Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).



Similar documents
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Node Degree based Clustering for WSN

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Design of Remote data acquisition system based on Internet of Things

Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey

Routing Protocols for Wireless Sensor Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Hybrid Data Gathering Scheme in Wireless Sensor Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Wireless Sensor Network: Improving the Network Energy Consumption

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Survey on different attacks in Wireless Sensor Networks and their prevention system

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Research Article CAPNet: An Enhanced Load Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs

Customer Specific Wireless Network Solutions Based on Standard IEEE

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Efficient Data Transmission For Wireless Sensor Networks

DATA AGGREGATION FOR ANT COLONY TECHNIQUES IN WIRELESS SENSOR NETWORK

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Demystifying Wireless for Real-World Measurement Applications

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Prediction of DDoS Attack Scheme

BIO-INSPIRED, CLUSTER-BASED DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS. Vergin Raja Sarobin M. 1*, R. Ganesan 1

Development of cloud computing system based on wireless sensor network protocol and routing

The Monitoring of Ad Hoc Networks Based on Routing

Cooperative OCEAN Based Technique for Isolating Attack in Wireless Sensor Network

A Short Survey on Secure Routing Protocols in Hierarchical Cluster- Based Wireless Sensor Networks

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Load Balancing Routing Algorithm for Data Gathering Sensor Network

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Figure 1. The Example of ZigBee AODV Algorithm

Analysis of GSM Network for Different Transmission Powers

A Security Architecture for. Wireless Sensor Networks Environmental

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Optimized Load Balancing Mechanism Using Carry Forward Distance

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Routing Techniques in Wireless Sensor Networks: A Survey

Online Communication of Critical Parameters in Powerplant Using ZIGBEE

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Performance of Wireless Body Sensor based Mesh Network for Health Application

Wireless Sensor Networks Database: Data Management and Implementation

Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks B. PRANAY KUMAR 1, D. KRISHNA 2, P. RAVINDRA 3

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Some Security Trends over Wireless Sensor Networks

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

TOPOLOGIES NETWORK SECURITY SERVICES

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Improved Termite Hill Routing Protocol using ACO in WSN

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Study of Network Characteristics Incorporating Different Routing Protocols

Transcription:

Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Relative Analysis of Hierarchical Routing in Wireless Sensor Networks Using Cuckoo Search Navpreet Singh * Viney Popli Barinder Paul Singh PrincipaL, F.C.E.T. Polytechnic Wing Head, Applied Sciences Assistant Professor, ECE Department Ferozeshah, Punjab, India F.C.E.T., Ferozeshah, Punjab, India F.C.E.T., Ferozeshah, Punjab, India Abstract Wireless sensor networks are those networks which are composed by the collection of very small devices mainly named as nodes. These nodes are integrated with small battery life which is very hard or impossible to replace or reinstate. For the sensing, gathering and processing capabilities, the usage of battery is must. Therefore, the battery life of Wireless Sensor Networks should be as large as possible in order to sense the information around it or in which the nodes are placed. The concept of hierarchical routing is mainly highlighted in this paper, in which the nodes work in a hierarchical manner by the formation of Cluster Head within a Cluster. These formed Cluster Heads then transfer the data or information in the form of packets from one cluster to another. In this work, the protocol used for the simulation is Low Energy adaptive Clustering Hierarchy which is one of the most efficient protocol. The nodes are of homogeneous in nature. The simulator used is MATLAB along with Cuckoo Search Algorithm. The Simulation results have been taken out showing the effectiveness of protocol with Cuckoo Search. Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS). I. INTRODUCTION The Wireless Sensor Networks (WSNs) in general, composed of immense extent of sensor nodes organized profusely over a definite perceptible region. The nodes or sensors necessitate diminutive power for their action and inexpensive in nature also. These nodes or devices are supplied with entrenched microcontrollers, radio receivers and energy systems for the development of sensing and processing of information. The devices or nodes sense the information from the environment surrounding them. The sensed data is then gathered or collected by the node on intermediate side. The intermediate node then transmits the gathered data to the Base Station (BS) which is also called Main Node or Central Node This main node then makes contact with the client or user or also called end user. The end user is then contacted by the Base Station. The process of conveyance of information or data is done by using the technique named Routing. Routing mechanism plays a vital role for the transference of information because the path is provided by the routing [1]. The transmission becomes proficient if the routing is competent and becomes ineffectual by the exploitation of disorganized routing. Apart from the concept of routing, the passage of information also depends largely on the nature of protocol used. Various routing protocols are used in last decade which show an imperative role in enhancing the lifetime of network by providing the path which is efficient in nature [2]. The basic architecture of WSN is shown in the figure1. Fig. 1 Architecture of Wireless Sensor Network 2014, IJARCSSE All Rights Reserved Page 288

Figure 1 shows the fundamental architecture of Wireless Sensor Network which demonstrates the integration of a collection of components used for the development of WSN. The clarification of the components used for the formation of WSN is enlightened in the points below: a) A radio transceiver with an internal antenna or connection to an external antenna, b) Microcontroller, c) An electronic circuit to provide interfacing with the sensors and a power source, more often a battery or an embedded form of energy harvesting. A. Topologies of Wireless Sensor Networks Apart from this, the WSNs nodes are generally structured in one of three types of network topologies called Star Topology, Cluster Tree Topology and Mesh Topology. Fig. 2 Topologies of Wireless Sensor Network In a star topology, each and every node makes contact directly to a gateway node. In a cluster tree network, each node connects to a node higher in the tree and then to the gateway, and data is routed from the lowest node on the tree to the gateway. Finally, to suggest improved consistency, Mesh Networks feature nodes which can unite to multiple natures of nodes in the system and pass data through the majority dependable route accessible. This mesh link is often referred to as a router [3] [4]. B. Routing and Various Routing Protocols in Wireless Sensor Networks Flat networks - The first type of routing protocols are the multi-hop at routing protocols. In at networks, each node usually exhibits the equivalent role and sensor nodes work together together to complete the sensing task. Because of large number of these nodes, it becomes infeasible to assign a global identifier to every node and led to data centric routing, where the BS releases some queries to certain areas and waits for the data or information from the sensors positioned in the preferred areas. Routing Information Protocol (RIP) is an example of a Flat routing protocol [4]. Fig. 3 Routing Techniques in Wireless Sensor Networks Hierarchical networks - Hierarchical routing is also called cluster-based routing, proposed mainly in wireline networks, is a well-known technique with special advantages related to scalability and proficient communication. As such, the concept of hierarchical routing is also used to perform energy-efficient routing in WSNs. In a hierarchical routing design, nodes with higher energy are used to process and transmit the information while the nodes having lower energy nodes are be used to execute the sensing process within the immediacy of an aim. Low Energy Adaptive Clustering Hierarchy (LEACH) is an efficient and one of the most prominent protocols used in this concept of routing in which the formation of cluster heads takes place for the transference of data from source node to destination node [5]. Location-based networks - In location-based clustering, the location or locality of the sensor nodes plays an important role. BSs are put forward for the routing of data to specific destinations. In these networks, the position awareness of the sensor nodes becomes important to route data to destinations. The distance between contiguous or neighboring nodes can be predictable on the foundation of potency of arriving signal. According to location- 2014, IJARCSSE All Rights Reserved Page 289

based routing's protocols, if there is no activity then nodes should go to sleep mode to save energy. Location- Aided Routing (LAR) and Distance Routing Effect Algorithm for Mobility (DREAM) are examples of location based protocols [6] [7]. Chain Routing - Chain Routing is an efficient and most widely used routing technique now days because of the formation of Leader Node instead of CHs. In this technique, node sends the data to nearest neighbor node in order to transfer data to BS. The node has to send all of its data to its nearest node and the receiver node act as leader node. Power Efficient Gathering in Sensor Information System (PEGASIS) is an efficient chain based routing protocol [4]. Various energy efficient optimization algorithms like Ant Colony Optimization algorithm, Particle Swarm Optimization algorithm and Fuzzy rules [8] have been proposed during last decade which enhance the energy efficiency of WSN in number of ways. In this paper, Cuckoo Search Scheme is being implemented along with one of an efficient hierarchical routing protocol LEACH. After discussing some of the challenges and advantages of WSN in section I, the rest of the paper is organized as follows. Section II discusses about the concept of LEACH protocol and Section III focuses on Cuckoo Search algorithm. Results and Simulation is shown in Section IV. Section V describes the conclusion and future scope of the proposed work. II. LOW ENERGY ADAPTIVE CLUSTERING HIERARCHY AND CUCKOO SEARCH Low Energy Adaptive Clustering Hierarchy (LEACH) is a hierarchical routing s an efficient routing protocol which works on the formation of CHs within a cluster. The CHs then make contact with each other for the transference of data from one node to another until the data reaches to the final node i.e. BS. LEACH was proposed in the year 2000 by Heinzelman [2] which is also known as Hierarchical Clustering algorithm for sensor networks [3]. The concept of distributed cluster formation in the implementation of LEACH protocol gives the about regarding its cluster-based nature. The working of LEACH protocol is based on the concept of hierarchical routing scheme in which the formation of two layered structure take place. The one layer is used for the selection of the CH while the second layer is used to route the data from one node to another [9]. LEACH protocol works on two phases which are named as setup phase and steady state phase. The work of setup phase is to select the CHs after the proper association of clusters. On the other hand, the transference of data from one node to another node takes place in the second phase named as steady state phase. To reduce the effect of overhead, the duration of second phase i.e. steady state phase is kept longer than that of setup phase [4]. The working of LEACH protocol in terms of transmitting and receiving of data is based on the allocation of diverse set of Code Division Multiple Access (CDMA) codes which helps in the secure interlink among the nodes. The data received by the CH from the node has to be compressed first before the transmission of data to the BS. This prevents the congestion within the network which helps in increasing the efficiency of the network [13]. The nodes in LEACH protocol are homogeneous in nature which means that all the nodes are equipped with same amount of energy levels and are capable to perform the same tasks of sensing, gathering or compressing and transmitting the data. This is one of the biggest disadvantages in LEACH protocol where the energy level of BS is same as that of other nodes deployed. This also reduces the efficiency of LEACH protocol because the communication at larger distances gets affected by the same energy level of BS as that of other nodes [4]. The equation used for the working of LEACH is shown beneath [14]. p T n = 1 p(rmod 1 if n G p ) Cuckoo Search is an optimization algorithm which was mainly developed to provide efficiency to WSNs. This algorithm is inspired by necessitate brood parasitism of some of the varieties of cuckoo by lying their eggs in the nests of other host birds. Some of the hosts birds can connect variance with the obtrusive cuckoos. Cuckoo Search is entirely based on three idealized regulations. Each cuckoo put down one egg at an instance, and deposits its egg in a arbitrarily preferred nest. The finest nests with superiority of eggs will bring over to the next creation. The quantity of accessible hosts nests is predetermined, and the egg laid by a cuckoo is exposed by the host bird with a possibility. III. PROPOSED METHODOLOGY Energy Efficiency is one of the most considerable concerns in WSNs on which the lifetime of a network can be determined. WSNs are integrated with a small or restricted battery source which is very hard of impossible to recharge after the drainage. Hence, many energy efficient techniques are proposed to deal with this vital issue. Many energy efficient routing protocols and algorithms have been put forward to minimize this issue. But, there are some of the drawbacks faced in all the methods applied. LEACH protocol is one of an efficient protocol used to control this issue but because of the deployment of homogeneous nodes, the protocol is not as efficient as required. Hence, in this paper an improved variant of LEACH protocol is proposed which works on the concept of heterogeneity of nodes so that all the nodes can carry out diverse set of tasks. This variant of LEACH protocol is taken as Improved LEACH. The proposed heterogeneity lies in the term of energy allocated to the nodes. The node with higher energy among other nodes in the cluster becomes the CH in the proposed variant of LEACH protocol. By this reason, the CH node can cover or make contact with the far away nodes in order to transfer the data to the larger distances. The overhead also get minimized by the homogeneity in the energy level of the nodes. The comparative analysis of both of the protocols is discussed in the section of results and discussion. The flow of work is discussed in seven stages which are discussed as follows. 2014, IJARCSSE All Rights Reserved Page 290

Fig. 4 Proposed Methodology Figure 4 clearly shows the working of proposed paper. The first process is used for the generation of environment using MATLAB and the deployment of nodes takes place in step 2. The LEACH protocol is then implemented in step 3 and the formation of clusters occurs in step 4. After this, the election of CHs takes place in the same step, step4. The Cuckoo Search is them applied at step 5. In step 6, the network lifetime get enhanced. IV. SIMULATION RESULTS AND DISCUSSION In this section, the simulation results and discussion has been carried out. The whole of the work is done by using core i5 processor workstation have MATLAB 7.11. The simulation results show that the lifetime of network increases when LEACH protocol is used along with Cuckoo Search algorithm than that of traditional LEACH protocol. Fig. 5 Lifetime of Network Figure 5 clearly shows that the lifetime of LEACH protocol is more than that of traditional LEACH protocol when get modeled with Cuckoo Search algorithm. The traditional LEACH protocol looses all of its energy at maximum of 800 rounds while LEACH with Cuckoo Search crosses 1400 rounds and died at 1450 approx. Fig. 6 Residual Energy of Network 2014, IJARCSSE All Rights Reserved Page 291

Figure 6 represents the average remaining energy of the nodes which is also called residual energy. Again, the residual energy of LEACH with Cuckoo Search is more than that of conventional LEACH protocol. Hence, the simulation results show that the LEACH protocol shows efficient and effective results when used along with Cuckoo Search algorithm. V. CONCLUSION In this section, we can conclude that the energy efficiency is one of an imperative issue which occurs mainly in Wireless Sensor Networks. To enhance the lifetime of network, LEACH protocol comes out to be more efficient which is a part of hierarchical routing. LEACH transfers the data or information from source node to destination node or BS by the formation of hierarchical networks along with CH within a cluster. The LEACH protocol comes out to be more efficient and significant when used with Cuckoo Search algorithm which is an optimization algorithm. REFERENCES [1] I. F. Akyildiz, W. Su, Y. Sankarabramaniam and E. Cayirci, A Survey on Sensor Networks, IEEE Communications Magazine, vol. 40, pp. 102--114, 2002. [2] W.R. Heinzelman, A. Chandrakasan and H. Balakrishnan, Energy-Efficient Communication Protocol for Wireless Microsensor Networks, in proceedings of Hawaii international conference on system sciences, IEEE, pp. 1-10, 2000. [3] E. H. Callawa, Wireless Sensor Networks: Architectures and Protocols, Boca Raton, FL: Auerbach Publications, 2003. [4] K. Sohrabi and J. Pottie, Protocols for self-organization of a wireless sensor network, IEEE Personal Communications, vol. 7, no. 5, pp. 16--27, 2000. [5] J. N. Al-Karaki and A. E. Kamal, Routing Techniques in Wireless Sensor Networks: A Survey, ICUBE initiative of Iowa State University, Ames, IA 50011, pp. 1 36, 2004 [6] B.P. Singh, A. Arora and A. Kumar, Security in Wireless Sensor Network, Journal of Advances in Physics, vol.1, no. 3, pp. 1--4, 2010. [7] S.K. Singh, M.P. Singh, and D.K. Singh, Routing Protocols in Wireless Sensor Networks - A Survey, International Journal of Soft Computing and Engineering (IJSCE), vol. 72, no. 8, pp. 35--39, 2011. [8] V. Popli and B.P. Singh, Fuzzy Sets and Artificial Intelligence: A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 10, pp. 308-313, 2014. [9] H. Deepa and A.K. Das, A Study on Routing Protocols in Wireless Sensor Network, International Journal of Computer Applications, vol. 72, no. 8, pp. 35--39, 2013. [10] V. Geetha, P.V. kallapur, and S. Tellajeera, Clustering in Wireless Sensor Networks: Performance Comparison of LEACH & LEACH-C Protocols Using NS2, 2nd International Conference on Computer, Communication, Control and Information Technology (C3IT-2012) ELSEVIER, vol. 4, pp. 163-170, 2012. [11] J. N. Al-Karaki and A.E. Kamal, Routing Techniques in Wireless Sensor Networks: A Survey, Wireless Communications, IEEE, vol. 11, no. 6, pp. 6--28, 2004. [12] J.W. Lee and J.J. Lee, Ant-Colony-Based Scheduling Algorithm for Energy-Efficient Coverage of WSN, IEEE Sensors Journal, vol. 12, no. 1, pp. 3036--3046, 2012. [13] B.P. Singh, Rajni and G. Singh, Comparative Analysis of Efficient Energy Coverage Problem of WSN with ACO and ACB-SA, International Journal of Recent Trends in Engineering and Technology, ACEEE (a subdivision of IDES), vol. 11, no. 2, pp. 371-377, 2014. [14] B.P. Singh, Rajni and G. Singh, Investigation of Efficient Energy Coverage Problem in Wireless Sensor Networks with ACO and ACB-SA, in proceedings of ERCICA, ELSEVIER, pp. 559-563, 2014. AUTHORS BIOGRAPHY Er. Navpreet Singh received his Bachelor of Engineering degree from Nagpur University in the year 1998. He has done his MBA from Punjab Technical University, Jalandhar and Masters of Technology from Karnatka University in 2005 and 2012 respectively. He is currently serving as the post of Principal (Polytechnic Wing), Ferozepur College of Engineering and Technology, Ferozeshah. He has 16 years of work experience. His area of interest includes Digital Electronics and Wireless Communication. Mr. Viney Kumar Popli passed his M.Sc. from Guru Nanak Dev University, Amritsar, India, in 2003, M.Phil. from Madurai Kamraj University, Madurai, India, in 2008. He is pursuing his Ph.D. degree in Mathematics. He is currently an Assistant Professor and Head, Department of Applied Sciences and Humanities, at Ferozepur College of Engineering and Technology, Ferozeshah. He has 11 years of work experience. His area of interest is Fuzzy logic and Boolean Algebra. Er. Barinder Paul Singh received his Bachelor of Technology and Masters of Technology Degrees from Shaheed Bhagat Singh State Technical Campus, Ferozepur, India, in 2010 and 2014 respectively in Electronics and Communication Engineering. He is currently working as the post of Assistant Professor in Department of Electronics and Communication Engineering at Ferozepur College of Engineering and Technology, Ferozeshah. He has 4.5 years of work experience. His area of interest includes Wireless Sensor Networks, Ad-hoc Networks and Fuzzy Logic. He has 5 publications in reputed international journals. 2014, IJARCSSE All Rights Reserved Page 292