You are on page 1of 3

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 4 Issue 4, April 2017, ISSN 2348 8050


Mr.L.Manoharan1, K.Deenadayalan2, B.Deepanraj3, G.Duraivenkatesh4
Assistant professor, ECE Department, Jeppiaar SRR Engineering College, Padur-603103,Chennai
Student, ECE Department, Jeppiaar SRR Engineering College, Padur-603103, Chennai
Student, ECE Department, Jeppiaar SRR Engineering College, Padur-603103, Chennai
Student, ECE Department, Jeppiaar SRR Engineering College, Padur-603103, Chennai

ABSTRACT Network formation

Wireless sensor network (WSN) brings a new evolution Information transformation
in real-time embedded systems with limited Cluster head Re-election
computation, communication, memory, and energy Malfunction detection
resources that are being used for various applications.
The antenna nodes are densely deployed in 2.1 NETWORK FORMATION
anenvironment to detect, analyze and monitor the
The formation of network is done by LEACH protocol.
physical phenomenon and consume considerable amount
LEACH is an energyefficient clustering based routing
of energy while transmitting the information. It is
protocol. This protocol reduces energy utilization of
impractical and sometimes impossible to replace the
antenna nodes by making alternation of cluster head
battery and to maintain longer network life time. So,
among the antenna nodes. Each cluster head sends the
there is a limitation on the lifetime of the battery power
information to base node depending on the type of
and energy conservation is a challenging issue.
Appropriate cluster head (CH) election is one such issue,
which can reduce the energy consumption dramatically.
Low energy adaptive clustering hierarchy (LEACH) is
the most famous hierarchical routing protocol, where the
CH selection is in rotation basis based on a probabilistic
threshold value and only CHs are allowed to send the
information to the base node (BS). But in this proposed
approach, a K-hop neighbor clustering protocol is used
among the CHs who can easily send the information to
the mobile BS by choosing suitable CH descriptors, such
as remaining battery power, mobility of BS, and
centrality of the clusters. The results have been derived
from NS-2 simulator.

Keyword: Antenna nodes, Base node, Cluster, CH,

Fuzzy, LEACH
Fig-1: Network formation with cluster heads.
This protocol uses aggregation approach for collecting
the sensed information in packet form. Here the network
The objective of our project is to reduce the energy
is divided in the form of clusters, where clusters are
utilization while transmitting information packets,
formed on the basis of coordination and distance among
maintain the battery power for longer lifetime, improved
the nodes, so as to reduce the communication overhead.
stability in working and enhanced network lifetime.
This clustering approach also helps in scalable and
robust routing. Energy consumption rate of antenna
2. SYSTEM DESIGN nodes depends upon information size and distance that
have to be traversed by antenna node.
The projected scheme comprises of three modules.

International Journal of Emerging Technologies and Engineering (IJETE)
Volume 4 Issue 4, April 2017, ISSN 2348 8050

2.2 INFORMATION TRANSFORMATION Dynamic election of cluster head eventually helps in

distributing the load over a separation of nodes in a
The information transformation between antenna nodes cluster. This separation of possible nodes can be
and base node is done by using K-hop neighbor cluster regarded as nominees for the cluster head.
based routing protocol. This protocol operates in two
phases. One is set up phase in which cluster group with
cluster head form. Another one is steady state phase in
which information between antenna nodes are passed.

Fig-4: Cluster head Re-elected in the network

The figure 4 shows the network after re-election of

cluster head in each cluster. The re-election cluster head
Fig-2: User sends data to cluster head is based on the energy and weight of nodes in the same
cluster. The elected cluster head will have the highest
This protocol helps to elect a node which is far away energy level among the nodes in the same cluster.
from the base node. All the nodes are clustered because
of the distance from the base node. At each duration, 2.4 MALFUNCTION DETECTION
every antenna node in the network should communicate
with neighbor nodes for synchronized transformation. The transmission of information between antenna nodes
is authenticated in a hop-by-hop approach. This helps in
the detection of an unauthorized node. Thus, an
unauthorized node cannot insert false information
without it being detected.

Fig-3: Cluster head sends data to Base node

2.3 CLUSTER HEAD RE-ELECTION Fig-5: Detection of malfunction in the network

Due to information transmission between cluster head The above figure shows that the information from the
with the base node, the cluster head will lose its energy. malicious node in the cluster is blocked at cluster head.

International Journal of Emerging Technologies and Engineering (IJETE)
Volume 4 Issue 4, April 2017, ISSN 2348 8050

The cluster head does not send the false information to networks using fuzzy logic, Ad Hoc Netw., vol. 10, no.
the base node. 7, pp. 14691481, 2012.

3. RESULTS OBTAINED [3] T. Sharma and B. Kumar, F-MCHEL: Fuzzy based

master cluster head election Leach protocol in wireless
The results obtained by the K-hop cluster based routing sensor network, Int. J. Comput. Sci. Telecommun., vol.
protocol is compared with the fuzzy logic based routing 3, no. 10, pp. 813, Oct. 2012.
protocol in which it uses LEACH-C(Low Energy
Adaptive Clustering Hierarchy-Centralized). [4] Alkesh, A. K. Singh, and N. Purohit, A moving base
node strategy using fuzzy logic for lifetime enhancement
in wireless sensor network, in Proc. Int. Conf.
Commun. Syst. Netw. Technol., Jun. 2011, pp. 198202.

[5] Z. W. Siew, C. F. Liau, A. Kiring, M. S. Arifianto,

and K. T. K. Teo, Fuzzy logic based cluster head
election for wireless sensor network, in Proc. 3rd
CUTSE Int. Conf., Sarawak, Malaysia, 2011, pp. 301

Fig-6: Protocol Efficiency Graph

Fig-7: Loss Ratio Graph


[1] V. Nehra, R. Pal, and A. K. Sharma, Fuzzy-based

leader selection for topology controlled PEGASIS
protocol for lifetime enhancement in wireless sensor
network, Int. J. Comput. Technol., vol. 4, no. 3, pp.
755764, Mar./Apr. 2013.

[2] H. Taheri, P. Neamatollahi, O. M. Younis, S.

Naghibzadeh, and M. H. Yaghmaee, An energy-aware
distributed clustering protocol in wireless sensor