SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 11, Issue 02 (February 2015), PP.58-61
58
Enhancing the Energy Parameter of Leach Protocol For Wireless
Sensor Network
1
Ruby Yadav, 2
Rajender Patel, 3
Sunil Lavadiya
1, 2, 3
Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat)
(Electronics and Communication Department)
2
Head of Department, Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat)
3
Assistant Professor, Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat)
Abstract:- This paper presents a very new version of LEACH protocol, called as modified LEACH
(MOD_LEACH), which focuses more on reducing the energy consumption within the Wireless Sensor Network.
We evaluate both LEACH and LEACH-C through extensive simulation using NS-2.35 and the results shows that
MOD_LEACH performs better and more energy efficiency than LEACH protocol.
Index Terms:- cluster, LEACH protocol, wireless sensor networks, routing protocol, MOD_LEACH
I. INTRODUCTION1
HE Wireless Sensor Network consists of nearly about hundred and thousands of small tiny devices,
which are distributed autonomously, called as sensor nodes. These nodes used to monitor physical or
environmental conditions such as temperature, acoustics, sound, pressure, vibration and motion. Since the nodes
are battery operated, the energy plays an important role in WSN. As a result, many more protocols have been
proposed for initializing the energy consumption of these sensor nodes.
Typically, each and every node in a sensor network consists of one or more sensors, a radio transceiver
or other wireless communication devices, a very small microcontroller and the energy source. As in most of the
cases of WSN applications, energy plays an important role, since energy source is a battery. The important goal
is preserving the consumed energy of each node, which should be considered, while making a routing protocol
for wireless sensor network.
In WSN the main objective behind the routing protocol is to make the network more useful and much
efficient. Routing protocol is categorized into 3 parts based on the structure of network, which are flat routing,
hierarchical routing and location based routing. In flat routing, for collecting or generating the data and routing
to the destination, all the sensor nodes of the network performs the same functionality and works together. The
directed diffusion protocol and (SPIN) Sensor Protocol for Information via Negotiations protocol are some of
the examples which belongs to this flat routing. In the hierarchical routing, the whole network is partitioned into
many clusters for the improvement of scalability and utilization of the energy of the nodes efficiently. LEACH
protocol is an example for this. Whereas in location based routing, each and every nodes locations are monitored
continuously, for finding the routing path for the communication purpose. Global Positioning System (GPS)
devices are used along with network nodes. Examples are GRS (Geographic Adaptive Routing).
Many routing protocol have been proposed in the literature such as LEACH protocol.
LEACH is Low Energy Adaptive Clustering Hierarchy. It is considered as the very most popular
routing protocol which uses the cluster based routing for minimizing the energy consumption. In this paper we
propose an enhanced LEACH protocol that will further improve the consumption and making it energy efficient.
In section 2 we discuss in details the Leach protocol, section 3 the disadvantages of the Leach protocol, section 4
contains related work, in section 5 we introduce our proposed protocol MOD_LEACH protocol and in section 6
we conclude the paper.
II. LEACH PROTOCOL2
LEACH protocol is the first hierarchical cluster based routing protocol, proposed by Wendi. B.
Heinemann, et al. for wireless sensor network. It divides the nodes into clusters, and a dedicated node in cluster
with extra privileged called CH (Cluster Head). Leach selects the CH randomly and assigns this nodes by
following the policy of round robin management for ensuring fair dissipation of energy between nodes. The CH
11
18th
December 2014, ruby.yadav1127@gmail.com
12
18th
December 2014, ruby.yadav1127@gmail.com
Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network
59
is then responsible for creating and manipulating the TDMA (Time Division Multiple Access) schedule and in
order to reduce the amount of information transmitted to the BS( Base Station), the CH aggregates the data from
the nodes where these data is needed using the CDMA (Code Division Multiple Access). All the other nodes are
the members of cluster.
Leach is divided into rounds:
A. Set-up phase
B. Steady state phase
A. SETUP PHASE
Each node decides independently if it will become a CH or not. The decision takes into account the
node that hasn’t been a CH for longer time is more likely to choose itself rather than the nodes which have been
a CH recently. By sending the advertisement packets or broadcasting the ADV messages to all non CHs, the CH
informs that they become the cluster heads. With the strongest received signal strength, the non-CH nodes picks
the advertisement packet.
The members nodes informs the CH, that they have become a member to that cluster by sending “join
packet” contain their IDs using the CSMA. So, the CHs knows or gets the information about their member nodes
and their IDs. On this basis of all received messages within the cluster, CH creates a TDMA schedule. Randomly
pick a CSMA code, and broadcast the TDMA table to cluster members. After that steady state phase begins.
B. STEADY STATE PHASE
All the non-CH nodes start transmitting the data, after allotment of the TDMA slots, to the CH. The nodes
will keep its antenna in ON state only when the data transmission begins. In the other time, it remains OFF in
order to save power. The CH will always be in the ON state. Once all the information is received from the nodes
(non-CH) by the CH, it does an intelligent data aggregation on the received data and send it to the BS.
III. DISADVANTAGES OF LEACH PROTOCOL
Leach suffers from many drawbacks which are:
1. Random selection of the cluster head; that does not consider the energy consumption.
2. Some cluster contains more number of nodes and some less.
3. Unable to cover the large area.
4. Non-uniformly distributed CHs; where some CH s are located at the edge of the cluster.
5. Different size of the cluster, which leads to difference in the frequency of sending data from node to CH and
CH to base station differs.
IV. RELATED WORK
A. V-LEACH PROTOCOL
In V-LEACH the cluster contains; CH (it is the responsibility of the CH towards sending data that is
received from the cluster members to the BS), vice-CH (in case if the CH dies, the node will become the cluster
head), cluster node (collects data from environmental surrounding and sends the data to the CH). But in original
LEACH, the CH remains always in ON for receiving data from cluster members, aggregate the data and then
send it to the base station, which might be located at a far distance from the BS. The CH dies earlier than other
nodes because of the operations it performs of sending, receiving and overhearing. Hence the cluster will be
useless and there will be no data transmission. It has the advantage that there will be no need of electing a new
CH every time.
B. C-LEACH
LEACH doesn’t take the responsibility of the placement and the number of cluster heads. In this an
enhancement over the LEACH was proposed. The protocol is known as the LEACH-C which uses a centralized
clustering algorithm and after that following the same steady state phase as the original LEACH. At the time of
set-up phase of LEACH-C, each and every nodes sends its current location and residual energy information to
the BS. Once the energy cost of communication with BS becomes higher than energy cost of cluster formation.
LEACH-C no longer performs good performance and dependence of BS location becomes a major disadvantage.
Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network
60
C. LEACH-M
It is an improved version of LEACH called multihop leach (LEACH-M). No matter the distance from
the CH to BS, the CH communicates with the BS. So it will consume a lot of energy. The focus will be on the
heterogeneous sensor networks, in which two types of sensors are displayed:
High capacity sensor and simple sensors. The sensors which have large capacity processing capabilities
and communicates very intensively and acts as cluster head, while others which are simple sensors have limited
power, affiliated to the closest CH in their neighborhood and communicates with it directly.
V. PROPOSED WORK
Step 1:
• At the starting all the nodes send its residual energy to the Base-Station.
• Base-station generate the Threshold Value and broadcast to all participate node and compare with the
Threshold Value and here I use other two parameters like residual energy and distance of each participation node
to Cluster-Head
• Total three parameters 1) Random value > Threshold value
2) Residual Energy
3) Vicinity
• Using above parameter Cluster-Head decide in the first round. In the second round I ignore the previous
condition used by the LEACH is like that newly select CH is become a previously selected CH are not? It is
because of the residual energy parameter.
Step 2:
• After decide CHs, all CH send two parameter to the Base-Station :
1) Distance of CH
2) Residual Energy.
• Based on above step parameters Base-station chose the MASTER-CH. So, other becomes SLAVE-CHs.
• During the communication only MASTER-CH can communicate with the Base-Station. Other SLAVE-CHs
send data to MASTER-CH.
• In each round MASTER-CH become different by the BS because of each round residual energy of nodes
become different for CH.
Step 3:
• During communication participate nodes communicate with SLAVE-CH using TDMA time slot and SLAVE-
CHs communicate with the MASTER-CH.
• Finally, MASTER-CH sends data to BS using CDMA technology.
Step 4:
• So, using this HYBRID algorithm I can enhance lifetime of network and residual energy of each node, and
also I can design cluster based on VICINITY.
REFERENCES
[1]. National Inst. Of Standard and Technology, “Federal Information Processing Standard Publication 197,
the Advanced Encryption Standard (AES),” Nov. 2001
[2]. J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission, Sept.1999
[3]. Jagadguru Swami Sri BharatiKrishnaTirthji Maharaja: Vedic Mathematics: Sixteen Simple
Mathematical Formulae from the Veda, pp. 5-45. MotilalBanarasidas Publishers, Delhi (2009)
[4]. Huddar, S.R.; Rupanagudi, S.R.; Kalpana, M.; Mohan, S., “Novel high speed Vedic mathematics
multiplier using compressors,” in Automation, Computing, Communication, Control and Compressed
Sensing (iMac4s), 2013International Multi-Conference on, vol., no.,pp.465,469, 22-23 March 2013
[5]. William Stallings, Cryptography and Network Security, Principles and Practices, 4th
ed. Pearson
Education, pp. 134-161, 2006
[6]. Charlie Kaufman, Radia Perlman, Mie Speciner, Network Security, Private Communication in a Public
World, 2nd
ed. Pearson Education, pp. 41-114, 2006
[7]. T. K. Moon, “Rudiments of Number Theory and Algebra,” in Error Correction Coding Mathematical
Methods and Algorithms, 1st
ed. New Jersey: John Wiley & Sons, 2005, pp. 175-188,193-209.
[8]. Ahmad, N.; Hasan, R.; Jubadi, W.M; “Design of AES S-Box using combinational optimization”, IEEE
Symposium on Industrial Electronics & Applications (ISIEA), pp. 696-699, 2010.
[9]. Berent, Adam. “Advanced Encryption Standard by Example”, Document available at URL
http://www.networkdls.com/Articles/AESbyExample.pdf (April 1 2007) Accessed: June 2013
[10]. Li, Hua, and Zac Friggstad. “An efficient architecture for the AES mix columns operation.” Circuits
and Systems, 2005. ISCAS 2005. IEEE International Symposium on. IEEE, 2005.
Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network
61
[11]. Khandekar, P.D.; Subbaraman, S., “Low Power 2:1 MUX for Barrel Shifter,” Emerging Trend in
Engineering and Technology, 2008. ICETET’08. First International Conference on, Vol., no., pp.404,
407, 16-18 July 2008.
[12]. R.K.Bathija, R.S.Meena, S. Sarkar, Rajesh Shah Tinjrit, “Low power high speed 16*16 bit Multiplier
using Vedic mathematics”, International journal of computer Application, volume 59, December 2012.
[13]. Huddar, S.R.; Rupanagudi, Ramya R.; Yadav S.; Jan S., “Novel Architecture for Inverse Mix Columns
for AES using Ancient Vedic mathematics on FPGA,” International Conference on advances in
Computing, Communication and informatics (ICACCI). IEEE 2013.
[14]. Ambika R, C. S. Mala, S. K. Pushpa, “FPGA Implementation of AES using Vedic Mathematics,”
International Journal in Innovative in Engineering and Science, ISSN (Online) 2347-3207.
[15]. Divan Raimagia, Charvi Chanda, “To make trust relationship between BGP speakers with help of
secure private key”, Engineering (NUiCONE), 2012 Nirma University International Conference DOI:
10.1109/NUICONE.2012.6493249 Publication Year: 2012 , Page(s): 1 - 7.

More Related Content

What's hot

Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses myrajendra
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicastAravindM170274
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 

What's hot (20)

Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
H0421043049
H0421043049H0421043049
H0421043049
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicast
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 

Viewers also liked

Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
Electronics Library Management System from the Website
Electronics Library Management System from the WebsiteElectronics Library Management System from the Website
Electronics Library Management System from the WebsiteIJERD Editor
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light CommunicationIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
Experimental investigation of cooling performance of an Automobile radiator u...
Experimental investigation of cooling performance of an Automobile radiator u...Experimental investigation of cooling performance of an Automobile radiator u...
Experimental investigation of cooling performance of an Automobile radiator u...IJERD Editor
 
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...IJERD Editor
 
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) technique
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) techniqueJoint State and Parameter Estimation by Extended Kalman Filter (EKF) technique
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) techniqueIJERD Editor
 
A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...IJERD Editor
 
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
 
Green synthesis of zinc oxide nano particles using flower extract cassia dens...
Green synthesis of zinc oxide nano particles using flower extract cassia dens...Green synthesis of zinc oxide nano particles using flower extract cassia dens...
Green synthesis of zinc oxide nano particles using flower extract cassia dens...IJERD Editor
 
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive RadioAn Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive RadioIJERD Editor
 

Viewers also liked (13)

Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
Electronics Library Management System from the Website
Electronics Library Management System from the WebsiteElectronics Library Management System from the Website
Electronics Library Management System from the Website
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light Communication
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
Experimental investigation of cooling performance of an Automobile radiator u...
Experimental investigation of cooling performance of an Automobile radiator u...Experimental investigation of cooling performance of an Automobile radiator u...
Experimental investigation of cooling performance of an Automobile radiator u...
 
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...
Morphometric Analysis of Markandeya River Sub Basin (MRSB), Belgaum District,...
 
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) technique
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) techniqueJoint State and Parameter Estimation by Extended Kalman Filter (EKF) technique
Joint State and Parameter Estimation by Extended Kalman Filter (EKF) technique
 
A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...A Generalized Multistage Economic Planning Model for Distribution System Cont...
A Generalized Multistage Economic Planning Model for Distribution System Cont...
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...
Seamless Transitions between Grid-Connected and Stand-Alone Operations of Dis...
 
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
 
Green synthesis of zinc oxide nano particles using flower extract cassia dens...
Green synthesis of zinc oxide nano particles using flower extract cassia dens...Green synthesis of zinc oxide nano particles using flower extract cassia dens...
Green synthesis of zinc oxide nano particles using flower extract cassia dens...
 
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive RadioAn Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
An Optimized Energy Detection Scheme For Spectrum Sensing In Cognitive Radio
 

Similar to Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...IRJET Journal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkIRJET Journal
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkIRJET Journal
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 

Similar to Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network (20)

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
C04501027035
C04501027035C04501027035
C04501027035
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
B045070510
B045070510B045070510
B045070510
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewSeismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewIJERD Editor
 
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsPost processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsIJERD Editor
 
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewSeismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
 
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsPost processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
 
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 02 (February 2015), PP.58-61 58 Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network 1 Ruby Yadav, 2 Rajender Patel, 3 Sunil Lavadiya 1, 2, 3 Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat) (Electronics and Communication Department) 2 Head of Department, Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat) 3 Assistant Professor, Marwadi Education Foundation’s Group of Institutions, Rajkot-360003 (Gujarat) Abstract:- This paper presents a very new version of LEACH protocol, called as modified LEACH (MOD_LEACH), which focuses more on reducing the energy consumption within the Wireless Sensor Network. We evaluate both LEACH and LEACH-C through extensive simulation using NS-2.35 and the results shows that MOD_LEACH performs better and more energy efficiency than LEACH protocol. Index Terms:- cluster, LEACH protocol, wireless sensor networks, routing protocol, MOD_LEACH I. INTRODUCTION1 HE Wireless Sensor Network consists of nearly about hundred and thousands of small tiny devices, which are distributed autonomously, called as sensor nodes. These nodes used to monitor physical or environmental conditions such as temperature, acoustics, sound, pressure, vibration and motion. Since the nodes are battery operated, the energy plays an important role in WSN. As a result, many more protocols have been proposed for initializing the energy consumption of these sensor nodes. Typically, each and every node in a sensor network consists of one or more sensors, a radio transceiver or other wireless communication devices, a very small microcontroller and the energy source. As in most of the cases of WSN applications, energy plays an important role, since energy source is a battery. The important goal is preserving the consumed energy of each node, which should be considered, while making a routing protocol for wireless sensor network. In WSN the main objective behind the routing protocol is to make the network more useful and much efficient. Routing protocol is categorized into 3 parts based on the structure of network, which are flat routing, hierarchical routing and location based routing. In flat routing, for collecting or generating the data and routing to the destination, all the sensor nodes of the network performs the same functionality and works together. The directed diffusion protocol and (SPIN) Sensor Protocol for Information via Negotiations protocol are some of the examples which belongs to this flat routing. In the hierarchical routing, the whole network is partitioned into many clusters for the improvement of scalability and utilization of the energy of the nodes efficiently. LEACH protocol is an example for this. Whereas in location based routing, each and every nodes locations are monitored continuously, for finding the routing path for the communication purpose. Global Positioning System (GPS) devices are used along with network nodes. Examples are GRS (Geographic Adaptive Routing). Many routing protocol have been proposed in the literature such as LEACH protocol. LEACH is Low Energy Adaptive Clustering Hierarchy. It is considered as the very most popular routing protocol which uses the cluster based routing for minimizing the energy consumption. In this paper we propose an enhanced LEACH protocol that will further improve the consumption and making it energy efficient. In section 2 we discuss in details the Leach protocol, section 3 the disadvantages of the Leach protocol, section 4 contains related work, in section 5 we introduce our proposed protocol MOD_LEACH protocol and in section 6 we conclude the paper. II. LEACH PROTOCOL2 LEACH protocol is the first hierarchical cluster based routing protocol, proposed by Wendi. B. Heinemann, et al. for wireless sensor network. It divides the nodes into clusters, and a dedicated node in cluster with extra privileged called CH (Cluster Head). Leach selects the CH randomly and assigns this nodes by following the policy of round robin management for ensuring fair dissipation of energy between nodes. The CH 11 18th December 2014, ruby.yadav1127@gmail.com 12 18th December 2014, ruby.yadav1127@gmail.com
  • 2. Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network 59 is then responsible for creating and manipulating the TDMA (Time Division Multiple Access) schedule and in order to reduce the amount of information transmitted to the BS( Base Station), the CH aggregates the data from the nodes where these data is needed using the CDMA (Code Division Multiple Access). All the other nodes are the members of cluster. Leach is divided into rounds: A. Set-up phase B. Steady state phase A. SETUP PHASE Each node decides independently if it will become a CH or not. The decision takes into account the node that hasn’t been a CH for longer time is more likely to choose itself rather than the nodes which have been a CH recently. By sending the advertisement packets or broadcasting the ADV messages to all non CHs, the CH informs that they become the cluster heads. With the strongest received signal strength, the non-CH nodes picks the advertisement packet. The members nodes informs the CH, that they have become a member to that cluster by sending “join packet” contain their IDs using the CSMA. So, the CHs knows or gets the information about their member nodes and their IDs. On this basis of all received messages within the cluster, CH creates a TDMA schedule. Randomly pick a CSMA code, and broadcast the TDMA table to cluster members. After that steady state phase begins. B. STEADY STATE PHASE All the non-CH nodes start transmitting the data, after allotment of the TDMA slots, to the CH. The nodes will keep its antenna in ON state only when the data transmission begins. In the other time, it remains OFF in order to save power. The CH will always be in the ON state. Once all the information is received from the nodes (non-CH) by the CH, it does an intelligent data aggregation on the received data and send it to the BS. III. DISADVANTAGES OF LEACH PROTOCOL Leach suffers from many drawbacks which are: 1. Random selection of the cluster head; that does not consider the energy consumption. 2. Some cluster contains more number of nodes and some less. 3. Unable to cover the large area. 4. Non-uniformly distributed CHs; where some CH s are located at the edge of the cluster. 5. Different size of the cluster, which leads to difference in the frequency of sending data from node to CH and CH to base station differs. IV. RELATED WORK A. V-LEACH PROTOCOL In V-LEACH the cluster contains; CH (it is the responsibility of the CH towards sending data that is received from the cluster members to the BS), vice-CH (in case if the CH dies, the node will become the cluster head), cluster node (collects data from environmental surrounding and sends the data to the CH). But in original LEACH, the CH remains always in ON for receiving data from cluster members, aggregate the data and then send it to the base station, which might be located at a far distance from the BS. The CH dies earlier than other nodes because of the operations it performs of sending, receiving and overhearing. Hence the cluster will be useless and there will be no data transmission. It has the advantage that there will be no need of electing a new CH every time. B. C-LEACH LEACH doesn’t take the responsibility of the placement and the number of cluster heads. In this an enhancement over the LEACH was proposed. The protocol is known as the LEACH-C which uses a centralized clustering algorithm and after that following the same steady state phase as the original LEACH. At the time of set-up phase of LEACH-C, each and every nodes sends its current location and residual energy information to the BS. Once the energy cost of communication with BS becomes higher than energy cost of cluster formation. LEACH-C no longer performs good performance and dependence of BS location becomes a major disadvantage.
  • 3. Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network 60 C. LEACH-M It is an improved version of LEACH called multihop leach (LEACH-M). No matter the distance from the CH to BS, the CH communicates with the BS. So it will consume a lot of energy. The focus will be on the heterogeneous sensor networks, in which two types of sensors are displayed: High capacity sensor and simple sensors. The sensors which have large capacity processing capabilities and communicates very intensively and acts as cluster head, while others which are simple sensors have limited power, affiliated to the closest CH in their neighborhood and communicates with it directly. V. PROPOSED WORK Step 1: • At the starting all the nodes send its residual energy to the Base-Station. • Base-station generate the Threshold Value and broadcast to all participate node and compare with the Threshold Value and here I use other two parameters like residual energy and distance of each participation node to Cluster-Head • Total three parameters 1) Random value > Threshold value 2) Residual Energy 3) Vicinity • Using above parameter Cluster-Head decide in the first round. In the second round I ignore the previous condition used by the LEACH is like that newly select CH is become a previously selected CH are not? It is because of the residual energy parameter. Step 2: • After decide CHs, all CH send two parameter to the Base-Station : 1) Distance of CH 2) Residual Energy. • Based on above step parameters Base-station chose the MASTER-CH. So, other becomes SLAVE-CHs. • During the communication only MASTER-CH can communicate with the Base-Station. Other SLAVE-CHs send data to MASTER-CH. • In each round MASTER-CH become different by the BS because of each round residual energy of nodes become different for CH. Step 3: • During communication participate nodes communicate with SLAVE-CH using TDMA time slot and SLAVE- CHs communicate with the MASTER-CH. • Finally, MASTER-CH sends data to BS using CDMA technology. Step 4: • So, using this HYBRID algorithm I can enhance lifetime of network and residual energy of each node, and also I can design cluster based on VICINITY. REFERENCES [1]. National Inst. Of Standard and Technology, “Federal Information Processing Standard Publication 197, the Advanced Encryption Standard (AES),” Nov. 2001 [2]. J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission, Sept.1999 [3]. Jagadguru Swami Sri BharatiKrishnaTirthji Maharaja: Vedic Mathematics: Sixteen Simple Mathematical Formulae from the Veda, pp. 5-45. MotilalBanarasidas Publishers, Delhi (2009) [4]. Huddar, S.R.; Rupanagudi, S.R.; Kalpana, M.; Mohan, S., “Novel high speed Vedic mathematics multiplier using compressors,” in Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013International Multi-Conference on, vol., no.,pp.465,469, 22-23 March 2013 [5]. William Stallings, Cryptography and Network Security, Principles and Practices, 4th ed. Pearson Education, pp. 134-161, 2006 [6]. Charlie Kaufman, Radia Perlman, Mie Speciner, Network Security, Private Communication in a Public World, 2nd ed. Pearson Education, pp. 41-114, 2006 [7]. T. K. Moon, “Rudiments of Number Theory and Algebra,” in Error Correction Coding Mathematical Methods and Algorithms, 1st ed. New Jersey: John Wiley & Sons, 2005, pp. 175-188,193-209. [8]. Ahmad, N.; Hasan, R.; Jubadi, W.M; “Design of AES S-Box using combinational optimization”, IEEE Symposium on Industrial Electronics & Applications (ISIEA), pp. 696-699, 2010. [9]. Berent, Adam. “Advanced Encryption Standard by Example”, Document available at URL http://www.networkdls.com/Articles/AESbyExample.pdf (April 1 2007) Accessed: June 2013 [10]. Li, Hua, and Zac Friggstad. “An efficient architecture for the AES mix columns operation.” Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on. IEEE, 2005.
  • 4. Enhancing The Energy Parameter Of Leach Protocol For Wireless Sensor Network 61 [11]. Khandekar, P.D.; Subbaraman, S., “Low Power 2:1 MUX for Barrel Shifter,” Emerging Trend in Engineering and Technology, 2008. ICETET’08. First International Conference on, Vol., no., pp.404, 407, 16-18 July 2008. [12]. R.K.Bathija, R.S.Meena, S. Sarkar, Rajesh Shah Tinjrit, “Low power high speed 16*16 bit Multiplier using Vedic mathematics”, International journal of computer Application, volume 59, December 2012. [13]. Huddar, S.R.; Rupanagudi, Ramya R.; Yadav S.; Jan S., “Novel Architecture for Inverse Mix Columns for AES using Ancient Vedic mathematics on FPGA,” International Conference on advances in Computing, Communication and informatics (ICACCI). IEEE 2013. [14]. Ambika R, C. S. Mala, S. K. Pushpa, “FPGA Implementation of AES using Vedic Mathematics,” International Journal in Innovative in Engineering and Science, ISSN (Online) 2347-3207. [15]. Divan Raimagia, Charvi Chanda, “To make trust relationship between BGP speakers with help of secure private key”, Engineering (NUiCONE), 2012 Nirma University International Conference DOI: 10.1109/NUICONE.2012.6493249 Publication Year: 2012 , Page(s): 1 - 7.