COST EFFECTIVE ENERGY EFFICIENT SCHEME FOR MOBILE ADHOC NETWORK
Keywords:Clusters, MANET, Gateway, LEACH, Broadcasting, Energy Efficiency, Power, REQ, RES Consumption, Routing.
AbstractClustering is defined as grouping of nodes based on their energy levels. In each cluster, a gateway node is set depending on the node that has the highest energy level. This phenomenon is majorly implemented using LEACH protocol. LEACH is abbreviated as Low Energy Adaptive Clustering Hierarchy. It is a time division-based Media Access Control (MAC) protocol. In order to make it energy efficient a new protocol is defined to hold the sensors as long as possible. It balances the network load in minimal time. A more energy efficient node transfer is possible by means of the above protocol which attains the high residual energy. The major advantage of implementing this protocol is to reduce the energy and power consumption that is needed to create and maintain the cluster. In Mobile Ad-hoc Network (MANET), the vast consumption of power can be literally minimized by utilizing this clustering scheme. The simulation of our protocol is carried out in Network Simulator-2.
S.S. Ghuman, “Clustering techniques – a review,” International Journal of Computer Science and Mobile Computing, vol. 5, issue 5, pp. 524-530, May 2016.
P. Berkhin, “A Survey of Clustering Data Mining Techniques,” in: Kogan J., Nicholas C., Teboulle M. (eds) Grouping Multidimensional Data. Springer, Berlin, Heidelberg, 2006, pp. 25-71.
N. Nasser, C. Arboleda, M. Liliana, N. Nasser, C. Arboleda, M. Liliana, “Comparison of Clustering Algorithms and Protocols for Wireless Sensor Networks,” Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006, pp. 1787–1792.
W. Akkari, B. Bouhdid, A. Belghith, “LEATCH: low energy adaptive tier clustering hierarchy,” Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, 2015, pp. 365–372.
A.A. Alghamdi, R.J. Pooley, P.J.B. King, “Energy-efficient adaptive forwarding scheme for MANETs,” Proceedings of the 2016 Wireless Days (WD), 2016, pp. 1-7.
A. Ahmad, M.A. Pasha, Z. Ahmad, S. Masud, A. Sikora, “Energy Efficient sensor network routing (EESNR) protocol for large distributed environmental monitoring applications,” Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS2017), 20-23 September 2017, Bucharest, Romania, pp. 740-745.
S. Mythili, E. Madhiya, “An analysis on clustering algorithms in data mining,” International Journal of Computer Science and Mobile Computing, vol. 3, issue 1, pp. 334-340, January 2014.
M. Steinbach, G. Karypis, V. Kumar, “A comparison of document clustering techniques,” Proceedings of the KDD Workshop on Text Mining, 2000, pp. 1-20.
H. Jeong, H. Jeong, Y. Yoo, “Dynamic probabilistic flooding algorithm based on neighbor information in wireless sensor networks,” Proceedings of the International Conference on Information Networking (ICOIN), 2012, pp. 340-345.
C.R. Rathish, A. Rajaram, “Sweeping inclusive connectivity based routing in wireless sensor networks,” ARPN Journal of Engineering and Applied Sciences, vol. 13, no. 5, pp. 1752-1760, March 2018.
D.G. Reina, S.L. Toral, P. Johnson, F. Barrero, “A survey on probabilistic broadcast schemes for wireless ad-hoc networks,” Ad Hoc Networks, vol. 25, pp. 263-292, February 2015.
A. Al-Qawasmeh, S. Bettaye, “A proactive distance-based flooding technique for MANETs with heterogeneous radio ranges,” Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN), 2008, vol. 1, pp. 1-21.
C.R. Lin, M. Gerla, “Adaptive clustering for mobile wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 15, issue 7, pp. 1265-1275, September 1997.
F. Xiangning, S. Yulin, “Improvement on LEACH protocol of wireless sensor networks,” Proceedings of the International Conference on Sensor Technologies and Applications (SENSORCOMM’2007), October 2007, pp. 260-264.
V. Katiyar, N. Chand, G. C. Gautam, A. Kumar, “Improvement in LEACH protocol for large scale wireless sensor networks,” Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), 2011, pp. 1070-1075.
C.R. Rathish and A. Rajaram, “Hierarchical Load Balanced Routing Protocol for Wireless Sensor Networks,” International Journal of Applied Engineering Research, vol. 10, issue 7, pp. 16521-16534, 2015.
J. Xu, N. Jin, X. Lou, T. Peng, Q. Zhou, Y. Chen, “Improvement of LEACH protocol for WSN,” Proceedings of the 2012 IEEE 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 2174-2177.
C.Y. Fu, Z. Jiang, W. Wei, A. Wei, “An energy balanced algorithm of LEACH protocol in WSN,” IJCSI International Journal of Computer Science, vol. 10, issue 1, pp. 354-359, January 2013.
M. J. Handy, M. Haase, D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster head selection,” Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network, 2002, pp. 368–372.
S. Corson, J. Macker, “Mobile Ad-hoc Networking (MANET) – Routing Protocol Performance Issues and Evaluation Considerations,” RFC2501, University of Maryland, pp. 1-12, January 1999.
A. Al-Maashri, M. Ould-Khaoua, “Performance analysis of MANET routing protocols in the presence of self-similar traffic,” Proceedings of the 31st Annual IEEE Conference on Local Computer Networks, 2006, pp. 801-807.
O. Younis, S. Fahmy, “HEED: A hybrid energy efficient distributed clustering approach for ad-hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, issue 4, pp. 366–379, December 2004.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.