Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks

被引:6
|
作者
Jancy, S. [1 ]
Jayakumar, C. [2 ]
机构
[1] Sathyabama Inst Sci & Technol, CSE Dept, Chennai, Tamil Nadu, India
[2] Sri Venkateswara Coll Engn, CSE Dept, Chennai, Tamil Nadu, India
来源
NEURAL COMPUTING & APPLICATIONS | 2019年 / 31卷 / 05期
关键词
Wireless sensor networks; Clustering; LEACH; HEED; EMMAH protocols;
D O I
10.1007/s00521-018-3526-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The information technology has grown so rapidly that it has led to the development of compact size and inexpensive sensor nodes. Several sensor nodes together form a WSN. Though the WSN is compact in size, they can be equipped with radio transceivers, sensors, microprocessors which are embedded and sensors. One of the major critical issues with WSN is energy efficiency. With WSN, various energy-efficient techniques are being employed. Among clustering techniques, LEACH, HEED, EAMMH, TEEN, SEP, DEEC, K-means clustering algorithm are some of the most popular energy-efficient techniques which are employed. These are hierarchical based protocol which saves energy by balancing the energy expense. Detailed review and analysis of these protocols are presented, and midpoint location algorithm is proposed in this paper. The methodology used for reduction in dead nodes while transmitting the data is also discussed. In the proposed work, path construction phase (PCP) and alternative path construction phase (APCP) are created in order to reduce dead nodes. During the processes of data transmission if a node is found out that it will fail and APCP is applied, the cluster head is changed while applying the APCP. The cluster head is chosen based on midpoint location and highest node energy. The cluster head becomes permanent if the node has midpoint location and the highest energy. If the node does not have midpoint location and highest energy, it becomes a temporary cluster head. The proposed techniques are compared with EAMMH protocol and LEACH protocol using MATLAB. When compared with EAMMH, the dead nodes were reduced with subsequent rounds.
引用
收藏
页码:1467 / 1480
页数:14
相关论文
共 50 条
  • [41] Location-Based Explosion Detection in Wireless Optical Pressure Sensor Networks Using Bat Optimization Algorithm
    Renze Luo
    Guodong Li
    Shunli Fan
    Fatemeh Safara
    Wireless Personal Communications, 2022, 127 : 845 - 868
  • [42] Localization algorithm based on optimal nodes for wireless sensor networks
    Shen, Xuan-Jing
    Li, Cheng-Yue
    Wang, Shuo
    Qian, Qing-Ji
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (SUPPL. 1): : 208 - 214
  • [43] Node Load and Location-Based Clustering Protocol for Underwater Acoustic Sensor Networks
    Mei, Haodi
    Wang, Haiyan
    Shen, Xiaohong
    Jiang, Zhe
    Yan, Yongsheng
    Sun, Lin
    Xie, Weiliang
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2024, 12 (06)
  • [44] Unequal clustering data gathering algorithm based on ring in uniform distribution of nodes in wireless sensor networks
    Song, Xiaoying
    Zhang, Qilong
    2019 6TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2019), 2019, : 1164 - 1168
  • [45] A clustering algorithm based on geographical sensor position in wireless sensor networks
    Kim, Kyungjun
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 245 - 249
  • [46] Clustering Algorithm in Wireless Sensor Networks Based on Differential Evolution Algorithm
    Liu, Xinyi
    Mei, Ke
    Yu, Shujuan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 478 - 482
  • [47] Detecting Location-Based Attacks in Wireless Sensor Networks Using Sequential Analysis
    Potukuchi, Raghu Vamsi
    Kant, Krishna
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 541 - 551
  • [48] A Comparative Analysis of Flat, Hierarchical and Location-Based Routing in Wireless Sensor Networks
    Aetesam, Hazique
    Snigdh, Itu
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5201 - 5211
  • [49] Analysis for Location-based Key Pre-distribution in Wireless Sensor Networks
    Wang Jing
    Xia Luning
    Jing Jiwu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, : 297 - +
  • [50] Location-based compromise-tolerant security mechanisms for wireless sensor networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 247 - 260