more than the half nodes stay alive in the proposed protocol (46 nodes). Finally, from the round 2499th , 15 nodes remain alive in the proposed approach, on the contrary, the network in LEACH is finished. (a) (b) Figure 3. The network lifetime in the LEACH and the proposed protocol, (a) Alive nodes in the network, (b) Diagram of dead node in the network Figure 4 compares the proposed solution against LEACH according to the remaining energy metric. The remaining energy is the difference between the initial energy and the consumed energy. From these curves, we can see that the remaining energy of total sensor nodes in the proposed protocol is gradually decrease compared to the classical LEACH approach. Then, at the round 1200, it is almost null in the LEACH while in the proposed protocol, it is still more than 15% of the initial energy of all the network nodes. From these Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 r 3111 results, we can see that the proposed protocol in this paper can optimize the energy consumption and extend the stability of the network better than the original LEACH protocol. Figure 4. Total remaining energy of nodes in LEACH and the proposed protocol 5. DISCUSSION OF RESULTS The LEACH protocol ameliorates the energy-efficiency compared to classical protocols used in WSN. The LEACH-C uses the centralization method to improve the traditional LEACH approach by enhancing the CH selection. The BRE-LEACH enhances the conventional LEACH algorithm by selecting CH according to the residual energy, and picks out a root. But each of these protocols has several limitations. Table 2 illustrates the advantages and disadvantages of the discussed protocols. Table 2. The advantages and disadvantages of the proposed protocol with others protocols Protocol Advantages Disadvantages LEACH Improves the life-cycle of the network through us- ing the TDMA schedule. Selects CHs aleatory/ Uses the single hop. Decrease energy dissipation of nodes. The number of nodes in clusters is randomly. Decreases the no. of transmission packets. Abandoned nodes can not send their data to the BS LEACH-C The centralization provides a better distribution. The centralization method needs an extra energy. Achieves a large no. of turns in a minor area Uses the single-hop technique. CH selection in accordance to remaining power. The number of nodes in each cluster is unbalanced. Abandoned nodes data can not achieve the BS. BRE-LEACH Enhances the network lifetime. No. of nodes in clusters is unbalanced. CH choice depending on the residual energy. Abandoned nodes can not send their data to the BS. Chooses a root CH according to the residual energy and the distance to the BS All CHs send aggregated data to the root even if the BS is closer than the root. The Proposed Protocol CH selection according to the remaining energy. No. of nodes in cluster can not exceed a maximum. Abandoned nodes send data directly to the BS. Abandoned nodes can send data to the BS. Does not consider other QoS parameters. CHs use either the single or the multi-hop to choice the optimal path. 6. CONCLUSION AND FUTURE WORK In the present work, we have suggested a new approach for improving the performance of the con- ventional LEACH protocol. Instead of selecting CHs randomly in LEACH, the developed protocol uses the remaining energy to decide which nodes become as CH in the monitoring area. Furthermore, in LEACH, the total amount of nodes in the clusters is not the same, which leads to an energy consumption imbalance, the proposed protocol determines the maximum amount of nodes in every cluster. Rather than forwarding the ag- gregated packets by CHs to the BS in a single hop, the proposed solution uses the multi-hop technique. The result of simulation illustrates that the proposed approach prolongs the life-cycle of WSNs and decreases energy consumption. For future extensions to this work, we intend to compare this protocol to other enhanced-LEACH protocols. Thereby, we hope to make various enhancements in the present work such as determining the optimal number of clusters in the network, enhancing the throughput, and other quality of service parameters. Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 7. 3112 r ISSN: 2088-8708 REFERENCES [1] I. Daanoune, A. Baghdad, and A. Ballouk, “An enhanced energy-efficient routing protocol for wireless sensor net- work,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5462-5469, 2020, doi: 10.11591/ijece.v10i5.pp5462-5469. [2] A. Mahboub, E. M. E., M. Arioua, H. Barkouk, Y. El Assari, and A. El Oualkadi, “An energy- efficient clustering protocol using fuzzy logic and network segmentation for heterogeneous WSN,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4192-4203, Oct. 2019. [3] T.-P. Hong and G.-N. Shiu, “Solving the K-of-N Lifetime Problem by PSO,” International Journal of Engineering, Science and Technology, vol. 1, no. 1, pp. 136–147, 2009. [4] S. Alnajdi and F. Bajaber, “Determination of the K-optimal number of chains-based routing protocol formed by the K-Means algorithm for the WSN,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 2, pp. 917–930, 2020. [5] P. A. Y and R. Balakrishna, “Implementation of optimal solution for network lifetime and energy consumption metrics using improved energy efficient LEACH protocol in MANET,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 4, pp. 1758–1766, Aug. 2019. [6] N. A., N. J., and L. A. Raj, “Comparative analysis of energy based optimized dynamic source mul- tipath routing protocol in WSNs,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 1, pp. 441-455, Oct. 2019. [7] C.-W. Tsai, T.-P. Hong, and G.-N. Shiu, “Metaheuristics for the Lifetime of WSN: A Review,” IEEE Sensors Journal, vol. 16, no. 9, pp. 2812–2831, May 2016. [8] R. K. Kodali and N. K. Aravapalli, “Multi-level LEACH protocol model using NS-3,” in 2014 IEEE International Advance Computing Conference (IACC), Feb. 2014, pp. 375–380. [9] I. Daanoune, A. Baghdad, and A. Balllouk, “A comparative study between ACO-based protocols and PSO-based protocols in WSN,” in 7th Mediterranean Congress of Telecommunications, 2019, pp. 1–4, doi: 10.1109/CMT.2019.8931320. [10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 1, 2000, p. 10. [11] W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and network- ing, 1999, pp. 174–185. [12] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor net- works,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, Oct. 2004, doi: 10.1109/TMC.2004.41. [13] H. Ouldzira, H. Lagraini, M. Mouhsen, A.and Chhiba, and A. Tabyaoui, “MG-leach: an enhanced leach protocol for wireless sensor network,” IJECE, vol. 9, no. 4, pp. 3139-3145, 2019. [14] E. A. and I. M., “EDMHT-LEACH: Enhancing the performance of the DMHT-LEACH protocol for wireless sensor networks,” in 16th Conference: Networking in Education and Research, 2017, pp. 1–6. [15] M. Al-Jumaili and B. Karimi, “Maximum bottleneck energy routing (MBER) — An energy efficient routing method for wireless sensor networks,” in 2016 IEEE Conference on Wireless Sensors (ICWiSE), 2016, pp. 38–44, doi: 10.1109/ICWISE.2016.8187759. [16] I. Daanoune, A. Baghdad, and A. Balllouk, “BRE-LEACH: A New Approach to Extend the Lifetime Of WSN,” in Third Inter. Conference on Intelligent Computing in Data Sciences, IEEE, 2019, pp. 1–6. [17] E. F. A. Elsmany, M. A. Omar, T.-C. W., and A. A. Altahir, “EESRA: Energy Efficient Scalable Routing Algorithm for Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 96974–96983, 2019. [18] W. Jerbi, A. Guermazi, and H. Trabelsi, “O-LEACH of Routing Protocol for Wireless Sensor Networks,” in 13th International Conference on Computer Graphics, Imaging and Visualization, 2016, pp. 399–404, doi: 10.1109/CGiV.2016.84. [19] K. A. Darabkh, M. Z. El-Yabroudi, and A. H. El-Mousa, “BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks,” Ad Hoc Networks, vol. 82, pp. 155– 171, 2019. [20] S. Smys, R. Bestak, J. I.-Z. Chen, and I. Kotuliak, Eds., International Conference on Computer Networks and Com- munication Technologies. Springer, 2019, vol. 15. [21] A. A. and V. M., “An extended vice-cluster selection approach to improve v leach protocol in WSN,” in Third Int. Conference on Advanced Computing and Communication Technologies, 2013, pp. 236-240, doi: 10.1109/ACCT.2013.60. [22] F. X. and S. Y., “Improvement on LEACH Protocol of Wireless Sensor Network,” in International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), 2007, pp. 260–264. [23] L. X., W. J., and B. L., “LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network,” in In- ternational Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016, pp. 418-422, doi: 10.1109/CyberC.2016.87. Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 r 3113 [24] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wire- less microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002, doi: 10.1109/TWC.2002.804190. [25] J. Xu, N. Jin, X. Lou, T. Peng, Q. Zhou, and Y. Chen, “Improvement of LEACH protocol for WSN,” in 9th Interna- tional Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 2174–2177. BIOGRAPHIES OF AUTHORS Ikram Daanoune is a Ph.D. student in Computer Sciences and Telecommunications, from Elec- tronics, Energy, Automatic and Information Processing (EEA&TI) laboratory, Hassan II university, Faculty of Sciences & Techniques (FST), Mohammedia, Morocco. She obtained her engineering diploma on electrical & telecommunications at FST, Hassan II University, in 2018. She obtained her license degree in electronic engineering and telecommunications, from FST, Sultan Moulay Slimane University, in 2015. Her research interests focus on wireless sensor networks, ad hoc networks, and routing protocols. She authored many research documents in indexed journals and conferences. Abdennaceur Baghdad is a university professor at FST Mohammedia, Hassan II University Casablanca-Morocco whither he educates the hyper-frequencies, electronic engineering, antenna, and systems of telecommunication. He obtained his doctorate in Electronics from Lille University France in 1992. He is a member of the EEA&TI laboratory at Hassan II University. He has more than 30 years of teaching experience The research of BAGHDAD are focused on optical communica- tion, electronic and embedded systems, telecommunication systems and information technology. He oversees and he co-supervises many doctoral theses. He is a member of the organizing committees of several international congresses in the same research area. Abdelhakim Ballouk is a university professor at FST Mohammedia, Hassan II University Casablanca-Morocco where he educates regulation & digital control, and linear & non-linear auto- matic. He got his doctorate in Electronics from Bordeaux University France in 1992, in the automatic domain. He is a participant of the EEA&TI laboratory at Hassan II University. He oversees and he co-supervises many doctoral theses. His researches concentrated on Automatic (robust commands, and predictive controls). His researches focused also in Telecommunication systems (Antenna, and wireless sensor network). Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)