• Tidak ada hasil yang ditemukan

View of IMPROVED CLUSTER BASED ROUTING PROTOCOLS TO BALANCE THE ENERGY DISTRIBUTION IN WSN

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of IMPROVED CLUSTER BASED ROUTING PROTOCOLS TO BALANCE THE ENERGY DISTRIBUTION IN WSN"

Copied!
5
0
0

Teks penuh

(1)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

26

IMPROVED CLUSTER BASED ROUTING PROTOCOLS TO BALANCE THE ENERGY DISTRIBUTION IN WSN

1Paridhi Gupta, M.Tech Scholar, BTIRT, Sagar

2Prateeksha Singhai, Asst. Prof., BTIRT, Sagar

Abstract:- In today’s world use of wireless communication is spread out worldwide. Cluster based routing protocols for Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. In this thesis work four Clusterbasedroutingprotocols has been compared in terms of energy consumption, stability period and life time of the entire network. The Cluster based routing protocols, SEP (Stable Election Protocol), DEEC (Distributed Energy Efficient Clustering), TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol) and LEACH (Low Energy Adaptive Clustering Hierarchy Protocol) along with the improved version of all are compared to achieve the better communication in Wireless framework. iSEP, iDEEC, iTEEN and iLEACH has been proposed and simulated in MATLAB environment. After investigation and study of the simulation output it is found that the proposed protocols are effective in terms of stability period of the network, balanced energy distribution and life time of the entire network.

Keywords:- DEEC, TEEN, SEP, LEACH, iDEEC, iTEEN, iSEP, iLEACH.

1. INTRODUCTION

Wireless Sensor Network (WSN) has played a contributory role in modern wireless and communication system. With a wide range of applications exercised in environmental monitoring, process management, industrial monitoring, healthcare monitoring, WSN is one of the most attentive topicinre search area.

Along with various advantages associated with sensor, there are potential flaws in this topic. A sensor node is characterized by limited memory, limited energy, restricted computational capability.

There are series of issues that are stillleftun solved viz. routing, band width, security, energy, quality of service and many more. A sensor operate son a principle of radio energy principle, which means that there is a closer relationship between energy dissipation and communication performance. With wide range of availability of routing protocols, only few hierarchical routing protocols are found to provide energy efficiency in wireless sensor network.

An optimal routing performance will easily require higher power requirement during routing that significantly reduce the network lifetime of the wireless sensor network. However, the closer investigation shows that energy is the root cause for all form of performance degradation.

The applications of WSN are as follows:- 1. Environmental Monitoring: Sensors

can be used in the surrounding to capture the forest fire, data

of rainfall, precipitation, pollution, landslide, natural calamities, level of pollution etc.

2. Process Management: Various forms of process in factories or industries for example chemical plant, nuclear plant, roadways, airport etc. can bee valuated using sensor nodes.

3. Industrial Monitoring: Sensors are also used for capturing the information about data logging, structural health monitoring, evaluating the health of complex machineries system.

4. Healthcare Monitoring: Sensor nodes can also be used to capture vital statistics as well as certain clinical information to understand specific medical condition of a patient.

2. WORK STUDY

1. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of clustering routing protocols on Wireless Sensor Network (WSN). LEACH algorithm is divided to setup phase and steady state phase. In a busy network, LEACH Routing has a high packet loss. To solve the problem, we need Delay Tolerant Network (DTN). DTN is an advanced architecture that allows communication in extreme conditions like a busy network. In this research, LEACH-WSN changes to optimize the

(2)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

27 network by adding DTN to LEACH-

WSN over DTN. The LEACH-WSN modification by providing a bundle layer to keep the data temporarily.

Simulation is performed to test the performance of LEACH-WSN over DTN based on changes in the number of node and buffer capacity.

2. It is developed a system for web based environment monitoring using the WSN Technology. WSN sensor nodes transmit data to the cloud-based database via Web API request.

Measured data can be monitored by the user anywhere from internet by using the Web Application which one is also compatible for mobile phones.

If the data measured by sensor node exceeds the configured value range in Web Application, Web Application sends a warning e-mail to users for improving environmental conditions.

3. Air and Water are the most important resources of the planet that we use daily for sustaining life. Air quality affects all living creatures, from trees and plants to animals and people. Air quality, especially in the trend of more industrialized cities and with a rapid growing population of cars, is degrading. Continuous monitoring allows the national administrations to take measures in order to reduce pollution and toxic compounds in the air and prevent further degrading of the air quality. From drinking and producing electricity in hydroelectric power plants to cooling nuclear reactors, water is one of the most common substances that we must manage. In flood management applications, hydroelectric dams, city water infrastructure, and other environmental monitoring applications the high distance between measurement points determine engineers and scientists to use autonomous low power wireless data acquisition systems that are independent on a permanent power supply.

4. A Wireless Sensor Network (WSN) is a wireless network consisting of small sensor nodes. Sensors are used to monitor physical or environmental conditions. WSNs are particularly used in military and civilian

applications. As WSNs are generally deployed in an unattended area, they are prone to various types of attacks.

One of the harmful attacks is Sybil attack in which a node illegitimately claims multiple identities. In this scenario, legitimate node shares data to the malicious node and the data are lost. So that it becomes necessary to secure the network from this type of attack.

3. PROPOSED WORK

SEP, DEEC, LEACH, and TEEN protocols along with iSEP, iDEEC, iLEACH, and iTEEN are the proposed protocols for this thesis work. In this thesis all the proposed protocols are considered under observation. Simulation is done on all the protocols which are under consideration. Graphs are plotted between Number of rounds for cluster head selection on x-axis and number of alive nodes on y-axis.

Comparative results are obtained. The simulated results show that the stability, life time and energy distribution of the WSN.For performance evaluation MATLAB software is used. The prime goals in doing simulations was to compare performance of with SEP, DEEC, LEACH, and TEEN protocols with their improved versions on the basis of energy dissipation and longevity of network.

Performance metrics used in the simulations are:-

1. Stability period, the period from the start of the network operation and the first dead node.

2. Instability period, the period between the first dead node and last dead node.

3. Number of alive nodes per round.

4. Number of dead nodes per round.

5. Throughput, number of packets sent from cluster heads to base station.

A network consisting of 100 nodes, placed randomly in a region of MxM and a BS located in the center is considered. We performed simulations for different values of α and m while keeping b constant that is 0.3. For the first case α = 1, m = 0.1, for second case α = 3 and m = 0.2. This is done to observe change in network’s stability, life and throughput relative to increase in number of advance nodes and their energies.

Comparison of protocols SEP, LEACH, TEEN, and DEEC regarding alive and dead nodes, relative to number of rounds.

Comparing all these protocols, SEP and LEACH being heterogeneous, probability based

(3)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

28 protocols result in approximately equal

stability period and network life. As in SEP and LEACH, CHs selection is based on probability, while, if LEACH would be considered with homogeneity then there would be a large difference.

4. RESULT

TEEN is homogeneous routing protocol All nodes have the same energy level Low energy nodes move towards sleep mode for some rounds to save energy Node deplete balance

energy to prolong stability period and network lifetime.

SEP and DEEC are heterogeneous routing protocol having normal and advance sensor nodes Advance nodes have more energy than normal nodes The death ratio of normal nodes is greater than advance nodes Ratio of normal nodes in sleep mode is greater than advance nodes due to less energy Sensor nodes consume balance energy and enhance the network lifetime.

Fig. 1 Comparison of protocols TEEN and iTEEN regarding alive and dead nodes

Fig. 2 Comparison of protocols DEEC and iDEEC regarding alive and dead nodes

(4)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

29

Fig. 3 Comparison of protocols SEP and iSEP regarding alive and dead nodes

Fig. 4 Comparison of protocols LEACH and iLEACH regarding alive and dead nodes All the routing protocols are compared with

the improved version of each separately. It is noted that all the proposed protocols perform better in terms of energy consumption, stability of the network and life time of the network. Simulation is done for 3500 rounds of CH selection for each protocol.

5. CONCLUSION

In this thesis, energy consumption, stability period of the network and lifetime of the network are the basic concern in LEACH, TEEN, DEEC and SEP protocols. The energy distribution in homogeneous and hetero generous routing protocols has been discussed here. The approach in LEACH, TEEN, DEEC and SEP routing protocol has been implemented along with improved protocols like iLEACH, iTEEN, Idee Candi SEP. Due to random

deployment in these protocols, there exists the probability of energy holes.

A f t e r the proposed scheme, a better energy consumption is achieved. As for network life time, this work clearly gives the results in terms of network lifetime and stability period. Sensor nodes consume balance energy, and hence maximize the network lifetime. In comparison with SEP, LEACH, DEEC and TEEN it can be concluded that our protocol will perform well in small as well as large sized networks.

REFERENCES

1. M. A. Rahmadhani, L. V. Yovita, RatnaMayasari,

“Energy consumption and Packet loss analysis of LEACH Routing protocol on WSN over DTN”, IEEE 2018.

2. Lamir Shkurti; Xhevahir Bajrami; Ercan Canhasi; Besim Limani; Samedin Krrabaj; Astrit Hulaj, “Development of ambient environmental monitoring system through wireless sensor

(5)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

30 network (WSN) using Node MCU and “WSN

monitoring”, 2017,6th MECO.

3. M.B. Rasheed, N.J avaid, Z.A. Khan, U. Qasim, M.

Ishfaq, “E-HORM: An energy- efficient hole removing mechanism in wireless sensor networks” COMSATS, 2013.

4. R. R. S. Sneha and D. Nithya “Wireless sensor Network: A survey”, IJARSCCES, vol. 2, no. 2, pp.

92- 95, 2016.

5. Dong Li, Xianhua Dai, Han Zhang. Joint Adaptive Modulation and Power Control inCognitive Radio Networks, School of Information and Scienc Technology, Sun Yat-Sen University Guangzhou 510275, P. R. China.

6. Miao Ma and Danny H. K. Tsan. Cross-Layer Throughput Optimization in Cognitive Radio Networks with SINR Constraints, Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology.

7. T. charles Clancy, William A Arbaugh, Measuring Interference temperature, Department of computer Science, University of Maryland.

8. Paul j kolodzy. Interference temperature: A metric for dynamic spectrum, March 2006, phD member, IEEE.

9. HJ Cheng, ZHSu R Guo, NX Xiong, WZ Guo, Service-oriented node scheduling schemes with energy efficiency in wireless sensor networks.

Int. J. Distributed Sensor Netw. 2014(2014).

10. H Zhang, Z Zhang, H Dai, R Yin, XM Chen, in IEEE Global Telecommunications Conference Distributed spectrum-aware clustering in cognitive radio sensor networks, (2011), pp. 1–

6.

11. RM Eletreby, HM Elsayed, MM Khairy, in International Conference on Cognitive Radio Oriented Wireless Networks and Communications Cog LEACH: a spectrum aware clustering protocol for cognitive radiosensor networks, (2014), pp. 179–184.

12. M Ozger, OB Akan, in Proceedings IEEE INFOCOM. Event-driven spectrum-aware clustering in cognitive radio sensor networks, (2013), pp. 1483–1491.

13. CF Li, M Ye, GH Chen, J Wu, inIEEE International Conference on Mobile Ad-hoc and Sensor Systems. An energy-efficient unequal clustering mechanism for wireless sensor networks, (2005), pp. 604–612.

14. AO Bicen, OB Akan, Reliability and congestion control in cognitive radios ensor networks. Ad Hoc Netw. J. (Elsevier).9(7), 1154–1164 (2011).

15. B Gulbahar, OB Akan. Information theoretical optimization gains in energy adaptive data gathering and relaying in cognitive radio sensor networks. IEEE Trans. Wireless Commun.11(5), 1788–1796 (2012).

16. GA Shah, VC Gungor, OB Akan, A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications. IEEE Trans. Ind. Inf.9(3), 1477–

1485 (2013).

17. GA Shah, OB Akan, Performance analysis of CSMA-based opportunistic medium access protocol in cognitive radio sensor networks. Ad Hoc Netw. J. (Elsevier).15 4–13 (2014).

18. GA Shah, F Alagoz, E Fadel, OB Akan, A spectrum-aware clustering for efficient multimedia routing in cognitive radio sensor networks. IEEE Trans. Vehicular Technol.63(7), 3369–3380 (2014).

19. GA Shah, OB Akan, Cognitive adaptive medium access control in cognitive radio sensor networks. IEEE Trans. Vehicular Technol.64 (2), 757–767 (2015).

20. V Esmaeelzadeha, R Berangia, ES Hosseinia, OB Akanb, Stochastic backlog and delay bounds of generic rate-based AIMD congestion control scheme in cognitive radio sensor networks, (2015). Pervasive and Mobile Computing.

21. W Heinzelman, A Chandrakasan, H Balakrishnan, An application specific protocol architecture for wireless micro sensor networks. IEEE Trans. Wireless Commun.1(4), 660–670 (2002).

22. GA Shah, OB Akan, in IEEE International Conference on Communications Spectrum- aware cluster-based routing for cognitive radio sensor networks, (2013), pp. 2885–2889.

Referensi

Dokumen terkait

1) Whereas with regard to law enforcement and accountability, every construction of the Intermediary Articles contained in Law Number 35 of 2009 concerning

Need Analysis In this analysis phase, an interview was conducted to the tenth grade English teachers to obtain information about their problems in learning reading as well as