Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks

  • S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

This article was retracted on 06 May 2024

This article has been updated

Abstract

The information technology has grown so rapidly that it has led to the development of compact size and inexpensive sensor nodes. Several sensor nodes together form a WSN. Though the WSN is compact in size, they can be equipped with radio transceivers, sensors, microprocessors which are embedded and sensors. One of the major critical issues with WSN is energy efficiency. With WSN, various energy-efficient techniques are being employed. Among clustering techniques, LEACH, HEED, EAMMH, TEEN, SEP, DEEC, K-means clustering algorithm are some of the most popular energy-efficient techniques which are employed. These are hierarchical based protocol which saves energy by balancing the energy expense. Detailed review and analysis of these protocols are presented, and midpoint location algorithm is proposed in this paper. The methodology used for reduction in dead nodes while transmitting the data is also discussed. In the proposed work, path construction phase (PCP) and alternative path construction phase (APCP) are created in order to reduce dead nodes. During the processes of data transmission if a node is found out that it will fail and APCP is applied, the cluster head is changed while applying the APCP. The cluster head is chosen based on midpoint location and highest node energy. The cluster head becomes permanent if the node has midpoint location and the highest energy. If the node does not have midpoint location and highest energy, it becomes a temporary cluster head. The proposed techniques are compared with EAMMH protocol and LEACH protocol using MATLAB. When compared with EAMMH, the dead nodes were reduced with subsequent rounds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

Change history

References

  1. Zawaideh F, Salamah M (2014) Adaptive balanced clustering for wireless sensor network energy optimization. Netw Complex Syst. ISSN: 2224-610X (Paper). ISSN: 2225-0603 (Online) 4(4). www.iiste.org

  2. Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26)

  3. Mohaisen Linda F, Joine Laurie L (2017) Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication. Ad Hoc Netw 66:1–15

    Article  Google Scholar 

  4. Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10

  5. Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Appl 77(4):4379–4399

    Article  Google Scholar 

  6. Singh SK, Singh MP, Singh DK (2010) Energy efficient homogenous clustering algorithm for wireless sensor networks. Int J Wireless Mobile Netw (IJWMN) 2(3):49

    Article  Google Scholar 

  7. Tripathy AK, Chinara S (2012) Comparison of residual energy-based clustering algorithms for wireless sensor network. Int Sch Res Netw ISRN Sen Netw Article ID 375026, 2012:10

  8. Samayveer Singh A, Aruna Malik B, Rajeev Kumar C (2017) Energy efficient heterogeneous deec protocol for enhancing lifetime in WSNs. Eng Sci Technol Int J 20:345–353

    Google Scholar 

  9. Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114

    Article  Google Scholar 

  10. Sharmaa R, Mishraa N, Srivastava S (2015) A proposed energy efficient distance based cluster head (DBCH) algorithm: an improvement over LEACH. Procedia Comput Sci 57:807–814

    Article  Google Scholar 

  11. Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl 1–21

  12. Gowrishankar, S Basavaraju TG, Manjaiah Handy MJ, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: IEEE international conference on mobile and wireless communications networks

  13. Reddy BB, Rao KK (2013) Adaptive cluster head probability for LEACH protocol. IJCCN Int J Comput Commun Netw 3(3) ISSN 2289-3369

  14. Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Appl 77(8):10195–10215

    Article  Google Scholar 

  15. Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26)

  16. Divya C, Krishnan N, Gandhi Mathy T (2013) Energy efficient stable election protocol for clustered heterogeneous wireless sensor networks. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, ISSN: 2278-8727 12(5) 55–64. www.iosrjournals.org

  17. Heinzelman WR, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670

    Article  Google Scholar 

  18. Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), pp 202–206

  19. Khediri SEL, Nasri N, Wei A, Kachouri A (2014) A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput Sci 32:1180–1185

    Article  Google Scholar 

  20. Manogaran CT G, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141

  21. Puneet A, Vidushi S (2013) Cluster head selection in wireless sensor networks under fuzzy environment. Hindawi Publishing Corporation ISRN Sensor Networks, vol 2013, Article ID 909086, 8

  22. Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189

  23. Dhankhar S, Singh S (2016) Performance comparison of LEACH & HEED clustering protocols in WSN using MATLAB-A review. Int J Tech Res (IJTR) 5(1)

  24. Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput 1–12

  25. Mahapatra RP, Yadav RK (2015) Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput Sci 57:1005–1014

    Article  Google Scholar 

  26. Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C(2017) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen Comput Syst

  27. Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal Ubiquitous Comput 1–11

  28. Parmar J, Pirishothm A (2015) Study of wireless sensor networks using leach, teen and apteen routing protocols. Int J Sci Res (IJSR) ISSN (Online): 2319–7064

  29. Kanisha B, Lokesh S, Kumar PM, Parthasarathy P, Chandra Babu G (2018) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Personal Ubiquitous Comput 1–9

  30. Kumar PM, Gandhi UD (2017) A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng

  31. Mundada MR, Thimmegowda N, Bhuvaneswari T, Cyrilraj V (2013) Clustering in wireless sensor networks: performance comparison of EAMMH and LEACH protocols using MATLAB. Adv Mater Res 705:337–342

    Article  Google Scholar 

  32. Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189

  33. Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3466-5

    Article  Google Scholar 

  34. Chaudhary R, Vatta S (2014) Review paper on energy- efficient protocols in wireless sensor networks. IOSR J Eng 04(02):2278–8719

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Jancy.

Ethics declarations

Conflict of interest

Authors have no conflict of interest in publishing their work in this journal.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s00521-024-09881-x"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jancy, S., Jayakumar, C. RETRACTED ARTICLE: Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks. Neural Comput & Applic 31, 1467–1480 (2019). https://doi.org/10.1007/s00521-018-3526-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3526-x

Keywords

Navigation