skip to main content
10.1145/3440749.3442615acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway

Published:13 May 2021Publication History

ABSTRACT

Wireless Sensor Network (WSN) is a self-configured network of light-weight nodes, that are used in many applications by sending their data through this network to a Base Station (BS), which in turn, delivers the data to its final destination. In WSN, the sensor node’s energy is usually limited, and thus, the overall power consumption of the network is a real challenge. Numerous methods have been proposed to overcome this challenge by improving the overall power consumption and thus, prolonging the lifetime of the network. Low Energy Adaptive Clustering Hierarchy (LEACH) protocol has been considered as a leading routing protocol in WSN, due to its low power consumption resultant from its cluster-based behavior. However, for dense networks, LEACH suffers from large burden over cluster head (CH), which might result in packet loss due to the induced congestion in the CH. In this paper, an improved algorithm based on LEACH is proposed to maximize the lifetime of WSN, by using another node to relieve CH’s burden. The routing path selection process is refined through selecting a new node that has the highest residual energy in each cluster to be an alternative gateway for the cluster head. Then, the routing path will be decided based on distance. This modified algorithm outperforms the original LEACH by 4.35% increase in the residual energy, which prolongs the network lifetime. However, there is a slight increase in the overhead ratio.

References

  1. Maman Abdurohman, Yadi Supriadi, and Fitra Zul Fahmi. 2020. A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network. Journal of Information Processing Systems 16 (08 2020), 845–858. https://doi.org/10.3745/JIPS.03.0142Google ScholarGoogle Scholar
  2. Z. Beiranvand, A. Patooghy, and M. Fazeli. 2013. I-LEACH: An efficient routing algorithm to improve performance to reduce energy consumption in Wireless Sensor Networks. (2013), 13–18.Google ScholarGoogle Scholar
  3. Mohamed Elshrkawey, Samiha M Elsherif, and M Elsayed Wahed. 2018. An enhancement approach for reducing the energy consumption in wireless sensor networks. Journal of King Saud University-Computer and Information Sciences 30, 2(2018), 259–267.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Thangavelu G. Anitha, V. Vijayakumari. 2018. A Comprehensive Study and Analysis of LEACH and HEED Routing Protocols for Wireless Sensor Networks–with Suggestion for Improvements. Indonesian Journal of Electrical Engineering and Computer Science 9. https://doi.org/10.11591/ijeecs.v9.i3.pp778-783Google ScholarGoogle Scholar
  5. Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Trivino Cabrera, and Claudia Jacy Barenco Abbas. 2009. Routing protocols in wireless sensor networks. Sensors 9, 11 (2009), 8399–8421.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ibrahim F Haddad and David Gordon. 2002. Network simulator 2: a simulation tool for linux. Linux Journal10(2002).Google ScholarGoogle Scholar
  7. Linnyer Beatryz Ruiz José Marcos Silva Nogueira. 2020 (accessed August 30, 2020). The Mannasim Framework. http://www.mannasim.dcc.ufmg.br/Google ScholarGoogle Scholar
  8. Hu Junping, Jin Yuhui, and Dou Liang. 2008. A time-based cluster-head selection algorithm for LEACH. In 2008 IEEE Symposium on Computers and Communications. IEEE, 1172–1176.Google ScholarGoogle ScholarCross RefCross Ref
  9. Ji-Zhen Long, Yuan-Tao Chen, Dong-Mei Deng, LI Bin, and LI Fang. 2011. Assistant cluster head clustering algorithm based on LEACH protocol. Computer engineering 37, 7 (2011), 103–105.Google ScholarGoogle Scholar
  10. A. Nandi, B. Sonowal, D. Rabha, and A. Vaibhav. 2019. Centered Sink LEACH Protocol for Enhanced Performance of Wireless Sensor Network. In 2019 International Conference on Automation, Computational and Technology Management (ICACTM). 436–440. https://doi.org/10.1109/ICACTM.2019.8776765Google ScholarGoogle Scholar
  11. Hicham Ouldzira, Hajar Lagraini, Ahmed Mouhsen, Mostafa Chhiba, and Tabyaoui Abdelmoumen. 2019. MG-leach: an enhanced leach protocol for wireless sensor network. International Journal of Electrical and Computer Engineering (IJECE) 9 (08 2019), 3139. https://doi.org/10.11591/ijece.v9i4.pp3139-3145Google ScholarGoogle ScholarCross RefCross Ref
  12. Raju Pal, Subash Yadav, Rishabh Karnwal, 2020. EEWC: energy-efficient weighted clustering method based on genetic algorithm for HWSNs. Complex & Intelligent Systems(2020), 1–10.Google ScholarGoogle Scholar
  13. Ekram Hossain Teerawat Issariyakul. 2012. The NS2 Framework. https://www.springer.com/gp/book/9781461414056Google ScholarGoogle Scholar
  14. Mu Tong and Minghao Tang. 2010. LEACH-B: an improved LEACH protocol for wireless sensor network. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, 1–4.Google ScholarGoogle ScholarCross RefCross Ref
  15. Abdulhamid Zahedi. 2018. An efficient clustering method using weighting coefficients in homogeneous wireless sensor networks. Alexandria Engineering Journal 57, 2 (2018), 695–710.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
            November 2020
            313 pages
            ISBN:9781450388863
            DOI:10.1145/3440749

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 May 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)5
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format