Abstract
The information technology has grown so rapidly that it has led to the development of compact size and inexpensive sensor nodes. Several sensor nodes together form a WSN. Though the WSN is compact in size, they can be equipped with radio transceivers, sensors, microprocessors which are embedded and sensors. One of the major critical issues with WSN is energy efficiency. With WSN, various energy-efficient techniques are being employed. Among clustering techniques, LEACH, HEED, EAMMH, TEEN, SEP, DEEC, K-means clustering algorithm are some of the most popular energy-efficient techniques which are employed. These are hierarchical based protocol which saves energy by balancing the energy expense. Detailed review and analysis of these protocols are presented, and midpoint location algorithm is proposed in this paper. The methodology used for reduction in dead nodes while transmitting the data is also discussed. In the proposed work, path construction phase (PCP) and alternative path construction phase (APCP) are created in order to reduce dead nodes. During the processes of data transmission if a node is found out that it will fail and APCP is applied, the cluster head is changed while applying the APCP. The cluster head is chosen based on midpoint location and highest node energy. The cluster head becomes permanent if the node has midpoint location and the highest energy. If the node does not have midpoint location and highest energy, it becomes a temporary cluster head. The proposed techniques are compared with EAMMH protocol and LEACH protocol using MATLAB. When compared with EAMMH, the dead nodes were reduced with subsequent rounds.
Similar content being viewed by others
Change history
06 May 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00521-024-09881-x
References
Zawaideh F, Salamah M (2014) Adaptive balanced clustering for wireless sensor network energy optimization. Netw Complex Syst. ISSN: 2224-610X (Paper). ISSN: 2225-0603 (Online) 4(4). www.iiste.org
Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26)
Mohaisen Linda F, Joine Laurie L (2017) Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication. Ad Hoc Netw 66:1–15
Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10
Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Appl 77(4):4379–4399
Singh SK, Singh MP, Singh DK (2010) Energy efficient homogenous clustering algorithm for wireless sensor networks. Int J Wireless Mobile Netw (IJWMN) 2(3):49
Tripathy AK, Chinara S (2012) Comparison of residual energy-based clustering algorithms for wireless sensor network. Int Sch Res Netw ISRN Sen Netw Article ID 375026, 2012:10
Samayveer Singh A, Aruna Malik B, Rajeev Kumar C (2017) Energy efficient heterogeneous deec protocol for enhancing lifetime in WSNs. Eng Sci Technol Int J 20:345–353
Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114
Sharmaa R, Mishraa N, Srivastava S (2015) A proposed energy efficient distance based cluster head (DBCH) algorithm: an improvement over LEACH. Procedia Comput Sci 57:807–814
Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl 1–21
Gowrishankar, S Basavaraju TG, Manjaiah Handy MJ, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: IEEE international conference on mobile and wireless communications networks
Reddy BB, Rao KK (2013) Adaptive cluster head probability for LEACH protocol. IJCCN Int J Comput Commun Netw 3(3) ISSN 2289-3369
Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Appl 77(8):10195–10215
Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26)
Divya C, Krishnan N, Gandhi Mathy T (2013) Energy efficient stable election protocol for clustered heterogeneous wireless sensor networks. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, ISSN: 2278-8727 12(5) 55–64. www.iosrjournals.org
Heinzelman WR, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670
Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), pp 202–206
Khediri SEL, Nasri N, Wei A, Kachouri A (2014) A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput Sci 32:1180–1185
Manogaran CT G, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141
Puneet A, Vidushi S (2013) Cluster head selection in wireless sensor networks under fuzzy environment. Hindawi Publishing Corporation ISRN Sensor Networks, vol 2013, Article ID 909086, 8
Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189
Dhankhar S, Singh S (2016) Performance comparison of LEACH & HEED clustering protocols in WSN using MATLAB-A review. Int J Tech Res (IJTR) 5(1)
Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput 1–12
Mahapatra RP, Yadav RK (2015) Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput Sci 57:1005–1014
Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C(2017) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen Comput Syst
Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal Ubiquitous Comput 1–11
Parmar J, Pirishothm A (2015) Study of wireless sensor networks using leach, teen and apteen routing protocols. Int J Sci Res (IJSR) ISSN (Online): 2319–7064
Kanisha B, Lokesh S, Kumar PM, Parthasarathy P, Chandra Babu G (2018) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Personal Ubiquitous Comput 1–9
Kumar PM, Gandhi UD (2017) A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng
Mundada MR, Thimmegowda N, Bhuvaneswari T, Cyrilraj V (2013) Clustering in wireless sensor networks: performance comparison of EAMMH and LEACH protocols using MATLAB. Adv Mater Res 705:337–342
Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189
Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3466-5
Chaudhary R, Vatta S (2014) Review paper on energy- efficient protocols in wireless sensor networks. IOSR J Eng 04(02):2278–8719
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors have no conflict of interest in publishing their work in this journal.
Additional information
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s00521-024-09881-x"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jancy, S., Jayakumar, C. RETRACTED ARTICLE: Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks. Neural Comput & Applic 31, 1467–1480 (2019). https://doi.org/10.1007/s00521-018-3526-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-018-3526-x