SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
ACH: Away Cluster Heads Scheme for Energy
Efficient Clustering Protocols in WSNs
N. Javaid‡, M. Waseem‡, Z. A. Khan$, U. Qasim£, K. Latif‡, A. Javaid♮
COMSATS Institute of IT, ‡Islamabad, ♮Wah Cantt, Pakistan.
$Faculty of Engineering, Dalhousie University, Halifax, Canada.
£University of Alberta, Alberta, Canada.
Abstract—This paper deals with the routing protocols for
distributed wireless sensor networks. The conventional proto-
cols for WSNs like Low Energy adaptive Clustering Hierarchy
(LEACH), Stable Election Protocol (SEP), Threshold Sensitive
Energy Efficient Network (TEEN), Distributed Energy Efficient
Clustering Protocol (DEEC) may not be optimal. We propose
a scheme called Away Cluster Head (ACH) which effectively
increases the efficiency of conventional clustering based protocols
in terms of stability period and number of packets sent to base
station (BS). We have implemented ACH scheme on LEACH,
SEP, TEEN and DEEC. Simulation results show that LEACH-
ACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better
than LEACH, SEP, TEEN and DEEC respectively in terms of
stability period and number of packets sent to BS. The stability
period of the existing protocols prolongs by implementing ACH
on them.
Index Terms—Wireless sensor networks, Distributed networks,
Clustering Protocol.
I. BACKGROUND
In Direct Transmission [1], each node in the sensor network
communicates directly to BS. In the aforementioned protocol,
farthest nodes die faster than the nearest nodes. In Minimum
transmission energy [2] routing protocol each node transmits
to its nearest node so the nearest nodes die at a faster rate
because they receive data from the farther nodes. In the current
body of research going in the field of WSNs clustering based
protocols have attain significant attraction. In clustering based
routing protocols the sensor nodes form clusters. In these
clusters, one node is selected as CH. The nodes sense data
and send to their respective CHs which aggregate and fuse
the data, thus saving the energy as global communication is
reduced due to local compression.
Once the CH receives data from its nodes it aggregates
and fuses the data into a small set and sends to BS. Unbal-
anced energy consumption among the sensor nodes may cause
network partition and node failures where transmission from
some sensors to the sink node becomes blocked. Therefore,
construction of a stable backbone is one of the challenges in
sensor network applications.
LEACH [3] proposes a clustering based routing protocol
for homogenous networks in which a node becomes CH by a
probabilistic equation and forms a cluster of those nodes which
receive strong signal to noise ratio from it. The nodes sense the
environment and send data to CH where it is aggregated and
finally send to BS. In LEACH there is a localized coordination
amongst the nodes for cluster set up and locally compress
the data to reduce global communication. CHs in LEACH are
rotated randomly. Heterogeneous networks are more stable and
beneficiary than homogenous networks. A number of protocols
like SEP, DEEC and Threshold Distributed Energy-Efficient
Clustering protocol (T-DEEC) have been proposed for WSNs.
SEP [4] has two level of heterogeneity. In DEEC [5], CH
selection is based on the ratio of residual energy and average
energy of the network. The high energy nodes have more
chances to become CH. In this way the energy is evenly
distributed in the network. These routing protocols have some
limitation due to their design and performance.
II. THE ACH SCHEME
A. Optimal Number Of CHs
The optimal probability of a node to take part in election
for selection of CHs is a function of the spatial density when
the nodes are uniformly distributed over the sensors’ field.
When the total energy consumption is minimum and energy
consumption is well distributed over all sensors, the clustering
is then called optimal clustering. The energy model we use
for our simulation effect the optimal number of CHs. We use
similar energy model as proposed in LEACH, SEP and DEEC.
We have been giving particular attention to distribution of
CHs in network so as energy in the network. Once nodes
are deployed in region of interest the nodes locally coordinate
for cluster set up and operation. Each node decides whether to
become a CH or not. The node generates a random number and
compares it with the threshold value. If the number generated
is less than or equal to the threshold value and the node has
not been CH for the last 1
𝑝 round the node is marked as to be
one of the CH. p is the probability of a node to become CH.
In ACH scheme, once the CHs have been formed the CHs
send a confirmation message to one another using CSMA-
MAC protocol. The CH which receives a strong SNR from its
adjacent CH will be marked as a normal node. For simplicity
in our simulations we replace SNR by distance. We assume
the CH will be made unmark and will become a normal
node if its distance from the nearest CH is less than 12𝑚.
The distance between CHs less than 12𝑚 is shown by ”a”
otherwise ”b”. After confirmation of CHs, nodes receive an
association message from CHs and respond according to the
strength of SNR. The clusters are thus formed and the CHs are
978-1-4673-6195-8/13/$31.00 ©2013 IEEE
well distributed in the network. This makes clusters even in
terms of number of nodes in each cluster. In this way energy
of CH dissipated in each round is comparably equal. The
distant CHs’ network is shown in fig. 2. We implement ACH
scheme on LEACH, SEP, TEEN and DEEC. Simulation results
show that ACH scheme performs better with all of 4 selected
protocols. We initialize parameters for simulation, randomly
deploy our nodes and start network’s operation. In network’s
operation each node is checked whether eligible to become
CH. We call this operation for epoch. If a node successfully
pass through this test energy of the node is checked. Next
comes the turn of CH formation. A node becomes CH if
it has energy and is eligible to be CH which is shown in
CH formation block. The CH then goes through neighbors’
association phase and data transmission phase as shown in
fig. 1.
0 10 20 30 40 50 60 70 80 90 100
0
10
20
30
40
50
60
70
80
90
100
Base Station
Cluster Head
confirmed
a
a
a
a
a a
b
b
b
b
b
b
b
b
b
b
b
b
Cluster Head
Unmarked
Normal Node
Fig. 1. ACH Scheme
0 10 20 30 40 50 60 70 80 90 100
0
10
20
30
40
50
60
70
80
90
100
Base Station
Cluster Head
Confirmed
Cluster Head
Become a Normal
Node
Fig. 2. Distant CHs
TABLE I
PARAMETERS USED IN OUR SIMULATIONS
Parameter Value
Simulation Area 100m 100m
Location of BS (50m, 50m)
Number Of Nodes 100
Initial Energy of Nodes (Maximum Value) 0.5 J/node
Packet Size 4000 bits
III. SIMULATIONS
We have implemented our protocol on Matlab [6] to evaluate
its performance with LEACH, SEP, TEEN and DEEC. We
have proposed LEACH-ACH, SEP-ACH, TEEN-ACH and
DEEC-ACH. Our goals in conducting the simulation are as
follows:
∙ Compare the performance of LEACH, SEP, TEEN,
DEEC and their ACH versions on the basis of longevity
of the network.
∙ Compare throughput of LEACH, SEP, TEEN, DEEC and
the respective ACH schemes.
We have performed our simulation on 100 nodes and a fixed
BS located in the center of the field. We randomly distributed
100 nodes in a 100𝑚100𝑚 field. The most distant node from
BS is at 70.7𝑚. The nodes have their horizontal and vertical
coordinates located between 0 and maximum value of the
dimension which is 100. All the nodes have different energies
as the environment is heterogeneous. We simulate our protocol
on the basis of initial energy as follows:
∙ The maximum energy of a node in the field is not more
than 0.5J/bit.
The parameters used in our simulation are summarized in
Table. 1.
To analyze and compare the performance of our protocol
with LEACH, SEP, TEEN and DEEC we have used two
metrics. They are:
∙ Total number of dead nodes:
This metric show the overall lifetime of the network. It
gives us an idea about the stability period and instability
period. This metric is an indication of the number of dead
nodes with time.
∙ Through put:
This metric is an indication of the rate of packets sent to
BS.
A. Implementing ACH Scheme on LEACH, TEEN, DEEC, and
SEP
1) LEACH-ACH: LEACH is a clustering based routing
protocol for homogenous networks. In LEACH probability
is same for all nodes to become CHs. The nodes compare
the random value generated at each round with the threshold
equation and become CH if the threshold value is less than
the random number. The threshold formula is given by:
𝑇(n) = {
𝑃
1−𝑃 (𝑟𝑚𝑜𝑑 1
𝑃 )
𝑛 ∈ 𝐺
0 𝑒𝑙𝑠𝑒
We implement ACH scheme in LEACH and found its results
better than LEACH as shown in fig. 3.
0 1000 2000 3000 4000 5000
0
10
20
30
40
50
60
70
80
90
100
rounds
no.ofdeadnodes LEACH
LEACH−ACH
Fig. 3. LEACH Vs. LEACH-ACH
2) TEEN-ACH: TEEN is a routing protocol for reactive
networks. In TEEN two thresholds: hard and soft have been
introduced to reduce number of communications. After de-
ployment of nodes CH set up phase starts in which CHs
are formed. Once the CHs are confirmed the nodes sense
environment and on their transmitter. When the the sense
value reach hard threshold the transmitter is on and data
is send to CH. This value is stored in an internal variable.
Next time when the sense value reach the hard threshold,
difference of stored value and sense value is obtained, if this
value is greater or equal to soft threshold transmission is done
otherwise transmitter are kept off. In TEEN-ACH we make
CHs distant which makes energy dissipation even among CHs
and thus very less energy is consumed in each round. Fig. 4
shows the behavior of TEEN against TEEN-ACH.
0 1000 2000 3000 4000 5000
0
10
20
30
40
50
60
70
80
90
100
rounds
no.ofdeadnodes
TEEN
TEEN−ACH
Fig. 4. TEEN Vs. TEEN-ACH
3) DEEC-ACH: DEEC-ACH is an extension of DEEC
protocol which enhances stability period of DEEC. The CH
selection criterion is based on DEEC protocol however we
introduce ACH scheme which enhances the performance of
DEEC.
DEEC is a heterogeneous routing protocol in which nodes
have different initial energy as the network starts. DEEC uses
initial and residual energy level of nodes to form CHs. Once
sensor nodes are deployed in the region they locally coordinate
for cluster set up and operation. Let ni denotes the number
of rounds for which the node Si is CH often referred as the
rotating epoch. Popt is our desired percentage of CHs and
ni = 1/popt is the rotating epoch. By epoch we means that
a node once becomes CH will not take part in CH formation
for the next 1/popt rounds. As in DEEC nodes have different
energy levels the CH selection probability is different for each
node and we call it average probability pi. pi of nodes with
more energy is greater. The average energy of network denoted
by 𝐸(𝑟) is given by eq.(1):
𝐸(𝑟) =
1
𝑁
𝑁∑
𝑖=1
𝐸𝑖(𝑟) (1)
The average probability of CHs per round per epoch is
represented in eq.(2):
pi = popt [1 −
𝐸(𝑟) − 𝐸𝑖(𝑟)
𝐸(𝑟)
] (2)
𝑁∑
𝑖=1
𝑝𝑖 =
𝑁∑
𝑖=1
𝑝𝑜𝑝𝑡
𝐸𝑖(𝑟)
𝐸(𝑟)
= 𝑝𝑜𝑝𝑡
𝑁∑
𝑖=1
𝐸𝑖(𝑟)
𝐸(𝑟)
= 𝑁 𝑝𝑜𝑝𝑡 (3)
Eq.(3) shows the optimal number of CHs we want to
achieve. The probability of nodes in the network to become
CHs is based on the ratio of their residual energy and average
residual energy of the network. The probability equation for
nodes to become CH is given by eq.(4):
𝑝𝑖 =
𝑝𝑜𝑡𝑝𝑁(1 + 𝑎)𝐸𝑖(𝑟)
(𝑁 +
∑ 𝑁
𝑖=1 𝑎𝑖)𝐸(𝑟)
(4)
Where popt is the desired percentage of CHs, 𝑁 is number
of nodes, Ei(r) is residual energy of a node and 𝐸(𝑟) is
network’s average energy. 𝑃 𝑖 is average probability of a node
to become CH. Each node creates a random number for
itself and compares it with threshold equation, if the number
generated is less than or equal to the threshold value the node
is selected as CH for that round. The threshold equation is
given by:
𝑇(Si) = {
𝑝𝑖
1−𝑝𝑖(𝑟𝑚𝑜𝑑 1
𝑝𝑖 )
𝑆𝑖 ∈ 𝐺
0 𝑒𝑙𝑠𝑒
Where 𝐺 represents the set of nodes eligible to take part in
CH selection at round 𝑟. Si 𝜖 𝐺 consists of all those nodes
which have not been CHs for the most recent 𝑛𝑖 rounds. Once
a node becomes CH it sends a confirmation message to all
CHs. As soon as the CH is confirmed it sends an association
message to all the nodes using CSMA-MAC protocol. The
nodes respond according to strength of SNR received. The
nodes associate themselves to that CH whose SNR is stronger.
The CH then allocates TDMA slot to each node in the cluster.
The nodes sense the environment and send data to their
respective CHs in the TDMA slots allocated to them.
CH formation depends on random number generated,
threshold value and energy of nodes. At some stages two
or more very close (or intersecting) nodes become CHs and
energy dissipation is even more and unbalance. We make CHs
away in our protocol. Once a node becomes a CH it virtually
take part in election of next CH. The CH decides area of next
node taking part in election for CH. We assume that no node
can become CH in (15m, 15m). A node which has become
CH at (5m, 5m) will force the nodes to be normal nodes in
the area ((5+10)m, (5+10)m) . In this way the CHs are made
distant and we are able to achieve 𝑁 𝑝𝑜𝑝𝑡 CHs each round.
Fig. 5 shows the comparison of DEEC with DEEC-ACH.
0 1000 2000 3000 4000 5000
0
10
20
30
40
50
60
70
80
90
100
rounds
no.ofdeadnodes
DEEC
DEEC−ACH
Fig. 5. DEEC Vs. DEEC-ACH
4) SEP-ACH: In this section we implement ACH scheme
on SEP. In SEP we have two level heterogeneity. The normal
nodes in SEP have 𝑎 times less energy than advance nodes.
The probability of normal nodes in SEP differs from advance
nodes as follows:
𝑝𝑛𝑟𝑚 =
𝑝 𝑜𝑝𝑡
1 + 𝑎.𝑚
(5)
𝑝𝑎𝑑𝑣 =
𝑝 𝑜𝑝𝑡(1 + 𝑎)
1 + 𝑎.𝑚
(6)
where 𝑝𝑛𝑟𝑚 in eq.(5) and 𝑝𝑎𝑑𝑣 in eq.(6) is the probability
equation for normal and advance nodes respectively. m is the
fraction of advance nodes. Eq.(6) shows greater probability
of advance nodes to become CHs. Each node in the network
generates a random number for itself, compares itself with
the threshold value and become CH if the number is less
than or equal to threshold value. After the CH formation CH
confirmation phase starts in which the CHs are made distant.
We introduce ACH scheme in SEP which makes CHs formed
in SEP distant. The energy in the nodes are thus conserved
and the stability period of SEP is enhanced. Fig. 6 shows that
SEP-ACH performs better than SEP. The 1𝑠𝑡 node in SEP
dies at round 1130 whereas in SEP-ACH the 1𝑠𝑡 node dies at
round 2004.
IV. CONCLUSION
This paper deals with ACH scheme, a clustering technique
for WSNs that enhances life time of LEACH, TEEN, DEEC,
SEP and minimizing global energy consumption by distribut-
ing the load to all the nodes at different points in time. In
DEEC-ACH high energy nodes are made CHs frequently than
low energy nodes, making energy distribution evenly in the
0 1000 2000 3000 4000 5000
0
10
20
30
40
50
60
70
80
90
100
X: 2004
Y: 0
rounds
no.ofdeadnodes
SEP
SEP−ACH
Fig. 6. SEP Vs. SEP-ACH
network. Also a CH take part in the selection of next CH thus
the number of CHs are reduced and the CHs are made distant.
We have forced those nodes which have not become CHs and
are close to each other or intersecting. The energy of nodes
are conserved in this way and stability period of the network
is prolonged. DEEC-ACH outperforms LEACH as LEACH
is not suited with heterogeneous environment. DEEC-ACH
distribute the energy evenly in the network by giving high
priority to high energy nodes in election for CHs and making
CHs away from one another. DEEC-ACH also perform well
than DEEC as the adjacent and very close nodes are made
CHs in DEEC. This consume much energy of the nodes in the
process of aggregation and fusion. The global communication
is increased and the nodes die at a faster rate. The stability
period and throughput of the network is decreased.
REFERENCES
[1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on
sensor networks. IEEE Communications Magazine, 40(8):102114, August
2002.
[2] T. J. Shepard. A channel access scheme for large dense packet radio
networks. In Proccedings of ACM SIGCOMM, pages 219230, September
1996.
[3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Ef?cient
Communication Protocols for Wireless Microsensor Networks. In Pro-
ceedings of Hawaiian In- ternational Conference on Systems Science,
January 2000.
[4] G. Smaragdakis, I. Matta, A. Bestavros, SEP: A Stable Election Protocol
for clustered heterogeneous wireless sensor networks, in: Second Interna-
tional Workshop on Sensor and Actor Network Protocols and Applications
(SANPA 2004), 2004.
[5] L. Qing, Q. Zhu, M. Wang, Design of a distributed energy-efficient
clustering algorithm for heterogeneous wireless sensor networks. In
ELSEVIER, Computer Communications 29 (2006) 22302237.
[6] MATLAB 7.4.0(R2007a) www.mathworks.com

Weitere ähnliche Inhalte

Was ist angesagt?

MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
M H
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Was ist angesagt? (17)

K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 
D04622933
D04622933D04622933
D04622933
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
 
H0421043049
H0421043049H0421043049
H0421043049
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
Paper
PaperPaper
Paper
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
 
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
A PROPOSAL TO IMPROVE SEP ROUTING PROTOCOL USING INSENSITIVE FUZZY C-MEANS IN...
 
Ci24561565
Ci24561565Ci24561565
Ci24561565
 

Andere mochten auch

Detailed class analysis_of_music_magazine_one_nme
Detailed class analysis_of_music_magazine_one_nmeDetailed class analysis_of_music_magazine_one_nme
Detailed class analysis_of_music_magazine_one_nme
marthadavis96
 
2º ano 3 º ano feira do livro
2º ano 3 º ano feira do livro2º ano 3 º ano feira do livro
2º ano 3 º ano feira do livro
franfarujo
 
Cours du 9 sept 2013
Cours du 9 sept 2013Cours du 9 sept 2013
Cours du 9 sept 2013
SandraTRG
 
Frases en espanol 2
Frases en espanol 2Frases en espanol 2
Frases en espanol 2
SandraTRG
 
Vitamin & Mineral Deficiency
Vitamin & Mineral DeficiencyVitamin & Mineral Deficiency
Vitamin & Mineral Deficiency
Shahin Hameed
 

Andere mochten auch (20)

Detailed class analysis_of_music_magazine_one_nme
Detailed class analysis_of_music_magazine_one_nmeDetailed class analysis_of_music_magazine_one_nme
Detailed class analysis_of_music_magazine_one_nme
 
2º ano 3 º ano feira do livro
2º ano 3 º ano feira do livro2º ano 3 º ano feira do livro
2º ano 3 º ano feira do livro
 
Biochemistry1
Biochemistry1Biochemistry1
Biochemistry1
 
Cours du 9 sept 2013
Cours du 9 sept 2013Cours du 9 sept 2013
Cours du 9 sept 2013
 
Frases en espanol 2
Frases en espanol 2Frases en espanol 2
Frases en espanol 2
 
ATLANTIS - THE CLUB - AT JAYPEE INTEGRATED SPORETS COMPLEX GREATER NOIDA
ATLANTIS - THE CLUB  - AT  JAYPEE INTEGRATED SPORETS COMPLEX GREATER NOIDAATLANTIS - THE CLUB  - AT  JAYPEE INTEGRATED SPORETS COMPLEX GREATER NOIDA
ATLANTIS - THE CLUB - AT JAYPEE INTEGRATED SPORETS COMPLEX GREATER NOIDA
 
第4回「クラウドを支えるKVMの現在と未来」(2011/07/07 on しすなま!)
第4回「クラウドを支えるKVMの現在と未来」(2011/07/07 on しすなま!)第4回「クラウドを支えるKVMの現在と未来」(2011/07/07 on しすなま!)
第4回「クラウドを支えるKVMの現在と未来」(2011/07/07 on しすなま!)
 
Εφηβικός “εθισμός” στο διαδίκτυο
Εφηβικός “εθισμός” στο διαδίκτυοΕφηβικός “εθισμός” στο διαδίκτυο
Εφηβικός “εθισμός” στο διαδίκτυο
 
วิเคราะห์เว็บไซต์
วิเคราะห์เว็บไซต์วิเคราะห์เว็บไซต์
วิเคราะห์เว็บไซต์
 
Lighting the way perspectives on global lighting market 2011
Lighting the way perspectives on global lighting market 2011Lighting the way perspectives on global lighting market 2011
Lighting the way perspectives on global lighting market 2011
 
Program
ProgramProgram
Program
 
Presentation 2 tom jake joh shortcut.lnk
Presentation 2 tom jake joh   shortcut.lnkPresentation 2 tom jake joh   shortcut.lnk
Presentation 2 tom jake joh shortcut.lnk
 
第2回「システム管理ソリューションBOFM 4.0概要」(2011/05/19 on しすなま!)
第2回「システム管理ソリューションBOFM 4.0概要」(2011/05/19 on しすなま!)第2回「システム管理ソリューションBOFM 4.0概要」(2011/05/19 on しすなま!)
第2回「システム管理ソリューションBOFM 4.0概要」(2011/05/19 on しすなま!)
 
Lighting the way perspectives on global lighting market 2012
Lighting the way perspectives on global lighting market 2012Lighting the way perspectives on global lighting market 2012
Lighting the way perspectives on global lighting market 2012
 
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ①Microsoft様資料
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ①Microsoft様資料第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ①Microsoft様資料
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ①Microsoft様資料
 
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ②IBM資料
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ②IBM資料第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ②IBM資料
第3回「マイクロソフトの仮想化と、クラウドの今後」(2011/06/16 on しすなま!) ②IBM資料
 
Ibaiak1
Ibaiak1Ibaiak1
Ibaiak1
 
Filipino presentation
Filipino presentationFilipino presentation
Filipino presentation
 
La posada del silencio nº 14, curso V
La posada del silencio nº 14, curso VLa posada del silencio nº 14, curso V
La posada del silencio nº 14, curso V
 
Vitamin & Mineral Deficiency
Vitamin & Mineral DeficiencyVitamin & Mineral Deficiency
Vitamin & Mineral Deficiency
 

Ähnlich wie Ach away cluster heads

A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORKA ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
cscpconf
 
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
csandit
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 

Ähnlich wie Ach away cluster heads (20)

A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORKA ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
 
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
Gateway based multi hop distributed energy efficient clustering protocol for ...
Gateway based multi hop distributed energy efficient clustering protocol for ...Gateway based multi hop distributed energy efficient clustering protocol for ...
Gateway based multi hop distributed energy efficient clustering protocol for ...
 
Gateway Based Multi-Hop Distributed Energy Efficient Clustering Protocol for ...
Gateway Based Multi-Hop Distributed Energy Efficient Clustering Protocol for ...Gateway Based Multi-Hop Distributed Energy Efficient Clustering Protocol for ...
Gateway Based Multi-Hop Distributed Energy Efficient Clustering Protocol for ...
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Ach away cluster heads

  • 1. ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs N. Javaid‡, M. Waseem‡, Z. A. Khan$, U. Qasim£, K. Latif‡, A. Javaid♮ COMSATS Institute of IT, ‡Islamabad, ♮Wah Cantt, Pakistan. $Faculty of Engineering, Dalhousie University, Halifax, Canada. £University of Alberta, Alberta, Canada. Abstract—This paper deals with the routing protocols for distributed wireless sensor networks. The conventional proto- cols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effectively increases the efficiency of conventional clustering based protocols in terms of stability period and number of packets sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that LEACH- ACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better than LEACH, SEP, TEEN and DEEC respectively in terms of stability period and number of packets sent to BS. The stability period of the existing protocols prolongs by implementing ACH on them. Index Terms—Wireless sensor networks, Distributed networks, Clustering Protocol. I. BACKGROUND In Direct Transmission [1], each node in the sensor network communicates directly to BS. In the aforementioned protocol, farthest nodes die faster than the nearest nodes. In Minimum transmission energy [2] routing protocol each node transmits to its nearest node so the nearest nodes die at a faster rate because they receive data from the farther nodes. In the current body of research going in the field of WSNs clustering based protocols have attain significant attraction. In clustering based routing protocols the sensor nodes form clusters. In these clusters, one node is selected as CH. The nodes sense data and send to their respective CHs which aggregate and fuse the data, thus saving the energy as global communication is reduced due to local compression. Once the CH receives data from its nodes it aggregates and fuses the data into a small set and sends to BS. Unbal- anced energy consumption among the sensor nodes may cause network partition and node failures where transmission from some sensors to the sink node becomes blocked. Therefore, construction of a stable backbone is one of the challenges in sensor network applications. LEACH [3] proposes a clustering based routing protocol for homogenous networks in which a node becomes CH by a probabilistic equation and forms a cluster of those nodes which receive strong signal to noise ratio from it. The nodes sense the environment and send data to CH where it is aggregated and finally send to BS. In LEACH there is a localized coordination amongst the nodes for cluster set up and locally compress the data to reduce global communication. CHs in LEACH are rotated randomly. Heterogeneous networks are more stable and beneficiary than homogenous networks. A number of protocols like SEP, DEEC and Threshold Distributed Energy-Efficient Clustering protocol (T-DEEC) have been proposed for WSNs. SEP [4] has two level of heterogeneity. In DEEC [5], CH selection is based on the ratio of residual energy and average energy of the network. The high energy nodes have more chances to become CH. In this way the energy is evenly distributed in the network. These routing protocols have some limitation due to their design and performance. II. THE ACH SCHEME A. Optimal Number Of CHs The optimal probability of a node to take part in election for selection of CHs is a function of the spatial density when the nodes are uniformly distributed over the sensors’ field. When the total energy consumption is minimum and energy consumption is well distributed over all sensors, the clustering is then called optimal clustering. The energy model we use for our simulation effect the optimal number of CHs. We use similar energy model as proposed in LEACH, SEP and DEEC. We have been giving particular attention to distribution of CHs in network so as energy in the network. Once nodes are deployed in region of interest the nodes locally coordinate for cluster set up and operation. Each node decides whether to become a CH or not. The node generates a random number and compares it with the threshold value. If the number generated is less than or equal to the threshold value and the node has not been CH for the last 1 𝑝 round the node is marked as to be one of the CH. p is the probability of a node to become CH. In ACH scheme, once the CHs have been formed the CHs send a confirmation message to one another using CSMA- MAC protocol. The CH which receives a strong SNR from its adjacent CH will be marked as a normal node. For simplicity in our simulations we replace SNR by distance. We assume the CH will be made unmark and will become a normal node if its distance from the nearest CH is less than 12𝑚. The distance between CHs less than 12𝑚 is shown by ”a” otherwise ”b”. After confirmation of CHs, nodes receive an association message from CHs and respond according to the strength of SNR. The clusters are thus formed and the CHs are 978-1-4673-6195-8/13/$31.00 ©2013 IEEE
  • 2. well distributed in the network. This makes clusters even in terms of number of nodes in each cluster. In this way energy of CH dissipated in each round is comparably equal. The distant CHs’ network is shown in fig. 2. We implement ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that ACH scheme performs better with all of 4 selected protocols. We initialize parameters for simulation, randomly deploy our nodes and start network’s operation. In network’s operation each node is checked whether eligible to become CH. We call this operation for epoch. If a node successfully pass through this test energy of the node is checked. Next comes the turn of CH formation. A node becomes CH if it has energy and is eligible to be CH which is shown in CH formation block. The CH then goes through neighbors’ association phase and data transmission phase as shown in fig. 1. 0 10 20 30 40 50 60 70 80 90 100 0 10 20 30 40 50 60 70 80 90 100 Base Station Cluster Head confirmed a a a a a a b b b b b b b b b b b b Cluster Head Unmarked Normal Node Fig. 1. ACH Scheme 0 10 20 30 40 50 60 70 80 90 100 0 10 20 30 40 50 60 70 80 90 100 Base Station Cluster Head Confirmed Cluster Head Become a Normal Node Fig. 2. Distant CHs TABLE I PARAMETERS USED IN OUR SIMULATIONS Parameter Value Simulation Area 100m 100m Location of BS (50m, 50m) Number Of Nodes 100 Initial Energy of Nodes (Maximum Value) 0.5 J/node Packet Size 4000 bits III. SIMULATIONS We have implemented our protocol on Matlab [6] to evaluate its performance with LEACH, SEP, TEEN and DEEC. We have proposed LEACH-ACH, SEP-ACH, TEEN-ACH and DEEC-ACH. Our goals in conducting the simulation are as follows: ∙ Compare the performance of LEACH, SEP, TEEN, DEEC and their ACH versions on the basis of longevity of the network. ∙ Compare throughput of LEACH, SEP, TEEN, DEEC and the respective ACH schemes. We have performed our simulation on 100 nodes and a fixed BS located in the center of the field. We randomly distributed 100 nodes in a 100𝑚100𝑚 field. The most distant node from BS is at 70.7𝑚. The nodes have their horizontal and vertical coordinates located between 0 and maximum value of the dimension which is 100. All the nodes have different energies as the environment is heterogeneous. We simulate our protocol on the basis of initial energy as follows: ∙ The maximum energy of a node in the field is not more than 0.5J/bit. The parameters used in our simulation are summarized in Table. 1. To analyze and compare the performance of our protocol with LEACH, SEP, TEEN and DEEC we have used two metrics. They are: ∙ Total number of dead nodes: This metric show the overall lifetime of the network. It gives us an idea about the stability period and instability period. This metric is an indication of the number of dead nodes with time. ∙ Through put: This metric is an indication of the rate of packets sent to BS. A. Implementing ACH Scheme on LEACH, TEEN, DEEC, and SEP 1) LEACH-ACH: LEACH is a clustering based routing protocol for homogenous networks. In LEACH probability is same for all nodes to become CHs. The nodes compare the random value generated at each round with the threshold equation and become CH if the threshold value is less than the random number. The threshold formula is given by: 𝑇(n) = { 𝑃 1−𝑃 (𝑟𝑚𝑜𝑑 1 𝑃 ) 𝑛 ∈ 𝐺 0 𝑒𝑙𝑠𝑒 We implement ACH scheme in LEACH and found its results better than LEACH as shown in fig. 3.
  • 3. 0 1000 2000 3000 4000 5000 0 10 20 30 40 50 60 70 80 90 100 rounds no.ofdeadnodes LEACH LEACH−ACH Fig. 3. LEACH Vs. LEACH-ACH 2) TEEN-ACH: TEEN is a routing protocol for reactive networks. In TEEN two thresholds: hard and soft have been introduced to reduce number of communications. After de- ployment of nodes CH set up phase starts in which CHs are formed. Once the CHs are confirmed the nodes sense environment and on their transmitter. When the the sense value reach hard threshold the transmitter is on and data is send to CH. This value is stored in an internal variable. Next time when the sense value reach the hard threshold, difference of stored value and sense value is obtained, if this value is greater or equal to soft threshold transmission is done otherwise transmitter are kept off. In TEEN-ACH we make CHs distant which makes energy dissipation even among CHs and thus very less energy is consumed in each round. Fig. 4 shows the behavior of TEEN against TEEN-ACH. 0 1000 2000 3000 4000 5000 0 10 20 30 40 50 60 70 80 90 100 rounds no.ofdeadnodes TEEN TEEN−ACH Fig. 4. TEEN Vs. TEEN-ACH 3) DEEC-ACH: DEEC-ACH is an extension of DEEC protocol which enhances stability period of DEEC. The CH selection criterion is based on DEEC protocol however we introduce ACH scheme which enhances the performance of DEEC. DEEC is a heterogeneous routing protocol in which nodes have different initial energy as the network starts. DEEC uses initial and residual energy level of nodes to form CHs. Once sensor nodes are deployed in the region they locally coordinate for cluster set up and operation. Let ni denotes the number of rounds for which the node Si is CH often referred as the rotating epoch. Popt is our desired percentage of CHs and ni = 1/popt is the rotating epoch. By epoch we means that a node once becomes CH will not take part in CH formation for the next 1/popt rounds. As in DEEC nodes have different energy levels the CH selection probability is different for each node and we call it average probability pi. pi of nodes with more energy is greater. The average energy of network denoted by 𝐸(𝑟) is given by eq.(1): 𝐸(𝑟) = 1 𝑁 𝑁∑ 𝑖=1 𝐸𝑖(𝑟) (1) The average probability of CHs per round per epoch is represented in eq.(2): pi = popt [1 − 𝐸(𝑟) − 𝐸𝑖(𝑟) 𝐸(𝑟) ] (2) 𝑁∑ 𝑖=1 𝑝𝑖 = 𝑁∑ 𝑖=1 𝑝𝑜𝑝𝑡 𝐸𝑖(𝑟) 𝐸(𝑟) = 𝑝𝑜𝑝𝑡 𝑁∑ 𝑖=1 𝐸𝑖(𝑟) 𝐸(𝑟) = 𝑁 𝑝𝑜𝑝𝑡 (3) Eq.(3) shows the optimal number of CHs we want to achieve. The probability of nodes in the network to become CHs is based on the ratio of their residual energy and average residual energy of the network. The probability equation for nodes to become CH is given by eq.(4): 𝑝𝑖 = 𝑝𝑜𝑡𝑝𝑁(1 + 𝑎)𝐸𝑖(𝑟) (𝑁 + ∑ 𝑁 𝑖=1 𝑎𝑖)𝐸(𝑟) (4) Where popt is the desired percentage of CHs, 𝑁 is number of nodes, Ei(r) is residual energy of a node and 𝐸(𝑟) is network’s average energy. 𝑃 𝑖 is average probability of a node to become CH. Each node creates a random number for itself and compares it with threshold equation, if the number generated is less than or equal to the threshold value the node is selected as CH for that round. The threshold equation is given by: 𝑇(Si) = { 𝑝𝑖 1−𝑝𝑖(𝑟𝑚𝑜𝑑 1 𝑝𝑖 ) 𝑆𝑖 ∈ 𝐺 0 𝑒𝑙𝑠𝑒 Where 𝐺 represents the set of nodes eligible to take part in CH selection at round 𝑟. Si 𝜖 𝐺 consists of all those nodes which have not been CHs for the most recent 𝑛𝑖 rounds. Once a node becomes CH it sends a confirmation message to all CHs. As soon as the CH is confirmed it sends an association message to all the nodes using CSMA-MAC protocol. The nodes respond according to strength of SNR received. The nodes associate themselves to that CH whose SNR is stronger. The CH then allocates TDMA slot to each node in the cluster. The nodes sense the environment and send data to their respective CHs in the TDMA slots allocated to them. CH formation depends on random number generated, threshold value and energy of nodes. At some stages two or more very close (or intersecting) nodes become CHs and energy dissipation is even more and unbalance. We make CHs away in our protocol. Once a node becomes a CH it virtually
  • 4. take part in election of next CH. The CH decides area of next node taking part in election for CH. We assume that no node can become CH in (15m, 15m). A node which has become CH at (5m, 5m) will force the nodes to be normal nodes in the area ((5+10)m, (5+10)m) . In this way the CHs are made distant and we are able to achieve 𝑁 𝑝𝑜𝑝𝑡 CHs each round. Fig. 5 shows the comparison of DEEC with DEEC-ACH. 0 1000 2000 3000 4000 5000 0 10 20 30 40 50 60 70 80 90 100 rounds no.ofdeadnodes DEEC DEEC−ACH Fig. 5. DEEC Vs. DEEC-ACH 4) SEP-ACH: In this section we implement ACH scheme on SEP. In SEP we have two level heterogeneity. The normal nodes in SEP have 𝑎 times less energy than advance nodes. The probability of normal nodes in SEP differs from advance nodes as follows: 𝑝𝑛𝑟𝑚 = 𝑝 𝑜𝑝𝑡 1 + 𝑎.𝑚 (5) 𝑝𝑎𝑑𝑣 = 𝑝 𝑜𝑝𝑡(1 + 𝑎) 1 + 𝑎.𝑚 (6) where 𝑝𝑛𝑟𝑚 in eq.(5) and 𝑝𝑎𝑑𝑣 in eq.(6) is the probability equation for normal and advance nodes respectively. m is the fraction of advance nodes. Eq.(6) shows greater probability of advance nodes to become CHs. Each node in the network generates a random number for itself, compares itself with the threshold value and become CH if the number is less than or equal to threshold value. After the CH formation CH confirmation phase starts in which the CHs are made distant. We introduce ACH scheme in SEP which makes CHs formed in SEP distant. The energy in the nodes are thus conserved and the stability period of SEP is enhanced. Fig. 6 shows that SEP-ACH performs better than SEP. The 1𝑠𝑡 node in SEP dies at round 1130 whereas in SEP-ACH the 1𝑠𝑡 node dies at round 2004. IV. CONCLUSION This paper deals with ACH scheme, a clustering technique for WSNs that enhances life time of LEACH, TEEN, DEEC, SEP and minimizing global energy consumption by distribut- ing the load to all the nodes at different points in time. In DEEC-ACH high energy nodes are made CHs frequently than low energy nodes, making energy distribution evenly in the 0 1000 2000 3000 4000 5000 0 10 20 30 40 50 60 70 80 90 100 X: 2004 Y: 0 rounds no.ofdeadnodes SEP SEP−ACH Fig. 6. SEP Vs. SEP-ACH network. Also a CH take part in the selection of next CH thus the number of CHs are reduced and the CHs are made distant. We have forced those nodes which have not become CHs and are close to each other or intersecting. The energy of nodes are conserved in this way and stability period of the network is prolonged. DEEC-ACH outperforms LEACH as LEACH is not suited with heterogeneous environment. DEEC-ACH distribute the energy evenly in the network by giving high priority to high energy nodes in election for CHs and making CHs away from one another. DEEC-ACH also perform well than DEEC as the adjacent and very close nodes are made CHs in DEEC. This consume much energy of the nodes in the process of aggregation and fusion. The global communication is increased and the nodes die at a faster rate. The stability period and throughput of the network is decreased. REFERENCES [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102114, August 2002. [2] T. J. Shepard. A channel access scheme for large dense packet radio networks. In Proccedings of ACM SIGCOMM, pages 219230, September 1996. [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Ef?cient Communication Protocols for Wireless Microsensor Networks. In Pro- ceedings of Hawaiian In- ternational Conference on Systems Science, January 2000. [4] G. Smaragdakis, I. Matta, A. Bestavros, SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks, in: Second Interna- tional Workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004), 2004. [5] L. Qing, Q. Zhu, M. Wang, Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks. In ELSEVIER, Computer Communications 29 (2006) 22302237. [6] MATLAB 7.4.0(R2007a) www.mathworks.com