SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 61
Cluster Based Routing Protocol for Wireless Sensor Network
Vijaya Chaturvedi1,Dr. Siddhartha Choubey2, Shankar Sharan Tripathi3
1,2,3Department of Computer Science & Engineering, Shri Shankaracharya Technical Campus, Bhilai (C.G.)
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - nowadays the wireless communication
technologies are widely used across the worldwide to
uphold the communication necessitiesfortheendusers.The
wireless sensor network is formed by the number of
detection stations which are regarded as nodes. Every node
is generally of small, lightweight and portable. The main
components of the sensor nodes are the transducer,
microcomputerandpowersource.Generally,these networks
are implemented in hazardous locations where it is very
difficult to recharge and replace the power source. Again
human monitoring scheme is also very risky there. Here
energy consumption is the main issue becausecluster-based
protocols follow non-uniform node distribution. In this
paper, we proposed to avoid such type of problem an
energy-aware clustering algorithm (EADC) is proposed.
Keywords: cluster head, energy-aware clustering
algorithm, energy efficient, wireless sensor networks,
Cluster node.
I. INTRODUCTION
In wireless sensor networks, A number of self-organized
sensor nodes compose the wireless sensor network (WSN).
The main functionality of this kind of network is to perceive
and gather data from the environment and to send them to
users. The Low Energy Adaptive Clustering Hierarchy
(LEACH) protocol, for instance, employs a hierarchical
approach for clustering the network. There is an adopted
cluster head for managing each cluster.Theclusterheadisin
charge of several tasks; first, it is comprised of collecting
data supplied from the members of a cluster on a periodical
basis. It aggregates the data after gathering them. The next
main task assigned to a cluster head is to directly transmit
the aggregated data to the basestation.Themainobjectiveof
TDMA based schedule is to provide a particular time to each
cluster member for data transmission. Cluster members
learn the schedule and accordingly transmit data.
DRAWBACKS of LEACH Algorithm:
● In the LEACH algorithm, each sensor node randomly
selects a cluster head and the energy consumption is
high.
● Un-uniform distributionofclusterheadsirrespectiveof
residual make the network less energy efficient
Figure 1: Cluster-Based WSN.
II. EVOLUTION
In 2001, I.F. Akyildiz, W. Su, Y. Sankarasubramaniam,
E. Cayirci studied about wireless sensornetworksinwhich
they describe the concept of sensor networks which has
been made viable by the convergence of micro electro-
mechanical systems technology, wireless communications
and digital electronics. First, the sensing tasks and the
potential sensor network applications are explored, and a
review of factors influencing the design of sensor networks
is provided.
In 2002, Jason Lester Hill design System
Architecture for Wireless Sensor Networks they present an
operating system and three generations of a hardware
platform designed to address the needs of wireless sensor
networks. Their operating system, called Tiny OS uses an
event based execution model to provide support for fine
grained concurrency and incorporates a highly efficient
component model. Tiny OS enables us to use a hardware
architecture that has a singleprocessortimeshared between
both application and protocol processing. They show how a
virtual partitioning of computational resources not only
leads to efficient resource utilization but allows for a rich
interface between application and protocol processing. This
rich interface, in turn, allows developers to exploit
application specific communication protocols that
significantly improve system performance.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 62
In 2004, Bandyopadyay B, Coyle EJ, “Minimizing
communication costs in hierarchicallyclusterednetworksof
wireless sensors”.In which Hierarchical clusteringalgorithm
is imperative in expanding the lifetime of the network. Here
the algorithm is made out of two stages, the setup stage and
the steady stage. The main theme of the algorithm is how to
choosetheclusterhead.Homogeneousclusteringconvention
expects that all sensor nodes are outfittedwithsimilarmajor
of energy. As a result they can’t take the upside of the
presence of node heterogeneity. Adapting this approach a
cluster head is chosen by the residual energy in every node.
Advantage: To increase the network lifetime.
Disadvantage: Cluster head election is done only based on
the energy consumption.
In 2005, Gamwarige S, Kulasekere E. An algorithm for
energy driven cluster head rotation in a distributedwireless
sensor network. In this literature propose a distributed and
energy driven clustering algorithm where the cluster heads
are selected based on relative residual energy level of
sensors. An Energy Driven Cluster-Head Rotation (EDCR)
protocol initiates a CH rotation based on an energy driven
event. Furthermore the algorithm uses localized
communication within a limited neighborhood to select the
node which has the most residual energy to become the CH,
thus resulting in very low communication overheads during
the selection phase of the algorithm. Furthermore, as the
results will indicate, this has allowed the formation of well
distributed CHs in the system. Further, the reduction in
energy consumption of a node is achieved by initiating this
localized communication protocol only at the point of CH
rotation.
Advantage: Due to initiates the localized communication
protocol, the overhead is reduced.
Disadvantage: Cluster head election is done only based on
the energy consumption
In 2006 John Paul Walters, Zhengqiang Liang,
Weisong Shi, and Vipin Chaudhary decribes As wireless
sensor networks continue to grow, so does the need for
effective security mechanisms. Because sensor networks
may interact with sensitive data and/or operate in hostile
unattended environments, it is imperative that these
security concerns be addressed from the beginning of the
system design. However, due to inherent resource and
computing constraints, security in sensor networks poses
different challenges than traditional network computer
security.
In 2008, Jin Y, Wang L, Kim Y, Yang XZ. “Eemc: An
Energy-Efficient Multi-Level Clustering algorithm for
large-scale wireless sensor networks” This literature
proposes an energy efficient multilevel clustering algorithm
(EEMC) which is intended to accomplish least energy
utilization in the network. In clustering processes the
information accumulation activity is separated into rounds.
Here each round starts with a cluster setup phase, which
implies the node executes EEMC algorithm to form a
multilevel clustering topology freely. Then in the data
transmission phase the node transmits the sensed data
packets to the sink node.
Advantage: To limit the aggregate energy spent in the
network.
Disadvantage: This protocol faces high overhead.
In 2009 Chiara Buratti Andrea Conti DavideDardari
and Roberto Verdonetheir surveypaperaimsatreporting
an overview of WSNs technologies, main applications and
standards, features in WSNs design, and evaluations. In
particular, some peculiar applications, such as those based
on environmental monitoring, are discussed and design
strategies highlighted; a case study based on a real
implementation is also reported.
In 2010 Amar Adnan Rasheed M.S., Northeastern Dr.
Rabi N. Mahapatra In their dissertation, they consider a
number of security schemes for WSN (wireless sensor
network) with MS. The schemes offer high network’s
resiliency and low communication overhead against nodes
capture, MS replication and wormholeattacks.Theypropose
two schemes based on the polynomial pool scheme for
tolerating nodes capture: the probabilistic generation key
pre-distribution scheme combined with a polynomial pool
scheme, and the Q-composite generation key scheme
combined with a polynomial pool scheme. The schemes
ensure low communication overhead and high resiliency.
In 2011, Yu JG, Qi YY, “An energy-driven unequal
clustering protocol for heterogeneous wireless sensor
networks” It incorporates a distributed unequal clustering
algorithm and energy driven versatile cluster head rotation
mechanism utilizing unequal competition ranges to develop
cluster of different size. The clusters which are situated at a
greater distance from the base station are smaller than the
clusters which are nearer to the base station. Here every
node acts as the cluster head once just amid the entire
lifetime.
Advantage: To improve network lifetime and to balance
energy consumption.
Disadvantage: Cluster head election is done only based on
the energy consumption
In 2012 Xuxun Liu In their paper they survey on
Clustering Routing Protocols inWirelessSensorNetworksin
which Based on network structure, routing protocols in
WSNs can be divided into two categories: flat routing and
hierarchical or clustering routing. Owing to a variety of
advantages, clustering is becoming an active branch of
routing technology in WSNs. In this paper, he present a
comprehensive andfinegrainedsurveyonclusteringrouting
protocols proposed in the literature for WSNs. We outline
the advantages and objectives of clustering for WSNs, and
develop a novel taxonomy of WSN clustering routing
methods based on complete and detailed clustering
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 63
attributes. In particular, we systematically analyze a few
prominent WSN clustering routing protocols and compare
these different approaches according to our taxonomy and
several significant metrics.
In 2013 R.U.Anitha and Dr P. Kamalakkannan, in
their paper they developed Enhanced Cluster BasedRouting
Protocol for Mobile Nodes in Wireless Sensor Network they
propose an enhanced algorithm for Low Energy Adaptive
Clustering Hierarchy–Mobile (LEACH-M) protocol called
ECBR-MWSN which is Enhanced Cluster Based Routing
Protocol for Mobile Nodes in Wireless Sensor Network.
ECBR-MWSN protocol selects the CHs using the parameters
of highest residual energy,lowestMobilityandleastDistance
from the Base Station. The BS periodicallyrunstheproposed
algorithm to select new CHs after a certain period of time. It
is aimed to prolonging the lifetime ofthesensornetworks by
balancing the energy consumption of the nodes. Then
compare the performance of our proposed algorithm with
the cluster based protocols using ns2 simulator.
In 2014 Agam Gupta and Anand Nayyar studiedabout
Cluster-Based Energy EfficientRoutingProtocolsinWireless
Sensor Networks,Wirelesssensornetworks(WSNs)consists
of large number of multifunctional sensor nodes. Routing
protocols developed for other ad hoc networks cannot be
applied directly in WSN because of the energy constraint of
the sensor nodes. Sensor nodes are battery powered and
deployed in harsh environments so it is not always possible
to recharge or replace the batteries.
In 2015 Jong-Myoung Kim, Seon-Ho Park, Young-Ju
Han and Tai-Myoung Chung, designed Cluster Head
Election mechanism using Fuzzy logic in Wireless Sensor
Networks in which they introduce CHEF-Cluster Head
Election mechanism using Fuzzy logic. By using fuzzy logic,
collecting and calculating overheads can be reduced and
finally the lifetime of the Sensor Networks can beprolonged.
To prove efficiency of CHEF, they simulated CHEF compared
with LEACH using the matlab. Our simulation results show
that CHEF is about 22.7% more efficient than LEACH.
In 2016, Amit Goude & Priya Saxena, in their paper,
Mobile ad hoc network is a most popular technology due to
this ad hoc nature for research and development. Due to ad
hoc nature of network nodes are randomly mobile and their
topology is frequently changing thus each node co-operate
with other to communicate. The dynamically developing
topology is responsible for different kinds of performance
and security issues in network. Additionally in this
conditions the significant amount of resources are also
consumed such as battery power, memory and processing
capability. Therefore, the resource consumption and
performance is a critical issue in this network. In this paper
the resource consumption issues of MANET is investigated
and for optimizing the resources more specifically energy a
clustering based routing protocol is proposed. The paper
also includes a detailed survey on the different energy
preservation technique.
III. PROPOSED SYSTEM
The proposed cluster-based routing algorithm is an
energy efficient clustering approach selectsthecluster-head
efficiently using the parameter remaining energy of the
nodes. It can be considered, the higher the residual energy of
sensor nodes selected as cluster-head. After selection of
cluster-head (CH), sensor nodes that receive CH
advertisement send join request to CH. If the node gets CH
advertisement from two CHs, it will send join request to the
CH that is in a minimum distance to it. After receiving join
request, from the nodes, CH considers those as its members
and prepares TDMA data transmission schedule for each of
its members and broadcast the schedule. After receiving the
schedule, each member broadcast data in its received
schedule. After receiving the data from all of itsmembersCH
aggregates it and transfers it to BS.
Advantages
 It improves the network lifetime in the network.
 It reduces energy consumption.

IV. ARCHITECTURE AND BLOCK DIAGRAM
1. Architecture
Figure 1: EADC_LEACH Based Cluster-Head Selection
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 64
Figure 2: EDC_LEACH Based Cluster – Head Selection
2. Block Diagram
V. MODULE DESCRIPTION
 LEACH: Clustering and Data Transmission
Input: sensors cluster formation, cluster head selection
based on a threshold
Output: data aggregation and data transmission to the
base station
The LEACH in this algorithm, each sensor node has
randomly become a cluster head basedontheconsidered
probability function. It is worth mentioning that the role
of being a cluster head is rotated among all sensor nodes
and consequently the energy consumption of sensor
nodes is balanced. Because of the random selection of
cluster heads in the LEACH, it is highlypossiblethatsome
of the cluster heads are very close to each other.
Therefore, the non-uniform distribution of cluster heads
in the monitored area is one of the maindrawbacksofthe
LEACH. All sensors in a cluster are within the
communication range of the cluster head. The cluster
head interfaces the base station with the sensor network.
The cluster head is in charge of several tasks; first, it is
comprised of collecting data supplied from the members
of a cluster on a periodical basis. The transmission is
directed through a single hop. Making a TDMA-based
schedule is meant to allocate a schedule vacancy to each
cluster to be utilized for transmission, is the primary job.
The cluster members learn by the schedule when the
cluster head disperses it. CH aggregates the data after
gathering them. The next main duty assign to a cluster
head is to straightforwardly transmittheaggregateddata
to the base station.
EADC based Clustering
Input: Sensors, Cluster Formation.
Output: Cluster-head Selection based on Threshold and
Residual Energy.
In the energy-aware clustering algorithm EADC, The cluster
head selection is based on higher residual energy, the
parameter of cluster head competition in EADC is based on
the ratio between the typical residual energy of neighbor
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 65
nodes and the residual energyofthenodeitself.Additionally,
cluster heads broadcast head messages using the same
competition range to create clusters of even sizes. Thus, the
energy consumption among cluster members can be
balanced well.
 EDC-LEACH: Energy, Distance and Connectivity LEACH
Input: Connectivity, Residual Energy
Output: Cluster-head Selection, Threshold Calculation
Connectivity factor is incorporated with residual energy and
distance to sink that improves the clustering efficiency. It is
measured as the inverse of the average distance with
neighbor nodes. If the average distance is lesser it means
that it has a high connectivity with neighbors. Thenode with
high residual energy, low distance to the sink and high
connectivity has a high probability to be elected as CH.
Thereafter, data transmission and data fusion are carried
out. After receiving the data from the CM, CH aggregates the
data and sends it to BS.
Connectivity = 1 / Average Distance of Neighbors
Average Distance = Total Distance of Neighbor / Total
Neighbor count
(The threshold is based on Connectivity Value.)
VI. PERFORMANCE EVALUATION
Residual Energy
It is the average amount of energy remaining in the nodes
after certain network operational period.
Fig 3. Comparison between the residual energy of
EADC and EDC_LEACH
Here residual energy is taken along y-axis and number of
around is taken along the x-axis. From the graph, it is clear
that the amount of residual energy is higher in the proposed
EDC_LEACH protocol than the existing EADC protocol.
Network Lifetime
It is the time period till half of the nodes in the network
remain alive
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 66
Fig 4. Comparison between the network lifetime of
EADC and EDC_LEACH
Here network lifetime is taken along y-axis and number of
around is taken along the x-axis. From the graph, it is clear
that the network lifetime is increased in the proposed
EDC_LEACH protocol than the existing EADC protocol.
VII. CONCLUSION AND FURTHER DEVELOPMENT
The proposed mechanism for cluster-based routing
protocol for wireless sensor networks with non-uniform
node distributionwhichcontainsanenergy-awareclustering
algorithm and a cluster based routing algorithm. The
clustering algorithm balances the energy consumption
among cluster members by constructing equal clusters.
Inevitably, the energy consumption among cluster heads is
an imbalance due to the non-uniform node distribution.
Therefore, a cluster-based inter-cluster routingalgorithm to
balance the energy consumption among cluster heads by
adjusting intra-clusterenergyconsumptionandinter-cluster
energy consumption. Each cluster head chooses a cluster
head with higher residual energyandfewerclustermembers
as its next hop. The imbalanced energy consumption caused
by non-uniform node distribution is solved by increasing
forwarding task of the cluster heads in sparse areas. The
contributed energy, distance and connectivity based
clustering algorithm improves the performance in the
network. Simulation results show that the improved
algorithm can effectivelyreducetheenergylossandimprove
the network lifetime of the node, which greatlyimprovesthe
overall performance in the networks.
REFERENCES
[1] Farooq Anjum and Petros Mouchtaris. Security for
Wireless Ad Hoc Networks. WILEY, 2nd edition, 2007.
[2] Behrouz A. Forouzan. Cryptography and Network
Security. Tata McGraw- Hill, 2007.
[3] Patrick Albers, Olivier Camp, Jean-Marc Percher,Bernard
Jouga, Ludovic M´e, and RicardoStaciariniPuttini.Security in
ad hoc networks: a general intrusion detection architecture
enhancing trust based approaches. In Wireless Information
Systems, pages 1–12, 2002.
[4] Ningrinla Marchang and Raja Datta. Collaborative
techniques for intrusion detection in mobile ad-hoc
networks. Ad Hoc Networks, 6(4):508–523, 2008.
[5] Sergio Marti, Thomas J. Giuli, Kevin Lai, and Mary Baker.
Mitigating routing misbehavior in mobile ad hoc networks.
In MOBICOM, pages 255– 265, 2000.
[6] A.Rajaram and Dr. S. Palaniswami. Malicious node
detection system for mobile ad hoc networks. (IJCSIT)
International Journal of Computer Science and Information
Technologies, 1(2):77–85, 2010.
[7] Digital Signature. http : ==en:wikipedia:org=wiki=digital
signature.
[8 C. Siva Ram Murthy and B. S. Manoj. Ad Hoc Wireless
Networks: Architectures And Protocols. Pearson Education
India, 2008.
[9] Wenjia Li and Anupam Joshi. Security issues in mobile ad
hoc networks. In Ad Hoc Networks, pages 1–23, 2008.
[10] A. S. Tanenbaum. Computer Networks. Prentice Hall,
3rd edition, 2003.
[11] Sheenu Sharma and Roopam Gupta. Simulationstudy of
blackhole attack in the mobile ad hoc networks. In Journal of
Engineering Science and Technology, pages 243–250, 2009.
[12] William S. Stallings. Cryptography and Network
Security. Prentice Hall, 4th edition, 2005.
[13] Nikos Komninos, Dimitris Vergados, and Christos
Douligeris. Detecting unauthorized andcompromisednodes
in mobile ad hoc networks. Ad Hoc Networks,5(3):289–298,
2007.
[14] Teerawat Issariyakul and Ekram Hossain. Introduction
to Network Simulator NS2. Springer, 2008.
[15] Mubashir Husain Rehmani, SidneyDoria,andMustapha
Reda Senouci. A tutorial on the implementation of ad-hoc on
demand distance vector (aodv) protocol in network
simulator (ns-2). In Wireless Information Systems, pages 1–
13, 2009.
[16] Xuxun Liu, A Survey on Clustering Routing Protocols in
Wireless Sensor Networks, Sensors 2012, 12, pages 11113-
11153; doi:10.3390/s120811113.
[17] S.Ganesh and R.Amutha, Efficient and Secure Routing
Protocol for Wireless Sensor Networks through SNR based
Dynamic Clustering Mechanisms, pages 127-134.
[18] Heinzelman, Anantha Chandrakasan, and Hari
Balakrishnan, Energy-Efficient Communication Protocol for
Wireless Microsensor Networks, Hawaii International
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 67
Conference on System Sciences, January 4-7, 2000, Maui,
Hawaii.
19] Sankalpa Gamwarige and Chulantha Kulasekere, An
Algorithm for Energy Driven Cluster Head Rotation in a
Distributed Wireless Sensor Network, the International
Conference on Information and Automation, December 15-
18, 2005, Colombo, Sri Lanka, pages: 354-359.
[20] Jong-Myoung Kim, Seon-Ho Park, Young-Ju Han and
Tai-Myoung Chung, CHEF: Cluster HeadElectionmechanism
using Fuzzy logic in Wireless Sensor Networks, Feb. 17-20,
2008 ICACT 2008, ISBN 978-89-5519-136-3,pages654-659.
[21] Pratyay Kuila and Prasanta K. Jana, Energy efficient
clustering and routing algorithms for wireless sensor
networks: Particle swarm optimization approach,
Engineering Applications of Artificial Intelligence 33 (2014)
127–140.
[22] Huang Lu, Student Member, IEEE,JieLi,Senior Member,
IEEE, and Mohsen Guizani, Fellow, IEEE,SecureandEfficient
Data Transmission for Cluster-Based Wireless Sensor
Networks, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 2014.
[23] Agam Gupta and Anand Nayyar, A Comprehensive
Review of Cluster-Based Energy Efficient Routing Protocols
in Wireless Sensor Networks, International Journal of
Research in Computer and Communication Technology, Vol
3, Issue 1, January- 2014.
BIOGRAPIES
Vijaya Chaturvedi, B.E., M.Tech. Scholar in Computer
Technology & Application Shri Shankaracharya Group of
Institute, Shri Shankaracharya Technical Campus, Faculty of
Engineering & Technology, Bhilai, India. Research areas are
Wireless Sensor Network, mobile ad hoc network & its
enhancement.
Dr. Siddhartha Choubey, Professor, Shri Shankaracharya
Group of Institute, Shri Shankaracharya Technical Campus,
Faculty of Engineering & Technology, Bhilai, India. Having
wide experience in the field of teaching. Research areas are
Wireless Sensor Network, its Enhancements, and His
research work has been published in many national and
international journals.
Shankar Sharan Tripathi, Asst. Professor, Shri
Shankaracharya Technical Campus, Shri Shankaracharya
Engineering College, Bhilai, India. Havingwideexperiencein
the field of teaching. Research areas are Wireless Sensor
Network, its Enhancements, and His researchwork hasbeen
published in many national and international journals.

Más contenido relacionado

La actualidad más candente

E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
ijtsrd
 
Adaptive photovoltaic solar module based on internet of things and web-based ...
Adaptive photovoltaic solar module based on internet of things and web-based ...Adaptive photovoltaic solar module based on internet of things and web-based ...
Adaptive photovoltaic solar module based on internet of things and web-based ...
IJECEIAES
 

La actualidad más candente (17)

Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
 
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...
 
Atul
AtulAtul
Atul
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Adaptive photovoltaic solar module based on internet of things and web-based ...
Adaptive photovoltaic solar module based on internet of things and web-based ...Adaptive photovoltaic solar module based on internet of things and web-based ...
Adaptive photovoltaic solar module based on internet of things and web-based ...
 

Similar a IRJET- Cluster based Routing Protocol for Wireless Sensor Network

Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
IJERD Editor
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 

Similar a IRJET- Cluster based Routing Protocol for Wireless Sensor Network (20)

IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
 
20320130406029
2032013040602920320130406029
20320130406029
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 

Más de IRJET Journal

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

IRJET- Cluster based Routing Protocol for Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 61 Cluster Based Routing Protocol for Wireless Sensor Network Vijaya Chaturvedi1,Dr. Siddhartha Choubey2, Shankar Sharan Tripathi3 1,2,3Department of Computer Science & Engineering, Shri Shankaracharya Technical Campus, Bhilai (C.G.) -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - nowadays the wireless communication technologies are widely used across the worldwide to uphold the communication necessitiesfortheendusers.The wireless sensor network is formed by the number of detection stations which are regarded as nodes. Every node is generally of small, lightweight and portable. The main components of the sensor nodes are the transducer, microcomputerandpowersource.Generally,these networks are implemented in hazardous locations where it is very difficult to recharge and replace the power source. Again human monitoring scheme is also very risky there. Here energy consumption is the main issue becausecluster-based protocols follow non-uniform node distribution. In this paper, we proposed to avoid such type of problem an energy-aware clustering algorithm (EADC) is proposed. Keywords: cluster head, energy-aware clustering algorithm, energy efficient, wireless sensor networks, Cluster node. I. INTRODUCTION In wireless sensor networks, A number of self-organized sensor nodes compose the wireless sensor network (WSN). The main functionality of this kind of network is to perceive and gather data from the environment and to send them to users. The Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, for instance, employs a hierarchical approach for clustering the network. There is an adopted cluster head for managing each cluster.Theclusterheadisin charge of several tasks; first, it is comprised of collecting data supplied from the members of a cluster on a periodical basis. It aggregates the data after gathering them. The next main task assigned to a cluster head is to directly transmit the aggregated data to the basestation.Themainobjectiveof TDMA based schedule is to provide a particular time to each cluster member for data transmission. Cluster members learn the schedule and accordingly transmit data. DRAWBACKS of LEACH Algorithm: ● In the LEACH algorithm, each sensor node randomly selects a cluster head and the energy consumption is high. ● Un-uniform distributionofclusterheadsirrespectiveof residual make the network less energy efficient Figure 1: Cluster-Based WSN. II. EVOLUTION In 2001, I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci studied about wireless sensornetworksinwhich they describe the concept of sensor networks which has been made viable by the convergence of micro electro- mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor network applications are explored, and a review of factors influencing the design of sensor networks is provided. In 2002, Jason Lester Hill design System Architecture for Wireless Sensor Networks they present an operating system and three generations of a hardware platform designed to address the needs of wireless sensor networks. Their operating system, called Tiny OS uses an event based execution model to provide support for fine grained concurrency and incorporates a highly efficient component model. Tiny OS enables us to use a hardware architecture that has a singleprocessortimeshared between both application and protocol processing. They show how a virtual partitioning of computational resources not only leads to efficient resource utilization but allows for a rich interface between application and protocol processing. This rich interface, in turn, allows developers to exploit application specific communication protocols that significantly improve system performance.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 62 In 2004, Bandyopadyay B, Coyle EJ, “Minimizing communication costs in hierarchicallyclusterednetworksof wireless sensors”.In which Hierarchical clusteringalgorithm is imperative in expanding the lifetime of the network. Here the algorithm is made out of two stages, the setup stage and the steady stage. The main theme of the algorithm is how to choosetheclusterhead.Homogeneousclusteringconvention expects that all sensor nodes are outfittedwithsimilarmajor of energy. As a result they can’t take the upside of the presence of node heterogeneity. Adapting this approach a cluster head is chosen by the residual energy in every node. Advantage: To increase the network lifetime. Disadvantage: Cluster head election is done only based on the energy consumption. In 2005, Gamwarige S, Kulasekere E. An algorithm for energy driven cluster head rotation in a distributedwireless sensor network. In this literature propose a distributed and energy driven clustering algorithm where the cluster heads are selected based on relative residual energy level of sensors. An Energy Driven Cluster-Head Rotation (EDCR) protocol initiates a CH rotation based on an energy driven event. Furthermore the algorithm uses localized communication within a limited neighborhood to select the node which has the most residual energy to become the CH, thus resulting in very low communication overheads during the selection phase of the algorithm. Furthermore, as the results will indicate, this has allowed the formation of well distributed CHs in the system. Further, the reduction in energy consumption of a node is achieved by initiating this localized communication protocol only at the point of CH rotation. Advantage: Due to initiates the localized communication protocol, the overhead is reduced. Disadvantage: Cluster head election is done only based on the energy consumption In 2006 John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary decribes As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network computer security. In 2008, Jin Y, Wang L, Kim Y, Yang XZ. “Eemc: An Energy-Efficient Multi-Level Clustering algorithm for large-scale wireless sensor networks” This literature proposes an energy efficient multilevel clustering algorithm (EEMC) which is intended to accomplish least energy utilization in the network. In clustering processes the information accumulation activity is separated into rounds. Here each round starts with a cluster setup phase, which implies the node executes EEMC algorithm to form a multilevel clustering topology freely. Then in the data transmission phase the node transmits the sensed data packets to the sink node. Advantage: To limit the aggregate energy spent in the network. Disadvantage: This protocol faces high overhead. In 2009 Chiara Buratti Andrea Conti DavideDardari and Roberto Verdonetheir surveypaperaimsatreporting an overview of WSNs technologies, main applications and standards, features in WSNs design, and evaluations. In particular, some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted; a case study based on a real implementation is also reported. In 2010 Amar Adnan Rasheed M.S., Northeastern Dr. Rabi N. Mahapatra In their dissertation, they consider a number of security schemes for WSN (wireless sensor network) with MS. The schemes offer high network’s resiliency and low communication overhead against nodes capture, MS replication and wormholeattacks.Theypropose two schemes based on the polynomial pool scheme for tolerating nodes capture: the probabilistic generation key pre-distribution scheme combined with a polynomial pool scheme, and the Q-composite generation key scheme combined with a polynomial pool scheme. The schemes ensure low communication overhead and high resiliency. In 2011, Yu JG, Qi YY, “An energy-driven unequal clustering protocol for heterogeneous wireless sensor networks” It incorporates a distributed unequal clustering algorithm and energy driven versatile cluster head rotation mechanism utilizing unequal competition ranges to develop cluster of different size. The clusters which are situated at a greater distance from the base station are smaller than the clusters which are nearer to the base station. Here every node acts as the cluster head once just amid the entire lifetime. Advantage: To improve network lifetime and to balance energy consumption. Disadvantage: Cluster head election is done only based on the energy consumption In 2012 Xuxun Liu In their paper they survey on Clustering Routing Protocols inWirelessSensorNetworksin which Based on network structure, routing protocols in WSNs can be divided into two categories: flat routing and hierarchical or clustering routing. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. In this paper, he present a comprehensive andfinegrainedsurveyonclusteringrouting protocols proposed in the literature for WSNs. We outline the advantages and objectives of clustering for WSNs, and develop a novel taxonomy of WSN clustering routing methods based on complete and detailed clustering
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 63 attributes. In particular, we systematically analyze a few prominent WSN clustering routing protocols and compare these different approaches according to our taxonomy and several significant metrics. In 2013 R.U.Anitha and Dr P. Kamalakkannan, in their paper they developed Enhanced Cluster BasedRouting Protocol for Mobile Nodes in Wireless Sensor Network they propose an enhanced algorithm for Low Energy Adaptive Clustering Hierarchy–Mobile (LEACH-M) protocol called ECBR-MWSN which is Enhanced Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network. ECBR-MWSN protocol selects the CHs using the parameters of highest residual energy,lowestMobilityandleastDistance from the Base Station. The BS periodicallyrunstheproposed algorithm to select new CHs after a certain period of time. It is aimed to prolonging the lifetime ofthesensornetworks by balancing the energy consumption of the nodes. Then compare the performance of our proposed algorithm with the cluster based protocols using ns2 simulator. In 2014 Agam Gupta and Anand Nayyar studiedabout Cluster-Based Energy EfficientRoutingProtocolsinWireless Sensor Networks,Wirelesssensornetworks(WSNs)consists of large number of multifunctional sensor nodes. Routing protocols developed for other ad hoc networks cannot be applied directly in WSN because of the energy constraint of the sensor nodes. Sensor nodes are battery powered and deployed in harsh environments so it is not always possible to recharge or replace the batteries. In 2015 Jong-Myoung Kim, Seon-Ho Park, Young-Ju Han and Tai-Myoung Chung, designed Cluster Head Election mechanism using Fuzzy logic in Wireless Sensor Networks in which they introduce CHEF-Cluster Head Election mechanism using Fuzzy logic. By using fuzzy logic, collecting and calculating overheads can be reduced and finally the lifetime of the Sensor Networks can beprolonged. To prove efficiency of CHEF, they simulated CHEF compared with LEACH using the matlab. Our simulation results show that CHEF is about 22.7% more efficient than LEACH. In 2016, Amit Goude & Priya Saxena, in their paper, Mobile ad hoc network is a most popular technology due to this ad hoc nature for research and development. Due to ad hoc nature of network nodes are randomly mobile and their topology is frequently changing thus each node co-operate with other to communicate. The dynamically developing topology is responsible for different kinds of performance and security issues in network. Additionally in this conditions the significant amount of resources are also consumed such as battery power, memory and processing capability. Therefore, the resource consumption and performance is a critical issue in this network. In this paper the resource consumption issues of MANET is investigated and for optimizing the resources more specifically energy a clustering based routing protocol is proposed. The paper also includes a detailed survey on the different energy preservation technique. III. PROPOSED SYSTEM The proposed cluster-based routing algorithm is an energy efficient clustering approach selectsthecluster-head efficiently using the parameter remaining energy of the nodes. It can be considered, the higher the residual energy of sensor nodes selected as cluster-head. After selection of cluster-head (CH), sensor nodes that receive CH advertisement send join request to CH. If the node gets CH advertisement from two CHs, it will send join request to the CH that is in a minimum distance to it. After receiving join request, from the nodes, CH considers those as its members and prepares TDMA data transmission schedule for each of its members and broadcast the schedule. After receiving the schedule, each member broadcast data in its received schedule. After receiving the data from all of itsmembersCH aggregates it and transfers it to BS. Advantages  It improves the network lifetime in the network.  It reduces energy consumption.  IV. ARCHITECTURE AND BLOCK DIAGRAM 1. Architecture Figure 1: EADC_LEACH Based Cluster-Head Selection
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 64 Figure 2: EDC_LEACH Based Cluster – Head Selection 2. Block Diagram V. MODULE DESCRIPTION  LEACH: Clustering and Data Transmission Input: sensors cluster formation, cluster head selection based on a threshold Output: data aggregation and data transmission to the base station The LEACH in this algorithm, each sensor node has randomly become a cluster head basedontheconsidered probability function. It is worth mentioning that the role of being a cluster head is rotated among all sensor nodes and consequently the energy consumption of sensor nodes is balanced. Because of the random selection of cluster heads in the LEACH, it is highlypossiblethatsome of the cluster heads are very close to each other. Therefore, the non-uniform distribution of cluster heads in the monitored area is one of the maindrawbacksofthe LEACH. All sensors in a cluster are within the communication range of the cluster head. The cluster head interfaces the base station with the sensor network. The cluster head is in charge of several tasks; first, it is comprised of collecting data supplied from the members of a cluster on a periodical basis. The transmission is directed through a single hop. Making a TDMA-based schedule is meant to allocate a schedule vacancy to each cluster to be utilized for transmission, is the primary job. The cluster members learn by the schedule when the cluster head disperses it. CH aggregates the data after gathering them. The next main duty assign to a cluster head is to straightforwardly transmittheaggregateddata to the base station. EADC based Clustering Input: Sensors, Cluster Formation. Output: Cluster-head Selection based on Threshold and Residual Energy. In the energy-aware clustering algorithm EADC, The cluster head selection is based on higher residual energy, the parameter of cluster head competition in EADC is based on the ratio between the typical residual energy of neighbor
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 65 nodes and the residual energyofthenodeitself.Additionally, cluster heads broadcast head messages using the same competition range to create clusters of even sizes. Thus, the energy consumption among cluster members can be balanced well.  EDC-LEACH: Energy, Distance and Connectivity LEACH Input: Connectivity, Residual Energy Output: Cluster-head Selection, Threshold Calculation Connectivity factor is incorporated with residual energy and distance to sink that improves the clustering efficiency. It is measured as the inverse of the average distance with neighbor nodes. If the average distance is lesser it means that it has a high connectivity with neighbors. Thenode with high residual energy, low distance to the sink and high connectivity has a high probability to be elected as CH. Thereafter, data transmission and data fusion are carried out. After receiving the data from the CM, CH aggregates the data and sends it to BS. Connectivity = 1 / Average Distance of Neighbors Average Distance = Total Distance of Neighbor / Total Neighbor count (The threshold is based on Connectivity Value.) VI. PERFORMANCE EVALUATION Residual Energy It is the average amount of energy remaining in the nodes after certain network operational period. Fig 3. Comparison between the residual energy of EADC and EDC_LEACH Here residual energy is taken along y-axis and number of around is taken along the x-axis. From the graph, it is clear that the amount of residual energy is higher in the proposed EDC_LEACH protocol than the existing EADC protocol. Network Lifetime It is the time period till half of the nodes in the network remain alive
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 66 Fig 4. Comparison between the network lifetime of EADC and EDC_LEACH Here network lifetime is taken along y-axis and number of around is taken along the x-axis. From the graph, it is clear that the network lifetime is increased in the proposed EDC_LEACH protocol than the existing EADC protocol. VII. CONCLUSION AND FURTHER DEVELOPMENT The proposed mechanism for cluster-based routing protocol for wireless sensor networks with non-uniform node distributionwhichcontainsanenergy-awareclustering algorithm and a cluster based routing algorithm. The clustering algorithm balances the energy consumption among cluster members by constructing equal clusters. Inevitably, the energy consumption among cluster heads is an imbalance due to the non-uniform node distribution. Therefore, a cluster-based inter-cluster routingalgorithm to balance the energy consumption among cluster heads by adjusting intra-clusterenergyconsumptionandinter-cluster energy consumption. Each cluster head chooses a cluster head with higher residual energyandfewerclustermembers as its next hop. The imbalanced energy consumption caused by non-uniform node distribution is solved by increasing forwarding task of the cluster heads in sparse areas. The contributed energy, distance and connectivity based clustering algorithm improves the performance in the network. Simulation results show that the improved algorithm can effectivelyreducetheenergylossandimprove the network lifetime of the node, which greatlyimprovesthe overall performance in the networks. REFERENCES [1] Farooq Anjum and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. WILEY, 2nd edition, 2007. [2] Behrouz A. Forouzan. Cryptography and Network Security. Tata McGraw- Hill, 2007. [3] Patrick Albers, Olivier Camp, Jean-Marc Percher,Bernard Jouga, Ludovic M´e, and RicardoStaciariniPuttini.Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In Wireless Information Systems, pages 1–12, 2002. [4] Ningrinla Marchang and Raja Datta. Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6(4):508–523, 2008. [5] Sergio Marti, Thomas J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MOBICOM, pages 255– 265, 2000. [6] A.Rajaram and Dr. S. Palaniswami. Malicious node detection system for mobile ad hoc networks. (IJCSIT) International Journal of Computer Science and Information Technologies, 1(2):77–85, 2010. [7] Digital Signature. http : ==en:wikipedia:org=wiki=digital signature. [8 C. Siva Ram Murthy and B. S. Manoj. Ad Hoc Wireless Networks: Architectures And Protocols. Pearson Education India, 2008. [9] Wenjia Li and Anupam Joshi. Security issues in mobile ad hoc networks. In Ad Hoc Networks, pages 1–23, 2008. [10] A. S. Tanenbaum. Computer Networks. Prentice Hall, 3rd edition, 2003. [11] Sheenu Sharma and Roopam Gupta. Simulationstudy of blackhole attack in the mobile ad hoc networks. In Journal of Engineering Science and Technology, pages 243–250, 2009. [12] William S. Stallings. Cryptography and Network Security. Prentice Hall, 4th edition, 2005. [13] Nikos Komninos, Dimitris Vergados, and Christos Douligeris. Detecting unauthorized andcompromisednodes in mobile ad hoc networks. Ad Hoc Networks,5(3):289–298, 2007. [14] Teerawat Issariyakul and Ekram Hossain. Introduction to Network Simulator NS2. Springer, 2008. [15] Mubashir Husain Rehmani, SidneyDoria,andMustapha Reda Senouci. A tutorial on the implementation of ad-hoc on demand distance vector (aodv) protocol in network simulator (ns-2). In Wireless Information Systems, pages 1– 13, 2009. [16] Xuxun Liu, A Survey on Clustering Routing Protocols in Wireless Sensor Networks, Sensors 2012, 12, pages 11113- 11153; doi:10.3390/s120811113. [17] S.Ganesh and R.Amutha, Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR based Dynamic Clustering Mechanisms, pages 127-134. [18] Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, Energy-Efficient Communication Protocol for Wireless Microsensor Networks, Hawaii International
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 67 Conference on System Sciences, January 4-7, 2000, Maui, Hawaii. 19] Sankalpa Gamwarige and Chulantha Kulasekere, An Algorithm for Energy Driven Cluster Head Rotation in a Distributed Wireless Sensor Network, the International Conference on Information and Automation, December 15- 18, 2005, Colombo, Sri Lanka, pages: 354-359. [20] Jong-Myoung Kim, Seon-Ho Park, Young-Ju Han and Tai-Myoung Chung, CHEF: Cluster HeadElectionmechanism using Fuzzy logic in Wireless Sensor Networks, Feb. 17-20, 2008 ICACT 2008, ISBN 978-89-5519-136-3,pages654-659. [21] Pratyay Kuila and Prasanta K. Jana, Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach, Engineering Applications of Artificial Intelligence 33 (2014) 127–140. [22] Huang Lu, Student Member, IEEE,JieLi,Senior Member, IEEE, and Mohsen Guizani, Fellow, IEEE,SecureandEfficient Data Transmission for Cluster-Based Wireless Sensor Networks, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 3, MARCH 2014. [23] Agam Gupta and Anand Nayyar, A Comprehensive Review of Cluster-Based Energy Efficient Routing Protocols in Wireless Sensor Networks, International Journal of Research in Computer and Communication Technology, Vol 3, Issue 1, January- 2014. BIOGRAPIES Vijaya Chaturvedi, B.E., M.Tech. Scholar in Computer Technology & Application Shri Shankaracharya Group of Institute, Shri Shankaracharya Technical Campus, Faculty of Engineering & Technology, Bhilai, India. Research areas are Wireless Sensor Network, mobile ad hoc network & its enhancement. Dr. Siddhartha Choubey, Professor, Shri Shankaracharya Group of Institute, Shri Shankaracharya Technical Campus, Faculty of Engineering & Technology, Bhilai, India. Having wide experience in the field of teaching. Research areas are Wireless Sensor Network, its Enhancements, and His research work has been published in many national and international journals. Shankar Sharan Tripathi, Asst. Professor, Shri Shankaracharya Technical Campus, Shri Shankaracharya Engineering College, Bhilai, India. Havingwideexperiencein the field of teaching. Research areas are Wireless Sensor Network, its Enhancements, and His researchwork hasbeen published in many national and international journals.