Skip to main content
Erschienen in: Neural Computing and Applications 5/2019

11.06.2018 | S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks

Erschienen in: Neural Computing and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The information technology has grown so rapidly that it has led to the development of compact size and inexpensive sensor nodes. Several sensor nodes together form a WSN. Though the WSN is compact in size, they can be equipped with radio transceivers, sensors, microprocessors which are embedded and sensors. One of the major critical issues with WSN is energy efficiency. With WSN, various energy-efficient techniques are being employed. Among clustering techniques, LEACH, HEED, EAMMH, TEEN, SEP, DEEC, K-means clustering algorithm are some of the most popular energy-efficient techniques which are employed. These are hierarchical based protocol which saves energy by balancing the energy expense. Detailed review and analysis of these protocols are presented, and midpoint location algorithm is proposed in this paper. The methodology used for reduction in dead nodes while transmitting the data is also discussed. In the proposed work, path construction phase (PCP) and alternative path construction phase (APCP) are created in order to reduce dead nodes. During the processes of data transmission if a node is found out that it will fail and APCP is applied, the cluster head is changed while applying the APCP. The cluster head is chosen based on midpoint location and highest node energy. The cluster head becomes permanent if the node has midpoint location and the highest energy. If the node does not have midpoint location and highest energy, it becomes a temporary cluster head. The proposed techniques are compared with EAMMH protocol and LEACH protocol using MATLAB. When compared with EAMMH, the dead nodes were reduced with subsequent rounds.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zawaideh F, Salamah M (2014) Adaptive balanced clustering for wireless sensor network energy optimization. Netw Complex Syst. ISSN: 2224-610X (Paper). ISSN: 2225-0603 (Online) 4(4). www.iiste.org Zawaideh F, Salamah M (2014) Adaptive balanced clustering for wireless sensor network energy optimization. Netw Complex Syst. ISSN: 2224-610X (Paper). ISSN: 2225-0603 (Online) 4(4). www.​iiste.​org
2.
Zurück zum Zitat Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26) Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26)
3.
Zurück zum Zitat Mohaisen Linda F, Joine Laurie L (2017) Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication. Ad Hoc Netw 66:1–15CrossRef Mohaisen Linda F, Joine Laurie L (2017) Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication. Ad Hoc Netw 66:1–15CrossRef
4.
Zurück zum Zitat Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10 Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10
5.
Zurück zum Zitat Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Appl 77(4):4379–4399CrossRef Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Appl 77(4):4379–4399CrossRef
6.
Zurück zum Zitat Singh SK, Singh MP, Singh DK (2010) Energy efficient homogenous clustering algorithm for wireless sensor networks. Int J Wireless Mobile Netw (IJWMN) 2(3):49CrossRef Singh SK, Singh MP, Singh DK (2010) Energy efficient homogenous clustering algorithm for wireless sensor networks. Int J Wireless Mobile Netw (IJWMN) 2(3):49CrossRef
7.
Zurück zum Zitat Tripathy AK, Chinara S (2012) Comparison of residual energy-based clustering algorithms for wireless sensor network. Int Sch Res Netw ISRN Sen Netw Article ID 375026, 2012:10 Tripathy AK, Chinara S (2012) Comparison of residual energy-based clustering algorithms for wireless sensor network. Int Sch Res Netw ISRN Sen Netw Article ID 375026, 2012:10
8.
Zurück zum Zitat Samayveer Singh A, Aruna Malik B, Rajeev Kumar C (2017) Energy efficient heterogeneous deec protocol for enhancing lifetime in WSNs. Eng Sci Technol Int J 20:345–353CrossRef Samayveer Singh A, Aruna Malik B, Rajeev Kumar C (2017) Energy efficient heterogeneous deec protocol for enhancing lifetime in WSNs. Eng Sci Technol Int J 20:345–353CrossRef
9.
Zurück zum Zitat Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114CrossRef Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114CrossRef
10.
Zurück zum Zitat Sharmaa R, Mishraa N, Srivastava S (2015) A proposed energy efficient distance based cluster head (DBCH) algorithm: an improvement over LEACH. Procedia Comput Sci 57:807–814CrossRef Sharmaa R, Mishraa N, Srivastava S (2015) A proposed energy efficient distance based cluster head (DBCH) algorithm: an improvement over LEACH. Procedia Comput Sci 57:807–814CrossRef
11.
Zurück zum Zitat Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl 1–21 Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl 1–21
12.
Zurück zum Zitat Gowrishankar, S Basavaraju TG, Manjaiah Handy MJ, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: IEEE international conference on mobile and wireless communications networks Gowrishankar, S Basavaraju TG, Manjaiah Handy MJ, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: IEEE international conference on mobile and wireless communications networks
13.
Zurück zum Zitat Reddy BB, Rao KK (2013) Adaptive cluster head probability for LEACH protocol. IJCCN Int J Comput Commun Netw 3(3) ISSN 2289-3369 Reddy BB, Rao KK (2013) Adaptive cluster head probability for LEACH protocol. IJCCN Int J Comput Commun Netw 3(3) ISSN 2289-3369
14.
Zurück zum Zitat Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Appl 77(8):10195–10215CrossRef Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Appl 77(8):10195–10215CrossRef
15.
Zurück zum Zitat Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26) Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26)
16.
Zurück zum Zitat Divya C, Krishnan N, Gandhi Mathy T (2013) Energy efficient stable election protocol for clustered heterogeneous wireless sensor networks. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, ISSN: 2278-8727 12(5) 55–64. www.iosrjournals.org Divya C, Krishnan N, Gandhi Mathy T (2013) Energy efficient stable election protocol for clustered heterogeneous wireless sensor networks. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, ISSN: 2278-8727 12(5) 55–64. www.​iosrjournals.​org
17.
Zurück zum Zitat Heinzelman WR, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670CrossRef Heinzelman WR, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670CrossRef
18.
Zurück zum Zitat Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), pp 202–206 Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), pp 202–206
19.
Zurück zum Zitat Khediri SEL, Nasri N, Wei A, Kachouri A (2014) A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput Sci 32:1180–1185CrossRef Khediri SEL, Nasri N, Wei A, Kachouri A (2014) A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput Sci 32:1180–1185CrossRef
20.
Zurück zum Zitat Manogaran CT G, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141 Manogaran CT G, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141
21.
Zurück zum Zitat Puneet A, Vidushi S (2013) Cluster head selection in wireless sensor networks under fuzzy environment. Hindawi Publishing Corporation ISRN Sensor Networks, vol 2013, Article ID 909086, 8 Puneet A, Vidushi S (2013) Cluster head selection in wireless sensor networks under fuzzy environment. Hindawi Publishing Corporation ISRN Sensor Networks, vol 2013, Article ID 909086, 8
22.
Zurück zum Zitat Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189 Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189
23.
Zurück zum Zitat Dhankhar S, Singh S (2016) Performance comparison of LEACH & HEED clustering protocols in WSN using MATLAB-A review. Int J Tech Res (IJTR) 5(1) Dhankhar S, Singh S (2016) Performance comparison of LEACH & HEED clustering protocols in WSN using MATLAB-A review. Int J Tech Res (IJTR) 5(1)
24.
Zurück zum Zitat Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput 1–12 Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput 1–12
25.
Zurück zum Zitat Mahapatra RP, Yadav RK (2015) Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput Sci 57:1005–1014CrossRef Mahapatra RP, Yadav RK (2015) Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput Sci 57:1005–1014CrossRef
26.
Zurück zum Zitat Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C(2017) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen Comput Syst Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C(2017) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen Comput Syst
27.
Zurück zum Zitat Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal Ubiquitous Comput 1–11 Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal Ubiquitous Comput 1–11
28.
Zurück zum Zitat Parmar J, Pirishothm A (2015) Study of wireless sensor networks using leach, teen and apteen routing protocols. Int J Sci Res (IJSR) ISSN (Online): 2319–7064 Parmar J, Pirishothm A (2015) Study of wireless sensor networks using leach, teen and apteen routing protocols. Int J Sci Res (IJSR) ISSN (Online): 2319–7064
29.
Zurück zum Zitat Kanisha B, Lokesh S, Kumar PM, Parthasarathy P, Chandra Babu G (2018) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Personal Ubiquitous Comput 1–9 Kanisha B, Lokesh S, Kumar PM, Parthasarathy P, Chandra Babu G (2018) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Personal Ubiquitous Comput 1–9
30.
Zurück zum Zitat Kumar PM, Gandhi UD (2017) A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng Kumar PM, Gandhi UD (2017) A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng
31.
Zurück zum Zitat Mundada MR, Thimmegowda N, Bhuvaneswari T, Cyrilraj V (2013) Clustering in wireless sensor networks: performance comparison of EAMMH and LEACH protocols using MATLAB. Adv Mater Res 705:337–342CrossRef Mundada MR, Thimmegowda N, Bhuvaneswari T, Cyrilraj V (2013) Clustering in wireless sensor networks: performance comparison of EAMMH and LEACH protocols using MATLAB. Adv Mater Res 705:337–342CrossRef
32.
Zurück zum Zitat Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189 Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189
34.
Zurück zum Zitat Chaudhary R, Vatta S (2014) Review paper on energy- efficient protocols in wireless sensor networks. IOSR J Eng 04(02):2278–8719CrossRef Chaudhary R, Vatta S (2014) Review paper on energy- efficient protocols in wireless sensor networks. IOSR J Eng 04(02):2278–8719CrossRef
Metadaten
Titel
Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks
Publikationsdatum
11.06.2018
Erschienen in
Neural Computing and Applications / Ausgabe 5/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3526-x

Weitere Artikel der Ausgabe 5/2019

Neural Computing and Applications 5/2019 Zur Ausgabe

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Tuberculosis (TB) detection system using deep neural networks

Premium Partner