SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290
2611
An Adaptive Cluster Based Routing
Protocol for WSN
Raghunandan G H
Department of Telecommunication Engineering, BMS Institute of Technology and Management, Bengaluru-64
Email: raghunandangh@bmsit.in
Navyashree R, Jagadish S , Arshiya Farheen
Department of Electronics and Communication Engineering, Global Academy of Technology, Bengaluru-98
Email: navyashree47@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data
in a variety of environments, as the sensor operate on battery which is of limited power. To support high
scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into
disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient
utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is
managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection
based on the node energy and the distance from base station to the cluster head for the efficient transmission and
to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared
with the LEACH algorithm in terms of energy consumption.
Keywords - Wireless sensor network, clusters, cluster head, advanced node, LEACH
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 08, 2015 Date of Acceptance: July 17, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Wireless Sensor Network (WSN) (fig. 1) contains
hundreds or thousands of sensor nodes which can be
networked in many applications and have the ability to
communicate either among each other or directly to an
external base-station [2]. The fig 2 shows the schematic
diagram of sensor node architecture where each sensor
node comprises sensing, processing and transmission,
mobilizes, position finding system, and power units also
shows the communication architecture of a WSN [4]. Each
sensor node bases its decision on its mission, the
information it currently has, knowledge of its computing,
communication, and energy resources and have capability
to collect and route the data either to other sensors or back
to an external base station or stations which may be a fixed
or a mobile node capable of connecting the sensor network
to an existing communication infrastructure or to the
Internet where users have access to the reported data
[5].WSNs need to be stable in design and structure to
transfer data among the wireless sensors safely and
without any problems, because of their use in critical areas
and real time systems. Moreover, consuming less energy
and increasing the lifetime of the wireless sensor nodes are
the main objectives in designing the WSN, because of the
limitation of the power resources and the difficulties of
replacing the batteries of the wireless sensors [3].
The architecture of WSN varies for an individual sensor
node and the entire network. Energy efficiency, size
reduction and minimum cost are the main concern for
sensor node architecture [8].
Fig. 1: Wireless Sensor Networks
Section II gives the brief description of the existing
routing protocols. Section III dealt with the description of
the proposed algorithm. Section IV is dealt with the
implementation of the proposed algorithm. Section V
gives Performance evaluations. Section VI is dealt with
simulation results of the proposed algorithm. Future
research is explained in Section VII, and finally, Section
VIII gives the conclusion of the paper.
Fig. 2: Sensor node Architecture
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290
2612
II. RELATED WORK
Routing in sensor networks has attracted a lot of attention
in the recent years and has introduced unique challenges
compared to traditional data routing in wired networks.
[W. Heinzelman, A. Chandrakasan][1] proposed,
LEACH (Low-Energy Adaptive Clustering Hierarchy), a
Clustering-based protocol utilizes randomized rotation of
local cluster base stations (cluster-heads) to evenly
distribute the energy load among the sensors in the
network. LEACH uses localized coordination to enable
scalability and robustness for dynamic networks, and
incorporates data fusion into the routing protocol to reduce
the amount of information that must be transmitted to the
base stat ion. In addition, LEACH is able to distribute
energy dissipation evenly throughout the sensors, doubling
the useful system lifetime for the networks [1].
[Raghunandan.G.H and Sagar Metri][5] Proposed,
Wireless Sensor Networks (WSNs) consist of small nodes
with sensing, computation and wireless communications
capabilities. Evolution in wireless sensor network has
broadened its pervasive and ubiquitous applications in
numerous fields. These applications often require accurate
information collecting as well as uninterrupted, prolonged
active service. Routing protocols have significant impact
on the overall energy consumption of sensor networks.
Suitable Energy-efficient routing algorithms are required
to the inherent characteristics of these types of networks
are needed. Due to resource limitations in wireless sensor
networks, prolonging the network lifetime has been of a
great interest. Most of the energy of sensor nodes is
utilized for transmission of data to the base station. Thus,
it makes them to deplete their energy much faster. In this
paper, Centrality based Cluster approach is used along
with a movable base station to reduce the energy
consumption of cluster heads. According to the simulation
results, the proposed scheme has proved its efficiency in
the network lifetime, residual energy of network. The
proposed scheme also shows improvement in performance
of WSN compared to other routing scheme.
III. PROPOSED ALGORITHM
Wireless sensor networks are fast growing and an existing
research area which has attracted considerable research
attention in the recent past. In hierarchical routing
algorithms, CHs are responsible for gathering,
compressing and forwarding the data to the base station.
Thus, they are responsible for conveying the entire
information of the members of that cluster. It is also
important to form the clusters for efficient transmission of
the data in WSN [4]. In the proposed algorithm clusters
will change for every round. It allows sensors to distribute
the sensing task by partitioning the space in a meaningful
way. Here algorithm cell of the sensors is the subset of the
plane in which all points are closer than to any other
sensors. After organizing nodes into clusters, the cluster
head (CH) is selected at the beginning of each round based
on certain criteria [4]:
1. CH's residual energy: if the sensor in the cluster has
more energy than others, then that sensor is selected as
cluster head (CH).
2. Distance from base station to CH: The more distant the
CH is from the base station, the more energy is required
for data communications. Hence more preference is given
to that CH.
3. Apart from cluster heads, there will be advanced nodes
which will be having second highest energy.
A. Data propagation in WSN
1. Initially, the sensor node senses the event and transmits
it to the Cluster Head.
2. The Cluster Head processes the data and transmits it to
the Advance node.
3. Then advanced node transmits this processed data to the
based station.
Fig. 3: Data propagation in WSN
IV. IMPLEMENTATION
The algorithm must be energy efficient so that it does not
drain resources away from the primary intended use of cell
phones for voice/data communication. We are calculating
the total energy consumption of all nodes for various
cluster radii. Our energy model for sensors is based on the
first order radio model described in fig 4.
Fig4: Radio energy dissipation model
Table 1: Radio Characteristics
Operation Energy dissipated.
Transmitter Electronics(ETX)
Receiver Electronics(RTX)
ETX=RTX= Eelec
50nJ/bit
Transmit Amplifier 100pJ/bit/m2
Cluster
Head
Base
Station
Event
Cluster
Members
Advanced
nodes
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290
2613
In our work, we assume a simple model where the radio
dissipates Eelec= 50 nJ/bit run the transmitter or receiver
circuitry and amp = 100 pi/bit/m2 for the transmit
amplifier to achieve an acceptable EbNo (see Fig 4 and
Table 1). These parameters are slightly better than the
current state-of-the-art in radio design. We also assume r2
energy loss due to channel transmission.
Thus, to transmit a k-bit message a distance d using our
radio model, the radio expends:
��� �, � = ���−� �� � + ���−� � �, � … … …
��� �, � = �� �� ∗ � +∈� �∗ � ∗ �2
And to receive this message, Radio expends:
��� � = ���−� �� � … … … … … … … … … … … …
��� � = �� �� ∗ �
For these parameter values, receiving a message is not a
low cost operation; the protocols should thus try to
minimize not only the transmit distances but also the
number of transmit and receive operations for each
message.
V. PERFORMANCE EVOLUTION
Hundred sensors are randomly distributed in 100x100
boundaries as shown in fig.5. The sensor field is located
on rectangular coordinates. A base station is located at the
centre. All the nodes start with an initial energy of 0.5J.
Therefore, total energy of the network is 50J. Cluster head
and advanced node is selected randomly, after the
completion of first round based on the above criteria
mentioned in proposed algorithm. Fig.6 shown below is
the clustering of sensor nodes. Here clustering is based on
proposed algorithm. In this partition of cells in such a way
that points inside a polygon are closer to that cell than any
other cells thus one of the vertices of the Polygon is the
farthest point of the polygon to the site inside it. Therefore
proposed algorithm can be used as one of the sampling
method in determining WSN coverage; with the sensors
act as the sites, if all polygons vertices are covered then
the field is fully covered otherwise coverage holes exist
[6].
.
Fig. 5: Randomly Distributed Sensors
Fig. 6: Clustering of Sensor Nodes
Fig.7: WSN after 1500 rounds.
We have performed simulation for 1500 rounds.Fig.7
shown is the WSN after 1500 rounds. In this figure red
color nodes are the dead nodes. The node is considered to
be dead when there is no energy in it for the transmission.
Blue color nodes are the alive nodes. In the table below
shown consists of parameter details used for proposed
algorithm.
.
Table 2: Parameters Detail
Parameter name Values
Network area 100*100
BS Location 50*50
Number of nodes 100
Eo(Initial Energy) 0.5J
Packet Size 400bits
Eelec 50nJ/bit
Etx=Erx 50nJ/bit
Efs 10pJ/bits/m2
Emp 0.013pJ/bits/m2
EDA 5nJ
VI. SIMULATION RESULTS
In the simulation process, we evaluate the performance of
proposed algorithm in MATLAB simulator. 100 nodes are
randomly distributed in a 100 x 100 Sq.m network.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290
2614
Simulation was performed for 1500 rounds. We compare
our proposed algorithm with LEACH. We compute the
plot for networks lifetime and remaining energy of the
network. Lifetime is considered as the time when the first
node dies. Fig.8 shows the number of alive nodes with
respect to the operation of the network in rounds. The
sensors start dying after 863 rounds in the proposed
method, and in the LEACH algorithm nodes start dying
approximately around 689 rounds. Therefore, proposed
algorithm improves the overall network lifetime.
Fig.8 : Network Lifetime
Fig.8 describes the network lifetime of the proposed model
is greater than the LEACH. Residual energy of the
network in each round gives the rate of total energy
consumption, which can be a good metric to measure the
energy efficiency of the algorithms.
Fig. 9: Energy of the network
Residual energy of the network in each round gives, rate
of total energy consumption, which can be a good metric
to measure the energy efficiency of the algorithms.
Residual energy plot is shown in fig.9.In the proposed
algorithm (fig 9) the residual energy of network is much
more than LEACH.
VII. FUTURE WORK
Future works in routing techniques focus on different
directions. In comparison with the above mentioned
routing protocols, the energy consumption is high in the
LEACH algorithm when compared to the proposed
algorithm. There is a need to decrease the energy
consumption of the every sensor node. Also, prolonging
the network lifetime has been of a great interest due to
resource limitations in wireless sensor networks.
There needs to be a significant research done to improve
the lifetime of the wireless sensors. Works on reducing the
energy consumption by the nodes need to be done in a
more efficient manner.
VIII. CONCLUSION
Power consumption is an important factor for network
lifetime in wireless sensor networks. In clustering
hierarchy, the cluster head decision is a major challenge. If
network is taken as a whole, then the power consumption
can be optimized by the rotation of this cluster head inside
the individual clusters. In this paper, a new technique is
proposed to select cluster head among some of the
wireless sensor nodes based on net distance with base
station. The proposed technique resulted in the increased
lifetime of the whole network, and increased the number
of nodes, which will remain alive for the maximum period
of time.
REFERENCES
[1] W. Heinzelman, A. Chandrakasan and H.
Balakrishnan, "Energy- Efficient Communication Protocol
for Wireless Micro-sensor Networks", In proceedings of
the 33rd Hawaii International Conference on System
Sciences (HICSS '00), January 2000.
[2] Raghunandan.G.H, Lakshmi.B.N "A Comparative
Analysis of Routing Techniques for Wireless Sensor
Networks", Proceedings of the IEEE National Conference
on Innovations in Emerging Technology, IEEE
Conference Proceedings febraury2011.
[3] Raghunandan.G.H, Lakshmi.B.N "A Taxonomy of
Secure Routing protocols for Wireless Sensor Networks",
Proceedings of the International Conference on Frontiers
of computer science, August 2011.
[4] Raghunandan.G.H, Vivek Kumar, Kiran George "A
Comparative Analysis of Hierarchical Routing Protocols
in WSN" in the proceedings of DRDO Sponsored 8th
International Conference on Control and Instrumentation
Sysytem-2011, MIT, 2011.
[5] Raghunandan GH, Metri S (2012) “A novel approach
to increase overall efficiency in wireless sensor
networks”, IEEE international conference on computing,
electronics and electrical technologies 2012. pp 699–703.
[6] Waleed Alsalih, Kamrul Islam, Yuraj, Henry Xiao
“distributed voronoi diagram computation in wireless
sensor network”.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290
2615
[7] S. Nithyakalyani and S. Suresh Kumar. “Energy
Efficient Data Aggregation using Voronoi based Genetic
Clustering Algorithm in WSN”, International Journal of
Computer Applications (0975 – 8887) Volume 54– No.4,
September 2012.
[8] Nasrin Abazari Torghabeh, Mohammad Reza
Akbarzadeh, Mohammad Hossein Y aghmaee, "Mobile
base station Management using fuzzy logic in wireless
sensor networks" in the proceedings of 2nd
International
Conference on Computer Engineering and Technology,
2010.
Biographies and Photographs
Raghunandan G.H received B.E degree in Electronics
and Communication Engineering from Visvesvaraya
Technological University. He did his M.Tech in the field
of Digital Electronics and communication from
Visvesvaraya Technological University, Belgaum. He is
currently working as Assistant Professor in
Telecommunication Department of BMS Institute of
Technology and Management, Bengaluru. His areas of
interest are Wireless Ad-Hoc and Sensor Networks. He
has published 11 papers at International conferences 12
papers in national conferences and 3 papers in
International journals.
Jagadish S received B.E degree in Electronics and
Communication from Visvesvaraya Technological
University in 2014. His area of interest includes
technology, wireless communication, and programming
languages.
Navyashree R received B.E degree in Electronics and
Communication from Visvesvaraya Technological
University in 2014. Her area of interest includes wireless
communication, networking and programming languages.
Arshiya Farheen received B.E degree in Electronics and
Communication from Visvesvaraya Technological
University in 2014. Her area of interest includes
technology, computer networks, wireless communication,
and programming languages.

Contenu connexe

Tendances

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
 

Tendances (20)

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
20320130406029
2032013040602920320130406029
20320130406029
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
B05630814
B05630814B05630814
B05630814
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 

En vedette

Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Eswar Publications
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDESEswar Publications
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Eswar Publications
 
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...Eswar Publications
 
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Eswar Publications
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesEswar Publications
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upEswar Publications
 
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsAn Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsEswar Publications
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 
Diagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesDiagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesEswar Publications
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
Effective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEffective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEswar Publications
 
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...Eswar Publications
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsEswar Publications
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...Eswar Publications
 

En vedette (19)

Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
 
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
The Concept of Authenticity in Philosophy of Sartre and Implications for Usin...
 
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
 
A Framework for Multicloud Environment Services
A Framework for Multicloud Environment ServicesA Framework for Multicloud Environment Services
A Framework for Multicloud Environment Services
 
Information-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks upInformation-Flow Analysis of Design Breaks up
Information-Flow Analysis of Design Breaks up
 
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsAn Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
Diagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through ImagesDiagnosis of Rectal Cancer through Images
Diagnosis of Rectal Cancer through Images
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
Effective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LANEffective Access Point Selection for improving Throughput in Wireless LAN
Effective Access Point Selection for improving Throughput in Wireless LAN
 
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
A Review on Speech Corpus Development for Automatic Speech Recognition in Ind...
 
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projectsThe use of Monte Carlo simulation in quantitative risk assessment of IT projects
The use of Monte Carlo simulation in quantitative risk assessment of IT projects
 
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
 

Similaire à An Adaptive Cluster Based Routing Protocol for WSN

Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKcscpconf
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 

Similaire à An Adaptive Cluster Based Routing Protocol for WSN (20)

Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
 
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORKENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
ENERGY OPTIMISATION SCHEMES FOR WIRELESS SENSOR NETWORK
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
La3518941898
La3518941898La3518941898
La3518941898
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 

Plus de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

Plus de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Dernier

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Dernier (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

An Adaptive Cluster Based Routing Protocol for WSN

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290 2611 An Adaptive Cluster Based Routing Protocol for WSN Raghunandan G H Department of Telecommunication Engineering, BMS Institute of Technology and Management, Bengaluru-64 Email: raghunandangh@bmsit.in Navyashree R, Jagadish S , Arshiya Farheen Department of Electronics and Communication Engineering, Global Academy of Technology, Bengaluru-98 Email: navyashree47@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- The Wireless sensor networks (WSN) consisting of a large number of sensors that are effective for gathering data in a variety of environments, as the sensor operate on battery which is of limited power. To support high scalability and better data aggregation in fixed base station communication, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSN which incorporate efficient utilization of limited resources of sensor nodes. These clusters are formed by specialized cells. Each cluster is managed by a special node called cluster head and advanced node. An algorithm for better cluster head selection based on the node energy and the distance from base station to the cluster head for the efficient transmission and to reduce energy consumption by the sensor nodes is proposed in this paper. And the same algorithm is compared with the LEACH algorithm in terms of energy consumption. Keywords - Wireless sensor network, clusters, cluster head, advanced node, LEACH -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: May 08, 2015 Date of Acceptance: July 17, 2015 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Wireless Sensor Network (WSN) (fig. 1) contains hundreds or thousands of sensor nodes which can be networked in many applications and have the ability to communicate either among each other or directly to an external base-station [2]. The fig 2 shows the schematic diagram of sensor node architecture where each sensor node comprises sensing, processing and transmission, mobilizes, position finding system, and power units also shows the communication architecture of a WSN [4]. Each sensor node bases its decision on its mission, the information it currently has, knowledge of its computing, communication, and energy resources and have capability to collect and route the data either to other sensors or back to an external base station or stations which may be a fixed or a mobile node capable of connecting the sensor network to an existing communication infrastructure or to the Internet where users have access to the reported data [5].WSNs need to be stable in design and structure to transfer data among the wireless sensors safely and without any problems, because of their use in critical areas and real time systems. Moreover, consuming less energy and increasing the lifetime of the wireless sensor nodes are the main objectives in designing the WSN, because of the limitation of the power resources and the difficulties of replacing the batteries of the wireless sensors [3]. The architecture of WSN varies for an individual sensor node and the entire network. Energy efficiency, size reduction and minimum cost are the main concern for sensor node architecture [8]. Fig. 1: Wireless Sensor Networks Section II gives the brief description of the existing routing protocols. Section III dealt with the description of the proposed algorithm. Section IV is dealt with the implementation of the proposed algorithm. Section V gives Performance evaluations. Section VI is dealt with simulation results of the proposed algorithm. Future research is explained in Section VII, and finally, Section VIII gives the conclusion of the paper. Fig. 2: Sensor node Architecture
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290 2612 II. RELATED WORK Routing in sensor networks has attracted a lot of attention in the recent years and has introduced unique challenges compared to traditional data routing in wired networks. [W. Heinzelman, A. Chandrakasan][1] proposed, LEACH (Low-Energy Adaptive Clustering Hierarchy), a Clustering-based protocol utilizes randomized rotation of local cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base stat ion. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks [1]. [Raghunandan.G.H and Sagar Metri][5] Proposed, Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation and wireless communications capabilities. Evolution in wireless sensor network has broadened its pervasive and ubiquitous applications in numerous fields. These applications often require accurate information collecting as well as uninterrupted, prolonged active service. Routing protocols have significant impact on the overall energy consumption of sensor networks. Suitable Energy-efficient routing algorithms are required to the inherent characteristics of these types of networks are needed. Due to resource limitations in wireless sensor networks, prolonging the network lifetime has been of a great interest. Most of the energy of sensor nodes is utilized for transmission of data to the base station. Thus, it makes them to deplete their energy much faster. In this paper, Centrality based Cluster approach is used along with a movable base station to reduce the energy consumption of cluster heads. According to the simulation results, the proposed scheme has proved its efficiency in the network lifetime, residual energy of network. The proposed scheme also shows improvement in performance of WSN compared to other routing scheme. III. PROPOSED ALGORITHM Wireless sensor networks are fast growing and an existing research area which has attracted considerable research attention in the recent past. In hierarchical routing algorithms, CHs are responsible for gathering, compressing and forwarding the data to the base station. Thus, they are responsible for conveying the entire information of the members of that cluster. It is also important to form the clusters for efficient transmission of the data in WSN [4]. In the proposed algorithm clusters will change for every round. It allows sensors to distribute the sensing task by partitioning the space in a meaningful way. Here algorithm cell of the sensors is the subset of the plane in which all points are closer than to any other sensors. After organizing nodes into clusters, the cluster head (CH) is selected at the beginning of each round based on certain criteria [4]: 1. CH's residual energy: if the sensor in the cluster has more energy than others, then that sensor is selected as cluster head (CH). 2. Distance from base station to CH: The more distant the CH is from the base station, the more energy is required for data communications. Hence more preference is given to that CH. 3. Apart from cluster heads, there will be advanced nodes which will be having second highest energy. A. Data propagation in WSN 1. Initially, the sensor node senses the event and transmits it to the Cluster Head. 2. The Cluster Head processes the data and transmits it to the Advance node. 3. Then advanced node transmits this processed data to the based station. Fig. 3: Data propagation in WSN IV. IMPLEMENTATION The algorithm must be energy efficient so that it does not drain resources away from the primary intended use of cell phones for voice/data communication. We are calculating the total energy consumption of all nodes for various cluster radii. Our energy model for sensors is based on the first order radio model described in fig 4. Fig4: Radio energy dissipation model Table 1: Radio Characteristics Operation Energy dissipated. Transmitter Electronics(ETX) Receiver Electronics(RTX) ETX=RTX= Eelec 50nJ/bit Transmit Amplifier 100pJ/bit/m2 Cluster Head Base Station Event Cluster Members Advanced nodes
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290 2613 In our work, we assume a simple model where the radio dissipates Eelec= 50 nJ/bit run the transmitter or receiver circuitry and amp = 100 pi/bit/m2 for the transmit amplifier to achieve an acceptable EbNo (see Fig 4 and Table 1). These parameters are slightly better than the current state-of-the-art in radio design. We also assume r2 energy loss due to channel transmission. Thus, to transmit a k-bit message a distance d using our radio model, the radio expends: ��� �, � = ���−� �� � + ���−� � �, � … … … ��� �, � = �� �� ∗ � +∈� �∗ � ∗ �2 And to receive this message, Radio expends: ��� � = ���−� �� � … … … … … … … … … … … … ��� � = �� �� ∗ � For these parameter values, receiving a message is not a low cost operation; the protocols should thus try to minimize not only the transmit distances but also the number of transmit and receive operations for each message. V. PERFORMANCE EVOLUTION Hundred sensors are randomly distributed in 100x100 boundaries as shown in fig.5. The sensor field is located on rectangular coordinates. A base station is located at the centre. All the nodes start with an initial energy of 0.5J. Therefore, total energy of the network is 50J. Cluster head and advanced node is selected randomly, after the completion of first round based on the above criteria mentioned in proposed algorithm. Fig.6 shown below is the clustering of sensor nodes. Here clustering is based on proposed algorithm. In this partition of cells in such a way that points inside a polygon are closer to that cell than any other cells thus one of the vertices of the Polygon is the farthest point of the polygon to the site inside it. Therefore proposed algorithm can be used as one of the sampling method in determining WSN coverage; with the sensors act as the sites, if all polygons vertices are covered then the field is fully covered otherwise coverage holes exist [6]. . Fig. 5: Randomly Distributed Sensors Fig. 6: Clustering of Sensor Nodes Fig.7: WSN after 1500 rounds. We have performed simulation for 1500 rounds.Fig.7 shown is the WSN after 1500 rounds. In this figure red color nodes are the dead nodes. The node is considered to be dead when there is no energy in it for the transmission. Blue color nodes are the alive nodes. In the table below shown consists of parameter details used for proposed algorithm. . Table 2: Parameters Detail Parameter name Values Network area 100*100 BS Location 50*50 Number of nodes 100 Eo(Initial Energy) 0.5J Packet Size 400bits Eelec 50nJ/bit Etx=Erx 50nJ/bit Efs 10pJ/bits/m2 Emp 0.013pJ/bits/m2 EDA 5nJ VI. SIMULATION RESULTS In the simulation process, we evaluate the performance of proposed algorithm in MATLAB simulator. 100 nodes are randomly distributed in a 100 x 100 Sq.m network.
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290 2614 Simulation was performed for 1500 rounds. We compare our proposed algorithm with LEACH. We compute the plot for networks lifetime and remaining energy of the network. Lifetime is considered as the time when the first node dies. Fig.8 shows the number of alive nodes with respect to the operation of the network in rounds. The sensors start dying after 863 rounds in the proposed method, and in the LEACH algorithm nodes start dying approximately around 689 rounds. Therefore, proposed algorithm improves the overall network lifetime. Fig.8 : Network Lifetime Fig.8 describes the network lifetime of the proposed model is greater than the LEACH. Residual energy of the network in each round gives the rate of total energy consumption, which can be a good metric to measure the energy efficiency of the algorithms. Fig. 9: Energy of the network Residual energy of the network in each round gives, rate of total energy consumption, which can be a good metric to measure the energy efficiency of the algorithms. Residual energy plot is shown in fig.9.In the proposed algorithm (fig 9) the residual energy of network is much more than LEACH. VII. FUTURE WORK Future works in routing techniques focus on different directions. In comparison with the above mentioned routing protocols, the energy consumption is high in the LEACH algorithm when compared to the proposed algorithm. There is a need to decrease the energy consumption of the every sensor node. Also, prolonging the network lifetime has been of a great interest due to resource limitations in wireless sensor networks. There needs to be a significant research done to improve the lifetime of the wireless sensors. Works on reducing the energy consumption by the nodes need to be done in a more efficient manner. VIII. CONCLUSION Power consumption is an important factor for network lifetime in wireless sensor networks. In clustering hierarchy, the cluster head decision is a major challenge. If network is taken as a whole, then the power consumption can be optimized by the rotation of this cluster head inside the individual clusters. In this paper, a new technique is proposed to select cluster head among some of the wireless sensor nodes based on net distance with base station. The proposed technique resulted in the increased lifetime of the whole network, and increased the number of nodes, which will remain alive for the maximum period of time. REFERENCES [1] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy- Efficient Communication Protocol for Wireless Micro-sensor Networks", In proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS '00), January 2000. [2] Raghunandan.G.H, Lakshmi.B.N "A Comparative Analysis of Routing Techniques for Wireless Sensor Networks", Proceedings of the IEEE National Conference on Innovations in Emerging Technology, IEEE Conference Proceedings febraury2011. [3] Raghunandan.G.H, Lakshmi.B.N "A Taxonomy of Secure Routing protocols for Wireless Sensor Networks", Proceedings of the International Conference on Frontiers of computer science, August 2011. [4] Raghunandan.G.H, Vivek Kumar, Kiran George "A Comparative Analysis of Hierarchical Routing Protocols in WSN" in the proceedings of DRDO Sponsored 8th International Conference on Control and Instrumentation Sysytem-2011, MIT, 2011. [5] Raghunandan GH, Metri S (2012) “A novel approach to increase overall efficiency in wireless sensor networks”, IEEE international conference on computing, electronics and electrical technologies 2012. pp 699–703. [6] Waleed Alsalih, Kamrul Islam, Yuraj, Henry Xiao “distributed voronoi diagram computation in wireless sensor network”.
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2611-2615 (2015) ISSN: 0975-0290 2615 [7] S. Nithyakalyani and S. Suresh Kumar. “Energy Efficient Data Aggregation using Voronoi based Genetic Clustering Algorithm in WSN”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.4, September 2012. [8] Nasrin Abazari Torghabeh, Mohammad Reza Akbarzadeh, Mohammad Hossein Y aghmaee, "Mobile base station Management using fuzzy logic in wireless sensor networks" in the proceedings of 2nd International Conference on Computer Engineering and Technology, 2010. Biographies and Photographs Raghunandan G.H received B.E degree in Electronics and Communication Engineering from Visvesvaraya Technological University. He did his M.Tech in the field of Digital Electronics and communication from Visvesvaraya Technological University, Belgaum. He is currently working as Assistant Professor in Telecommunication Department of BMS Institute of Technology and Management, Bengaluru. His areas of interest are Wireless Ad-Hoc and Sensor Networks. He has published 11 papers at International conferences 12 papers in national conferences and 3 papers in International journals. Jagadish S received B.E degree in Electronics and Communication from Visvesvaraya Technological University in 2014. His area of interest includes technology, wireless communication, and programming languages. Navyashree R received B.E degree in Electronics and Communication from Visvesvaraya Technological University in 2014. Her area of interest includes wireless communication, networking and programming languages. Arshiya Farheen received B.E degree in Electronics and Communication from Visvesvaraya Technological University in 2014. Her area of interest includes technology, computer networks, wireless communication, and programming languages.