Vous êtes sur la page 1sur 21

ENERGY EFFICIENT IM-LEACH

PROTOCOL FOR WIRELESS


SENSOR NETWORK

BATCH NO:5
SUPERVISOR: Dr. R. VINOD KUMAR,Ph.D
BATCH MEMBERS:
Vibhu . S
Shiva .R
Ugeshraja .M
Krishna prasanth . M
LITERATURE REVIEW
Title-Detection of dishonest trust • In this paper the security mechanism of
recommendations in mobile ad hoc networks the current WSN is improved along with
Author:Zakirullah; Islam, M.H Khan the efficiency.
Year:2016 • Cluster Head based on neighborshood
Loss

• Multi hop is the concept they used.


Title: Research on ad hoc protocol • For the nodes which are far from the
Author: Jianguo SHAN, Lei DONG BS(base station) multi hop is very useful
Year:2016 as they can send to the near nodes and
finally the cluster head which is close to
BS will send directly to it.
Title:Energy Saving in Wireless • If message rate is less energy is still wasted in
Sensor Networks idle-listening.
Author:Zahra Rezaei.N
Year:2015 • Sleep and listen periods are predefined and
constant which decreases the efficiency of the
algorithm under

Long listening interval

Title:A SURVEY OF WIRELESS •Z-MAC does not use a global frame equal for
SENSOR NETWORK all nodes in the network.
ARCHITECTURES
Author:Almir Davis.C • It would be very difficult and expensive to
Year:2015 adapt when a topology change occurs.
Title:data-centric arthitecture in wsn •Data-centric architectures are characterized by
Author:Hwa Chang a vast number of randomly deployed sensors
Year:2015 that
• It only communicate node-to-node without any
global network identification.
• In these types of architectures, a sink node
sends a request query through the network of
nodes

Title:SPIN Protocol in cluster forming • Sensor Protocol for Information via


Author:Vikas Upadhyay Negotiation suffers from lack of QoS and
Year:2014 cannot ensure that negotiation among nodes
along the source-sink path will guarantee the
final delivery of data
EXISTING METHOD:
• Normal LEACH (Low Energy Adaptive Clustering Hierarchy)

• The LEACH protocol divides the whole network into several clusters.

• The splitting take place randomly and the nodes form clusters and elect a
cluster head randomly among themselves.

• The LEACH protocol has two states


1. set up state
2. steady state
DRAWBACKS:

• The cluster head node is randomly selected in LEACH protocol.

• There is a problem of a low energy cluster being elected as a cluster


head and if this happens it will run out of energy and die very quickly.

• The traditional LEACH divides the clusters randomly and leads to


uneven distribution of clusters. So, the divided clusters may not be the
best.

• Some clusters may have fewer nodes and some may have more nodes.
MOTIVATION:
• To achieve a longer lifetime and better performance of
the nodes by using less energy in an efficient manner.
• Parameters-
load balancing
Energy efficient
OBJECTIVE:
• To elect the cluster head based on their Residual
energy and Mobility parameters.

• To make an energy efficient data gathering and


transmission using sleep/wake modes.
BASIC BLOCKS OF THE PROCESS

CLUSTER ENERGY EFFICIENT TRANSMIT THE DATA


FORMATION AND DATA GATHERING TO BASE STATION
CLUSTER HEAD
ELECTION
Block diagram of sensor node
Antenna

Transceiver

Memory Embedded
processor

Sensor

Battery
CLUSTER HEAD ELECTION
• The cluster head selection for each cluster is done by comparing the
residual energy of individual sensor node in every round.
• The selection of cluster head depends on threshold value. The
selection depends on 0 or 1.
• If the number is less than the threshold value then the corresponding
node becomes the head for the particular round.

T= P , if n G
1-p[r mod(1-p)]
0 , otherwise
DATA TRANSMISSION
• The data which is gathered by the nodes will be transmitted to the base
station by the cluster head in an energy efficient manner.

• Here only the active nodes which collect the data will send the data to
cluster head and then to the station.
• Other nodes are in sleep mode
STEP BY STEP PROCESS
STEP1: start
STEP2: select the cluster head based on the threshold value.
STEP3: If the node becomes cluster head,cluster head is selected.
STEP4: Wait for nearby node to send joint request.
STEP5: If the joint request is received by cluster head
STEP6: calculate the average energy
STEP7: create scheduling for data transmission using TDMA.
STEP8: If the data is received from all the cluster then send the data
to the base station.
STEP9: stop.
Proposed method
• To improve the existing LEACH protocol, we are proposing a new
protocol named as IM-LEACH (Improved Modified LEACH)
protocol.
• This protocol mainly focusses to improve the energy consumed by the
nodes in data gathering and to improve the lifetime of the nodes
• The first one is active then sleep mode node scheduling concept, and
the second is vice versa
• Our proposed system TDMA time slot is applied for each every nodes
SIMULATOR

• NS2 is a high-level language and interactive environment for


numerical computation,visualization and programming.
• Using NS2,you can analyze data,develop algorithms and create
models and applications.
• The language,tools and built-in math functions enable you to explore
multiple approaches
• And reach a solution faster than with spreadsheets or traditional
programming languages,such as c/c++ or java.
NS-2 coding
#Create a simulator object
set ns [new Simulator]

#Define different colors for data flows


(for NAM)
$ns color 1 Blue
$ns color 2 Red

#Open the NAM trace file


set nf [open out.nam w]
$ns namtrace-all $nf
#Define a 'finish' procedure
proc finish {} {
global ns nf
$ns flush-trace
#Close the NAM trace file
close $nf
#Execute NAM on the trace file
exec nam out.nam &
exit 0
}
#Create four nodes
set n0 [$ns node]
set n1 [$ns node]
set n2 [$ns node]
set n3 [$ns node]
#Create links between the nodes
$ns duplex-link $n0 $n2 2Mb 10ms DropTail
$ns duplex-link $n1 $n2 2Mb 10ms DropTail
$ns duplex-link $n2 $n3 1.7Mb 20ms DropTail

#Run the simulation


$ns run
NAM WINDOW
RESULT
Proposed method graph
Existing method graph
REFERENCE
• Zakirullah; Islam, M.H Khan, Detection of • S. D. Muruganathan, D. C. F. Ma, R. I. Bhasin, and
dishonest trust recommendations in mobile ad hoc A. O. Fapojuwo, “A centralized energy-efficient
networksWorld Academy of science, Engineering routing protocol for wireless sensor networks,”
and Technology, 2016. IEEECommunicationsMagazine, vol. 43, no. 3, pp.
• Jianguo SHAN, Lei DONG, “Research on S8–S13, 2013.
improved Leach protocol”ComputerNetworks, vol. • G. Hu, D.-M. Xie, and Y.-Z. Wu, “Research and
52,no. 12,pp. 2292–2330, 2008. improvement of LEACH for wireless sensor
• Zahra Rezaei,Shima Mobininejad "Energy Saving networks,” Chinese Journal of Sensors and
in Wireless sensor networks", Proc. of Military Actuators, vol. 20, no. 6, pp. 1391–1396, 2014.
Communications Conference 2015.
• Almir Davis.C,"A Survey Of Wireless Sensor
• L. Tassiulas, Vikas Upadhyay,"Spin Protocol
Network Architecture" Proceedings of the Seventh
Cluster Formation in Wireless Sensor Networks",
ACM Annual International Conference on Mobile
Proc. Advanced Telecommunications and
Computing and Networking (MobiCom),july 2015
Information Distribution Research Program
• D. Braginsky,Hwa Chang, "Data-Centric (ATIRP2014), College Park, MD, Mar 2014
Arthitecture in Wireless Sensor Networks",
International Conference on Distributed Computing
Systems (ICDCS'01), November 2016.

Vous aimerez peut-être aussi