1,016 research outputs found

    Residual Energy Based Cluster-head Selection in WSNs for IoT Application

    Full text link
    Wireless sensor networks (WSN) groups specialized transducers that provide sensing services to Internet of Things (IoT) devices with limited energy and storage resources. Since replacement or recharging of batteries in sensor nodes is almost impossible, power consumption becomes one of the crucial design issues in WSN. Clustering algorithm plays an important role in power conservation for the energy constrained network. Choosing a cluster head can appropriately balance the load in the network thereby reducing energy consumption and enhancing lifetime. The paper focuses on an efficient cluster head election scheme that rotates the cluster head position among the nodes with higher energy level as compared to other. The algorithm considers initial energy, residual energy and an optimum value of cluster heads to elect the next group of cluster heads for the network that suits for IoT applications such as environmental monitoring, smart cities, and systems. Simulation analysis shows the modified version performs better than the LEACH protocol by enhancing the throughput by 60%, lifetime by 66%, and residual energy by 64%

    An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC

    Get PDF
    currently the world is adopting Internet of Things (IoT) as the future technology and the interest IoT development is increasing. As it’s expected to be the leading technology by 2022 according to Gartner. WSN is the main technology component of the IoT since it rely on sensing and collecting data in a specific filed of interest. As the WSN main issue is the network life time due the limitation in sensors resource. Therefore, such lifetimeconstrained devices require enchantment on the existing routing protocols to prolong network life time as long as possible. In our paper we propose enhancement in the well know WSN routing protocol LEACH by proposing a new Energy aware algorithm in communication within cluster, hence reduce power consumption in communication process

    6LoWPAN in Wireless Sensor Network with IoT in 5G Technology for Network Secure Routing and Energy Efficiency

    Get PDF
    Today, interconnection and routing protocols must discover the best solution for secure data transformation with a variety of smart devices due to the growing influence of information technology, such as Internet of Things (IoT), in human life. In order to handle routing concerns with regard to new interconnection approaches like the 6LoWPAN protocol, it is required to offer an improved solution. This research propose novel technique in 6LoWPAN network secure routing and energy efficiency (EE) for WSN in IoT application based on 5G technology. Here the energy optimization has been carried out using clustered channel aware least square support vector machine (Cl_CHLSSVM). Then the secure routing has been carried out using fuzzy based Routing Protocol for low-power and Lossy Networks with kernel-particle swarm optimization (Fuz_RPL_KPSO). To serve needs of IoT applications, proposed method is cognizant of both node priorities as well as application priorities. Applications' sending rate allocation is modeled as a constrained optimization issue.Pxperimental analysis is carried out in terms of throughput of 96%, weighted fairness index of 77%, end-to-end delay of 59%, energy consumption of 86%, and buffer dropped packets of 51%

    Optimization of Energy-Efficient Cluster Head Selection Algorithm for Internet of Things in Wireless Sensor Networks

    Get PDF
    The Internet of Things (IoT) now uses the Wireless Sensor Network (WSN) as a platform to sense and communicate data. The increase in the number of embedded and interconnected devices on the Internet has resulted in a need for software solutions to manage them proficiently in an elegant and scalable manner. Also, these devices can generate massive amounts of data, resulting in a classic Big Data problem that must be stored and processed. Large volumes of information have to be produced by using IoT applications, thus raising two major issues in big data analytics. To ensure an efficient form of mining of both spatial and temporal data, a sensed sample has to be collected. So for this work, a new strategy to remove redundancy has been proposed. This classifies all forms of collected data to be either relevant or irrelevant in choosing suitable information even before they are forwarded to the base station or the cluster head. A Low-Energy Adaptive Clustering Hierarchy (LEACH) is a cluster-based routing protocol that uses cluster formation. The LEACH chooses one head from the network sensor nodes, such as the Cluster Head (CH), to rotate the role to a new distributed energy load. The CHs were chosen randomly with the possibility of all CHs being concentrated in one locality. The primary idea behind such dynamic clustering was them resulted in more overheads due to changes in the CH and advertisements. Therefore, the LEACH was not suitable for large networks. Here, Particle Swarm Optimization (PSO) and River Formation Dynamics are used to optimize the CH selection (RFD). The results proved that the proposed method to have performed better compared to other methods

    REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs

    Get PDF
    Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks

    Metaheuristics Techniques for Cluster Head Selection in WSN: A Survey

    Get PDF
    In recent years, Wireless sensor communication is growing expeditiously on the capability to gather information, communicate and transmit data effectively. Clustering is the main objective of improving the network lifespan in Wireless sensor network. It includes selecting the cluster head for each cluster in addition to grouping the nodes into clusters. The cluster head gathers data from the normal nodes in the cluster, and the gathered information is then transmitted to the base station. However, there are many reasons in effect opposing unsteady cluster head selection and dead nodes. The technique for selecting a cluster head takes into factors to consider including residual energy, neighbors’ nodes, and the distance between the base station to the regular nodes. In this study, we thoroughly investigated by number of methods of selecting a cluster head and constructing a cluster. Additionally, a quick performance assessment of the techniques' performance is given together with the methods' criteria, advantages, and future directions
    • …
    corecore