Conference PaperPDF Available

Dynamic cluster head node election (DCHNE) model over wireless sensor networks (WSNs)

Authors:

Abstract and Figures

WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomplish a specific task. Thus, clustering enables sensor nodes to communicate through the cluster head node for continuous communication process. In this paper, we introduce a dynamic cluster head election mechanism. Each node in the cluster calculates its residual energy value to determine its candidacy to become the Cluster Head Node (CHN). With this mechanism, each sensor node compares its residual energy level to other nodes in the same cluster. Depending on the residual energy level the sensor node acts as the next cluster head. Evaluation of the dynamic CHN election mechanism is conducted using network simulator-2 (ns2). The simulation results demonstrate that the proposed approach prolongs the network lifetime and balancing the energy consumption model among the nodes of the cluster.
Content may be subject to copyright.
A preview of the PDF is not available
... The reputation value is calculated using beta reputation system as described in Section 4.2. The remaining energy level of each sensor node in a WSN is calculated as in Alabass et al. (2014). Sensor nodes have single-hop communication with the CH. ...
... The remaining energy is not the same in CH nodes which communicate with the BS and sensor nodes that communicate only with CHs. The remaining energy in a sensor node that communicates only with a CH is denoted as (Alabass et al., 2014): ...
... where energy utilization of radio and energy expended for amplifying radio signal are denoted as E radio and E amp , respectively. The remaining energy in a CH when forwarding data to the BS is denoted as (Alabass et al., 2014): ...
Article
Mobile object tracking is one of the most important applications of Wireless Sensor Networks (WSNs) deployed in battlefields, wildlife or habitat monitoring applications. Existing object tracking algorithms are mostly centralized and based on heavy and complex signal processing algorithms hence they cannot be applied to resource constrained WSNs directly. Object tracking algorithms of WSNs should be designed by considering energy conservation, bandwidth and communication overheads. Moreover, as practical object tracking applications are typically used in mission-critical applications, security is another important design matter to be considered. In mission-critical applications, sensor nodes are deployed in hostile fields and they can be easily captured by intruders. Such compromised nodes can be used to falsify the collected data and threaten the object tracking reliability. In this paper, we propose a novel secure and reliable object tracking protocol that considers security and object tracking tasks simultaneously. The basic idea behind the proposed protocol is to ensure tracking security using reputation based trust concept for individual sensor nodes. The performance evaluation results show that the proposed protocol allows the network to retain the reliability of tracking data even in the presence of compromised nodes, thereby achieving secure and reliable object tracking process.
... Alabass et al. [7] proposed a dynamic cluster head election mechanism that calculates the residual energy value to determine the candidacy of each node in the cluster to become the cluster head. In this mechanism, each sensor node compares their residual energy level to the other nodes in a cluster and based on this residual energy level the cluster head is selected [8]. ...
Article
Full-text available
In the recent times of data transmission, applying the Internet of Things (IoT) device, networking to the various IoT modules is still a great challenge with the deployment stage. Very few localities in the world have the deployed IoT module integrated in its communication, but still maximum of the location are in testbed. As a practical application, the IoT modules can be used to collect the information about either the drunken person who is driving the vehicle or the heavily loaded vehicles. The vehicle that we are about to search should be integrated with the IoT module. In this paper, a novel approach for object tracking specifically the drunken driving person and the heavily loaded vehicle is proposed to ensure the follow of rules and prevent any mis happening. The task is to identify the exact vehicle which does not follow the rules which can be tracked and eliminated. For that we are proposing a simple methodology on identifying the vehicle by the tracking the locality of the vehicle as a cluster of nodes where the cluster provides the key inference on how the vehicles are interrelated in the learning environment.
... Decision of which algorithm to use depends highly on the necessities of the application. In [17] they proposed one more algorithm by name Least-Movement Topology Repair (LeMoToR) to restore the lost connectivity in WSANs with least movement of the nodes. Works of [18] proposed a simple Hybrid Connectivity Restoration (HCR) in WSANs that combines proactive selection as well as reactive motion. ...
Article
Full-text available
Recent years are witnessing the growth of different kinds of networks including Wireless Sensor and Actuator Networks (WSANs). WSANs are self-configured and ad-hoc natured networks without any permanent infrastructure that consists of numerous sensor nodes and few actuator nodes that can collaboratively monitor the characteristics of physical and environmental conditions like vibration, sound, temperature, pressure, motion or pollutants, and determine an appropriate action to take depending upon the sensed data, thereby changing the state of the field of interest by performing the suitable action in it. We can say it as an advancement of Wireless Sensor Networks (WSNs) with the inclusion of actuating component. Along with the existing research challenges of WSNs, the WSANs have many additional research challenges to be addressed. This paper gives an insight into the scope of ongoing and future research in the aspect of preserving temporal relationship among the events, restoring the connectivity in case of node failures, need for QoS parameters, along with several operational details of WSANs.
... Alabass and Elleithy in [17] propose a mathematical model that helps to evaluate the residual energy level of each node in a cluster to elect the cluster head. The residual energy is calculated taken in to consideration, the energy spent for data transmission from cluster nodes to the cluster heads, from the cluster head to the base station and for the scheduling purpose. ...
Conference Paper
Wireless networks can be self-sustaining by harvesting energy from all other possible means. This emerging technology enables proactive energy replenishment of wireless networks. It is advantageous in supporting applications with quality of service. In this paper we propose a novel project Energy Harvesting (EH) simulation method for Cognitive Radio and Non Cognitive Radio (CR & NCR) networks using MATLAB. Harvesting energy can be done in secondary networks called secondary transmitter (ST), harvest wasted energy from nearby active transmitters in a primary network, called primary transmitter (PT). We consider all possible means in which PTs and STs are distributed as independent Homogeneous Poisson Point Process (HPPPs) and communicate with their intended receivers within specified distances. Each PT is associated with a guard zone to protect its intended receiver from ST's interference, and at the same time delivers energy to STs located in its harvesting zone. Based on the proposed model, we tend to analyze gain estimation and signal to noise ratio in allowed secondary users. Finally, we show the comparison of number of active secondary users is high in Cognitive Radio networks.
Article
Full-text available
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Conference Paper
Full-text available
In this paper, we introduce a novel least distance smart neighboring search (LDSNS) to determine the mostefficient path at one-hop distance over WSNs. LDSNS helps to reduce the energy consumption and speeds up scheduling for delivery of data. It provides cross layering support and linking MAC layer with network layer to reduce the amount of control messages. LDSNS is a robust and efficient approach that isbased on single-hop communication mechanism. To validate the strength of LDSNS, we incorporate LDSN in Boarder Node Medium AccessControl (BN-MAC) protocol [ 15] to determine the list of neighboring sensor nodes and choosing best 1-hop efficient search to avoid collision and reducing energy consumption. Evaluation of LDSNS is conducted using network simulator-2 (ns2).The performance of LDSNS is compared with minimum energy accumulative routing problem (MEAR) [12], asynchronous quorum-based wakeup scheduling scheme (AQWSS) [14] and Minimum Energy Relay Routing (MERR) [13]. Simulation results show that LDSNS is highly energy efficient and faster as compared with MEAR, AQWSS and MERR. It saves 24% to 62% energy resources and improves12% to 21% search at 1-hop neighboring nodes.
Article
Full-text available
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, network simulator-2 (ns2) simulation is used to simulate the behavior of network with the supporting mathematical model. The main objective of this research is to remotely access different types of servers, laptops, desktops and other static and moving objects. This prototype is initially deployed to control MSCS [13] & [14] from remote place through mobile devices. The prototype can further be enhanced to handle several objects simultaneously consuming less energy and resources.
Chapter
Full-text available
Fast expansion in ambient intelligence (AmI) has attracted different walks of people. AmI systems provide robust communication in open, dynamic and heterogeneous environments. This paper presents a AES paradigm that introduces wireless sensor networks to control remote servers or other devices at remote place through mobile phones. The main focus of paper is to consume minimum energy for obtaining the objectives. To realize the paradigm, mathematical model is formulated. The proposed paradigm consists of automatic energy saving model senses the environment to activate either the passive or active mode of sensor nodes for saving energy. Simulations are conducted to validate the proposed paradigm; we use two types of simulations: Test bed simulation is done to check practical validity of proposed approach and Ns2 simulation is performed to simulate the behavior of wireless sensors network with supporting mathematical model. The prototype can further be implemented to handle several objects simultaneously in university and other organizations.
Conference Paper
Full-text available
The unbalanced energy consumption among self-powered sensor nodes negatively impacts network lifetime. In order to overcome this limitation, we propose a new cluster header selection and cluster formation scheme. With our scheme, sensor nodes within a cluster autonomously decide in which time frame they will act as a cluster header based on the amount of energy consumption in the current round. In addition, they are conditionally allowed to switch their cluster header depending on signal strength of their current cluster header. Our simulation results show the proposed scheme increases the network lifetime and provides a well-balanced energy consumption pattern among the nodes in a cluster compared to previously proposed schemes.
Conference Paper
In order to solve the problem of dynamic clustering for wireless sensor networks(WSN) triggered by target event, a dynamic clustering protocol, focusing on cluster head selection, cluster member solicitation and cluster reorganization, is proposed. In cluster head selection mechanism, the proposed selection approach takes the detected signal strength, residual energy of node and distance between the cluster head and the sink node into consideration. In cluster member solicitation, an adaptive method based on task requirement is proposed in terms of cluster range setting, through this method, the cluster size is constrained and the energy consumption of intra-cluster communication is reduced. The simulation results show that the proposed protocol can efficiently conserve energy and prolong the lifetime of WSN, especially when the sink node is located far from the network.
Article
In this paper, an efficient and dynamic clustering scheme (EDCS) is proposed for routing problem in heterogeneous wireless sensor networks. In order to guide the process of cluster head election for a given multi-level heterogeneous network, EDCS determines the probability of node to be a cluster head through average network residual energy estimation in next round by average energy consumption forecast in ideal state and reference value of historical energy consumption simultaneously. Furthermore, analogous universal gravitation is introduced to make non-cluster head node joining cluster in terms of gravitation during cluster formation process. Simulation results have proved efficiency of EDCS. It applies more suitable than LEACH, SEP, DEEC, and EDFCM for multi-level heterogeneous wireless sensor networks (WSNs).
Chapter
Wireless Sensor Network (WSN) is one of the major research areas in computer network field today. The function of WSN in this chapter is to provide sensing services in an un-attended harsh environment. Sensed data need to be delivered to the base station and to cope with the network unreliability problem. Few routing protocol takes into consideration of this problem. It is a great challenge of the hierarchical routing protocol to provide network survivability through redundancy features. In this chapter, a short literature review of the existing routing protocol is carried out. Then a novel hierarchical routing protocol, which addresses network survivability and redundancy issues, is introduced. Initial analysis shows promising results of the proposed protocol comparing with OEDSR and LEACH, which is a well known protocol as benchmark. Finally, conclusion was drawn based on the research and future direction for further research is identified. KeywordsWireless sensor network-Hierarchical-Routing protocol-Reliability-Redundancy-Survivability