Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime

Authors

  • Fadhil Mohammed Salman Ministry of Education, Babylon Education Directorate, Iraq
  • Ahssan Ahmed Mohammed Lehmoud Ministry of Education, Babylon Education Directorate, Iraq
  • Ahmed Fakhir Mutar 1)Ministry of Education, Babylon Education Directorate, Iraq 2) Department of Computer Technology Engineering, Al-Mustaqbal University College, Iraq

DOI:

https://doi.org/10.13052/jcsm2245-1439.123.2

Keywords:

WSNs, LEACH, clustering, TDMA, MATLAB

Abstract

Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions, so, the network lifetime is the major challenge that directly affect the efficiency of the network. This work presents an energy-saving clustering hierarchical algorithm for WSNs; it is an improvement of Low-Energy adaptive Clustering Hierarchy (LEACH) algorithm. The aim of this algorithm is to minimize power consumption by the appropriate election of new cluster heads in every data transfer round and avoid network collisions. This goal achieved by using an efficient function to select the best cluster heads nodes in each round, which takes into account the current energy in the sensors. The proposed algorithm improves the cluster formation process by relying on the shorter distance to the base station. The Time Division Multiple Access (TDMA) mechanism also utilized to schedule the transmission of data packets to cluster heads nodes and to avoid data packet collisions at the base station. Experiments conducted in MATLAB R (2020a) software showed that the suggested algorithm extended the network lifetime by 14.5%, and improved the network throughput by 16.8% compared to the LEACH algorithm. That means, the proposed energy-saving clustering hierarchy algorithm has improved the performance of the LEACH algorithm in term of enhancing network lifetime and increasing network throughput.

Downloads

Download data is not yet available.

Author Biographies

Fadhil Mohammed Salman, Ministry of Education, Babylon Education Directorate, Iraq

Fadhil Mohammed Salman received his BS in computer science from Unvirsty of Anbar in Iraq 2005. From 2010 to 2012, he completed his master’s study in Computer Science from the Department of Computer Science University of Babylon, Iraq. He received the PhD thesis in information technology from the Department of Software College of Information Technology University of Babylon, Iraq, in 2019. He is lecturer in the Babylon Education Directorate since 2007 till now. His research interests include the computer network, Network security, Data compression, Image processing, and Data mining.

Ahssan Ahmed Mohammed Lehmoud, Ministry of Education, Babylon Education Directorate, Iraq

Ahssan Ahmmed Mohammed Lehmoud received his BS in computer science from Unvirsty of Babylon in Iraq 2006. From 2009 to 2011, he completed his master’s study in Computer Science from the Department of Computer Science and Information Technology at Dr. BabaSahib Ambedkar Marthwada University, India. He received the PhD thesis in information technology from the Department of Software College of Information Technology University of Babylon, Iraq, in Abril 2018. He is lecturer in the Babylon Education Directorate since 2008 till now. His research interests include the information security, Network security, Cryptography, Steganography, Image processing, and Data mining.

Ahmed Fakhir Mutar, 1)Ministry of Education, Babylon Education Directorate, Iraq 2) Department of Computer Technology Engineering, Al-Mustaqbal University College, Iraq

Ahmed Fakhir Mutar received his BS and MSc in computer science from University of Babylon in Iraq in 2008 and MSc in computer science in Mustansiriyah University in Iraq in 2018, respectively. From 2018 to 2022, he worked as a lecturer in Department of Computer Technology Engineering in the AL- Mustaqbal College of Babylon. In February 2019, he started working as a lecturer in the Babylon Education Directorate Since 2009, in addition to participating in the administrative and scientific committees. His research interest includes Information security and image processing, Computer Network.

References

G. Tamilselvan and K. Gandhimathi, “Network coding based energy efficent LEACH protocol for WSN,” Journal of applied research and technology, vol. 17, no. 1, pp. 1–7, 2019.

S. D. Indu, “Wireless sensor networks: Issues & challenges,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 3, pp. 681–85, 2014.

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd annual Hawaii international conference on system sciences, 2000: IEEE, p. 10 pp. vol. 2.

J. Zhao and L. Yang, “LEACH-A: An adaptive method for improving leach protocol,” Sensors & Transducers, vol. 162, no. 1, p. 136, 2014.

N. Qubbaj, A. A. Taleb, and W. Salameh, “Review on LEACH Protocol,” in 2020 11th International Conference on Information and Communication Systems (ICICS), 2020: IEEE, pp. 414–419.

Z. Zhao, G. Li, and M. Xu, “An improved algorithm based on LEACH routing protocol,” in 2019 IEEE 19th International Conference on Communication Technology (ICCT), 2019: IEEE, pp. 1248–1251.

P. Gou, F. Li, Z. Li, and X. Jia, “Improved LEACH protocol based on efficient clustering in wireless sensor networks,” Journal of Computational Methods in Sciences and Engineering, vol. 19, no. 3, pp. 827–838, 2019.

S. Jain and N. Agrawal, “Development of energy efficient modified LEACH protocol for IoT applications,” in 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), 2020: IEEE, pp. 160–164.

I. Daanoune, A. Baghdad, and A. Ballouk, “Improved LEACH protocol for increasing the lifetime of WSNs,” Int. J. Electr. Comput. Eng. IJECE, vol. 11, pp. 3106–3113, 2021.

K. H. Mohammadani, K. A. Memon, I. Memon, N. N. Hussaini, and H. Fazal, “Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 5, p. 1550147720921624, 2020.

F. Dressler, R. Koch, and M. Gerla, “Path heuristics using ACO for inter-domain routing in mobile ad hoc and sensor networks,” in International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, 2010: Springer, pp. 128–142.

K. H. Mohammadani, K. A. Memon, I. Memon, N. N. Hussaini, and H. Fazal, “Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 5, p. 1550147720921624, 2020.

F. Dressler, R. Koch, and M. Gerla, “Path heuristics using ACO for inter-domain routing in mobile ad hoc and sensor networks,” in International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, 2010: Springer, pp. 128–142.

S. Bharany et al., “Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol,” Energies, vol. 14, no. 19, p. 6016, 2021.

T. Salam and M. Hossen, “Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network,” Wireless Personal Communications, vol. 113, no. 1, pp. 189–222, 2020.

T. M. Behera et al., “Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance,” Electronics, vol. 11, no. 15, p. 2282, 2022.

T. Mahmood et al., “An intelligent fault detection approach based on reinforcement learning system in wireless sensor network,” The Journal of Supercomputing, vol. 78, no. 3, pp. 3646–3675, 2022.

K. H. Mohammadani, K. A. Memon, I. Memon, N. N. Hussaini, and H. Fazal, “Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 5, p. 1550147720921624, 2020.

F. Dressler, R. Koch, and M. Gerla, “Path heuristics using ACO for inter-domain routing in mobile ad hoc and sensor networks,” in International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, 2010: Springer, pp. 128–142.

S. Bharany et al., “Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol,” Energies, vol. 14, no. 19, p. 6016, 2021.

T. Salam and M. Hossen, “Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network,” Wireless Personal Communications, vol. 113, no. 1, pp. 189–222, 2020.

T. M. Behera et al., “Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance,” Electronics, vol. 11, no. 15, p. 2282, 2022.

T. Mahmood et al., “An intelligent fault detection approach based on reinforcement learning system in wireless sensor network,” The Journal of Supercomputing, vol. 78, no. 3, pp. 3646–3675, 2022.

S. K. Singh, P. Kumar, and J. P. Singh, “A survey on successors of LEACH protocol,” IEEE Access, vol. 5, pp. 4298–4328, 2017.

S. Dutt, G. Kaur, and S. Agrawal, “Energy efficient sector-based clustering protocol for heterogeneous WSN,” in Proceedings of 2nd International Conference on Communication, Computing and Networking, 2019: Springer, pp. 117–125.

Q. Wang, D. Lin, P. Yang, and Z. Zhang, “A fuzzy-logic based energy-efficient clustering algorithm for the wireless sensor networks,” in 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2018: IEEE, pp. 1–6.

K. Jain and A. Singh, “A two-vector data-prediction model for energy-efficient data-aggregation in wireless sensor network,” Concurrency and Computation: Practice and Experience, vol. 34, no. 11, p. e6898, 2022.

N. R. Roy and P. Chandra, “A note on optimum cluster estimation in leach protocol,” IEEE Access, vol. 6, pp. 65690–65696, 2018.

K. A. Darabkh, M. Z. El-Yabroudi, and A. H. El-Mousa, “BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks,” Ad Hoc Networks, vol. 82, pp. 155–171, 2019.

H. B. Eldeeb, E. Yanmaz, and M. Uysal, “MAC layer performance of multi-hop vehicular VLC networks with CSMA/CA,” in 2020 12th International symposium on communication systems, networks and digital signal processing (CSNDSP), 2020: IEEE, pp. 1–6.

R. B. Pedditi and K. Debasis, “A Low Energy Consuming MAC Protocol for Wireless Sensor Networks,” in 2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP), 2022: IEEE, pp. 1–5.

C. Donnat and S. Holmes, “Tracking network dynamics: A survey using graph distances,” The Annals of Applied Statistics, vol. 12, no. 2, pp. 971–1012, 2018.

S. Faruque, Radio frequency multiple access techniques made easy. Springer, 2019.

C. Trinh, B. Huynh, M. Bidaki, A. M. Rahmani, M. Hosseinzadeh, and M. Masdari, “Optimized fuzzy clustering using moth-flame optimization algorithm in wireless sensor networks,” Artificial Intelligence Review, vol. 55, no. 3, pp. 1915–1945, 2022.

S. Faruque, Radio frequency multiple access techniques made easy. Springer, 2019.

C. Trinh, B. Huynh, M. Bidaki, A. M. Rahmani, M. Hosseinzadeh, and M. Masdari, “Optimized fuzzy clustering using moth-flame optimization algorithm in wireless sensor networks,” Artificial Intelligence Review, vol. 55, no. 3, pp. 1915–1945, 2022.

M. B. Latif, F. Liu, and K. Liu, “A TDMA-Based MAC Protocol for Mitigating Mobility-Caused Packet Collisions in Vehicular Ad Hoc Networks,” Sensors, vol. 22, no. 2, p. 643, 2022.

A. W. Bhat and A. Passi, “Wireless Sensor Network Motes: A Comparative Study,” in 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), 2022: IEEE, pp. 141–144.

A. Panchal, L. Singh, and R. K. Singh, “RCH-LEACH: Residual energy based cluster head selection in LEACH for wireless sensor networks,” in 2020 International Conference on Electrical and Electronics Engineering (ICE3), 2020: IEEE, pp. 322–325.

R. Alsaqour, E. S. Ali, R. A. Mokhtar, R. A. Saeed, H. Alhumyani, and M. Abdelhaq, “Efficient Energy Mechanism in Heterogeneous WSNs for Underground Mining Monitoring Applications,” IEEE Access, vol. 10, pp. 72907–72924, 2022.

Downloads

Published

2023-05-18

How to Cite

1.
Salman FM, Lehmoud AAM, Mutar AF. Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. JCSANDM [Internet]. 2023 May 18 [cited 2024 May 13];12(03):275-96. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/18603

Issue

Section

Assurance of Information Systems’ Quality and Security

Most read articles by the same author(s)