Extend Wireless Sensor Networks Lifetime which use Cluster-Based Routing Protocol, Namely Leach


Authors : DUSINGIZE Gilbert; Dr. Wilson MUSONI

Volume/Issue : Volume 9 - 2024, Issue 11 - November


Google Scholar : https://tinyurl.com/3fwx5pr2

Scribd : https://tinyurl.com/3zbf4se6

DOI : https://doi.org/10.38124/ijisrt/IJISRT24NOV111

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Wireless Sensor Network (WSN) is a spatially distributed sensors that can monitor environmental and exchange that information with each other over wireless medium. Due to their energy restrictions, their limited storage capability, and positioning in hostile environments, WSNs are vulnerable to various routing attacks. Sinkhole attack is the main issue in the said wireless sensor network which permanently disable sensor node by draining nodes battery power and drop all packets and prevent it to reach the base station. Cluster-based routing protocols are developed to undertake this problem, and the Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the best-known protocols of this type. It is very important to secure the communication between nodes and prevent against different attacks especially in cluster based WSN that run LEACH routing protocol. Therefore, this paper proposes an algorithm for extending the lifetime of Wireless Sensor Network which uses a clustering-based routing protocol namely LEACH for its routing operation in IPRC-Huye Campus. The proposed algorithm indicates the random election of normal nodes and then flags the dead nodes at each epoch and then increment accordingly. The cluster head(CH) election is done by calculating the ratio of optimal election probability and the modulation of rounds. The dissipated energy is now obtained based on the energy data aggregation and the distance between nodes. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing one, namely, LEACH, in terms of minimum computational complexity and high energy efficiency. Moreover, the algorithm was numerically analyzed using MATLAB.

References :

  1. Abdullah, M. Y., et al.(2009). Energy scheduling with roles dormant cells in wireless sensor network. In Mechatronics and Automation, International Conference on IEEE, 541-545.
  2. Bakaraniya, P., & Mehta, S.(2013) K-LEACH: An improved LEACH Protocol for Lifetime Improvement in WSN. International Journal of Engineering Trends and Technology,4(5), 1521- 1526.
  3. Chugh, C., & Singh, R. A.(2013). Real-Time MATLAB based GUI for node placement and a shortest-path alternate route path algorithm in Wireless Sensor Networks. International Journal for Science and Emerging,7(1),11-16.
  4. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003.
  5. G. Padmavathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor net works,” International Journal of Computer Science and Informa tion Security, vol. 4, no. 1-2, 2009.
  6. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 167575, 7 pages, 2013.
  7. J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, “Dealing with sinkhole attacks in wireless sensor networks,” Advanced Science and Technology Letters, vol. 29, pp. 7–12, 2013.
  8. M. Dener, “Security analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 303501, 9 pages, 2014.
  9. S. A. Salehi, M. A. Razzaque, P. Naraei, and A. Farrokhtala, “Detection of sinkhole attack in wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Space Science and Communication (IconSpace ’13), pp. 361–365, Melaka, Malaysia, July 2013.
  10. P. Maidamwar and N. Chavhan, “Impact of wormhole attack on performance of LEACH in wireless sensor networks,” Inter national Journal of Computer Networking, Wireless and Mobile Communications, vol. 3, no. 3, pp. 21–32, 2013.
  11. I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, “Intrusion detection of sinkhole attacks in wireless sensor network,” in Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors ’07), vol. 4837, pp. 150–161, Wrocław, Poland, 2007.
  12. S. Iqbal, S. P. Aravind Srinivas, G. Sudharsan, and S. S. Kashyap, “Comparison of different attacks on LEACH protocol inWSN,” International Journal of Electrical, Electronics and Data Communication, vol. 8, no. 8, pp. 16–19, 2014.
  13. X. Deng, R. Wu, W. Wang, and R. Bu, “An intrusion detection system for cluster based wireless sensor networks,” Information Technology Journal, vol. 12, no. 9, pp. 1764–1771, 2013.
  14. H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detec tion and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644–653, 2014.
  15. V. K. Jatav, M. Tripathi, M. S. Gaur, and V. Laxmi, “Wireless sensor networks: attack models and detection,” in Proceedings of IACSIT Hong Kong Conferences, vol. 30, pp. 144–150, 2012. 
  16. M. Bahekmat, M. H. Yaghmaee, A. S. H. Yazdi, and S. Sadeghi, “A novel algorithm for detecting sinkhole attacks in WSNs,” International Journal of Computer Theory and Engineering, vol. 4, no. 3, pp. 418–421, 2012.
  17. F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhang, “PEAS: a robust energy conserving protocol for long-lived sensor networks,” in Proceedings of the 23th IEEE International Conference on Distributed Computing Systems (ICDCS ’03), pp. 28–37, May 2003.
  18. W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the IEEE Computer and Communications Societies (INFOCOM ’02), pp. 1567–1576, New York, NY, USA, June 2002.
  19. T. Van Dam and K. Langendoen, “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), pp. 171–180, Los Angeles, Calif, USA, November 2003.
  20. G. Lu, B. Krishnamachari, and C. S. Raghavendra, “An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks,” in Proceedings of 18th International Parallel and Distributed Processing Symposium (IPDPS ’04), pp. 3091–3098, April 2004.
  21. T. Zheng, S. Radhakrishnan, and V. Sarangan, “PMAC: an adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS ’05), p. 237, April 2005.
  22. J. Polastre, J. Hill, and D. Culler, “Versatile low power media access for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys ’04), pp. 95–107, November 2004.
  23. M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks,” in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys’ 06), pp. 307–320, November 2006.
  24. A. El-Hoiydi and J. D. Decotignie, “WiseMAC: an ultra low power MAC protocol for multi-hop wireless sensor networks,” in Proceedings of the 1st International Workshop on Algorithm Aspects of Wireless Sensor Networks, vol. 3121 of Lecture Notes in Computer Science, pp. 18–31, 2004.
  25. E. Shih, S. H. Cho, N. Ickes et al., “Physical layer driven proto col and algorithm design for energy-efficient wireless sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM ’01), pp. 272–286, July 2001.
  26. S. Kumar, T. H. Lai, and J. Balogh, “On k-coverage in a mostly sleeping sensor network,” in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MOBICOM ’04), pp. 144–158, October 2004.
  27. P. Berman, G. Calinescu, C. Shah, and A. Zelikovsky, “Power efficient monitoring management in sensor networks,” in Pro ceedings of the IEEE Wireless Communications and Networking Conference (WCNC ’04), pp. 2329–2334, 2004.
  28. W. R. Heinzelman, A. Chandrakasan, and H. Balakrish nan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS ’00), p. 223, January 2000.
  29. A. Sinha and A. Chandrakasan, “Dynamic power management in wireless sensor networks,” IEEE Desig
  30. S. Athmani, D. E. Boubiche, and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in Proceedings of the World Congress on Computer and Information Technology, pp. 1–5, June 2013.
  31. M. Tripathi, M. S. Gaur, and V. Laxmi, “Comparing the impact of black hole and gray hole attack on LEACH in WSN,” in Proceedings of 4th International Conference on Ambient Systems, Networks and Technologies (ANT ’13), vol. 19, pp. 1101–1107, June 2013.

Wireless Sensor Network (WSN) is a spatially distributed sensors that can monitor environmental and exchange that information with each other over wireless medium. Due to their energy restrictions, their limited storage capability, and positioning in hostile environments, WSNs are vulnerable to various routing attacks. Sinkhole attack is the main issue in the said wireless sensor network which permanently disable sensor node by draining nodes battery power and drop all packets and prevent it to reach the base station. Cluster-based routing protocols are developed to undertake this problem, and the Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the best-known protocols of this type. It is very important to secure the communication between nodes and prevent against different attacks especially in cluster based WSN that run LEACH routing protocol. Therefore, this paper proposes an algorithm for extending the lifetime of Wireless Sensor Network which uses a clustering-based routing protocol namely LEACH for its routing operation in IPRC-Huye Campus. The proposed algorithm indicates the random election of normal nodes and then flags the dead nodes at each epoch and then increment accordingly. The cluster head(CH) election is done by calculating the ratio of optimal election probability and the modulation of rounds. The dissipated energy is now obtained based on the energy data aggregation and the distance between nodes. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing one, namely, LEACH, in terms of minimum computational complexity and high energy efficiency. Moreover, the algorithm was numerically analyzed using MATLAB.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe