You are on page 1of 7

2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

Performance Analysis of Leach and Enhanced


Leach in WSN
Ditipriya Sinha
Sushil Kumar Utpal Kumar Verma Computer Science and Engineering
Computer Science and Engineering Computer Science and Engineering National Institute Of Technology,
National Institute Of Technology, National Institute Of Technology, Patna-05, Bihar, India
Patna-05, Bihar, India Patna-05, Bihar, India ditipriyasinha87@gmail.com
Sushil2291@gmail.com utpalverma@gmail.com

Abstract— This approach illustrates that the ENHANCED intelligence and throw the data to the initial place also call
LEACH is a routing protocol. The proposed research we have sink by communication to connections present in scenario.
used no of connection in a group or cluster. Every cluster has a The utilization of WSNs is growing every day as well as at
cluster head and the cluster head directly communicate with the
base place. The results of the ENHANCED LEACH protocol are
this moment its face the some difficulty, main crisis is force
comparison with existing Leach Protocol. Here base connection constraints with restricted battery lifetime. Since every
is located to equal distance of a cluster and it’s directly connection going on force to the actions, it is becoming the
communicating to the cluster connection. When a cluster or leading problem in WSNS. Not a success process to
group is selected, after that its force level is not considered. This connection could be communication the absolute system or
method is increasing to life instance of network. As compare application. Each detection connection could dynamic form
LEACH and ENHANCED LEACH protocol, we have noticed the have transmittal actions sleep along with idle mode. In the
ENHANCED LEACH have better force, life time, less delay, active form of connections consume force when receiving or
better transmission and consumed less time. transmission data. Here idle manner, connections devour
approximately to similar sum of money of force within the
Keywords—metamorphic malware, polymorphic malware,
mutation engine, classification
dynamic mode, although in sleep mode; connections closure to
radio of keep the physical phenomenon.
Here some following steps written that is to take the save
force reason by communicating to WSNS [1].
I. INTRODUCTION • To agenda the state of the connections ( transmission,
getting, inactive or snooze)
Advances technologies in the wireless communication • To varying the program range linking the sense
system is achievable to successful it and create on wireless connections
sensor networks (WSN) with dwell of undersized inclination, • by means of proficient steering and information
that devices are assemble subject matter and collaborate with collecting method
everyone. A little wireless detection device is call as
• To Avoid managing of unnecessary information as in
connections as well as having CPU are used pro information
the container of overhearing
process, recollection used for information retention, series for
collection force, transceiver it’s receiving and send
II. LITERATURE REVIEW
communications otherwise data as of one connection toward
some other. All-important is size of each sensor connection Since a day ENHANCED LEACH came into state the
varies with use. If we take an example, in some military or network lifetime has been getting accordant change of
police investigation applications are utilized microscopic state with the assorted optimization method being adopted
small devices and cost depends going on the used parameter for the leader connectedness selection or for the selection
similar to memory size, processing speed and battery. of routing path. Various works has been done on making
Now-a-days, WSN are very commonly use in commercialized the ENHANCED LEACH successful enough to satisfy
too industrial areas because biology observation, habitat the demand of the ongoing research utilize which are
observation, health care, process observation and surveillance. congenial in employing the series based topology in the
The military area, we are capable of use WSN to check a network.
human action. When event induction, the antenna connections In this paper, authors projected an algorithm to build
series by adopting a threshold distance to reduce the
arrangement of extended link. It selects the principal by
allowing for both the remaining force of connections as
978-1-5090-1277-0/16/$31.00 ©2016 IEEE
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
well as the spacing among connection and base place and within the sensing field. In case of single hop, cluster
adjusts the reelection incidence of principal according to heads that are located away from Base place are prone to
lasting connections in the network. The consequences depletion of force as they utilize strong communications
explain that the projected method acting much better in order to reach BS. Therefore, multi-hop routing
public presentation to ENHANCED LEACH [2]. concept is used between the cluster heads to overcome the
disadvantage which was there in single hop routing
In this paper, authors proposed an algorithmic program to
concept. The simulation has been done using NS-2
construct series, and uses weighting technique while
simulator and the results show that the ENHANCED
selecting the leader connection, to facilitate is assignment
LEACH-MH is far better as comparison to other protocols
all connection a mass to stand for suitable level to
such as LEACH, ENHANCED LEACH and Hierarchal
principal to considers residual force connections and
ENHANCED LEACH in terms of lifetime and force
space involving a connection and base place (BS) as input
inefficiency. For QoS, fault tolerance integration will be
parameters. The consequences illustrate that the projected
the future work [7].
methods have improved presentation than EEPB on
corresponding force utilization and prolonging duration of In this paper, authors proposed an algorithm by using
Wireless Sensor Networks (WSN) [3]. standard reserve among the sensor connections as the
criterion for sensing and thereby as long as better
In this paper, authors proposed a hierarchical map-reading
performance in terms of force debauchery and amount of
protocol for place able WSNs. The projected method used
in order sent to BS. The sensing speed of proposed
a new series building algorithm and series principal
method is faster than ENHANCED LEACH. This
election technique that plays a very dangerous role in
algorithm avoids the formation of LL and provides a
the force economy. The results show that this protocol
stable and balanced lifetime to the network. The s results
solved the main difficulty in ENHANCED LEACH and
proved that purposed algorithm outperforms
also increased both the duration and the output of the
ENHANCED LEACH by achieve senior force
WSN [4].
competence extend existence of network [8].
In this paper authors projected a well-organized class-
In this paper, communicator projected a customized
conscious series based map-reading protocol which was
description of ENHANCED LEACH to reduce the force
not appropriate for big sensor networks with influence
expenditure in WSNs. Two possible routing algorithms
and time restraint. Here used the idea of Beam Star
were implemented. The proposed method to go
topology to partition the complete sensing field into a
ENHANCED LEACH and EEPB with eliminate to
number of slighter areas, so that it can create numerous
visual projection of active cluster configuration, feting
shorter series to decrease the data public contact delay
the reserve non-cluster heads may convey, restrictive
and extra communication path, thus unimportantly
amount of transmission and receive amid all connections,
improved the data discharge of the packets as evaluate to
and by means of only show to the BS per plump.
the Charon and routing was completed between cluster
Discarding force weight amongst the connections
head (CH) to cluster head and network is apart into two
increased the fulltime and excellence of the network. A
parts so that the series leader of the same casing angle
result to proposed method inform better than
will communicate the data to the next series leader but in
ENHANCED LEACH and EEPB [9].
the same covering angle in the chronological manner.
While the quantity of sensor fundamentals were reduced Here projected a modification formulation for series
so sensing time and power indulgence reduced and data configuration in the WSN which is an adapted description
delivery was enhanced [5]. of series based ENHANCED LEACH protocol. In the
paper, procedure of form series is customized in arranges
It has proposed an enhanced algorithmic rule of
to get a series with numerous degree connections. This
ENHANCED LEACH which imbalance the load on each
loom considered quantity of connectivity and outstanding
connection and improves the network lifetime. In
force of all connection. It achieved intend of the critical
ENHANCED LEACH, there is only one cluster head in
point of the size of it in long arm of the law consumption
each series whereas in PDCH i.e. ENHANCED LEACH
and prolongs the lifetime of the network. Simulations
double cluster head, there are double cluster heads which
results achieved 50% top results in average long arm of
avoids the long series problem existing in ENHANCED
the law consumption by the incorporate under bounded
LEACH. Simulations have been performed to compute
scenario. It all in the crowd death figure as long arm of
the round of communicating to percent of deceased
the law dissipation gets all in by 50% for the marked
connections in each surrounding of communicating. In the
specification [10].
future work, PDCH can perform better as compared to
EEPB and ENHANCED LEACH for raising the system
III. METHODOLOGY
distributed and parallel process [6].
Assumptions and Radio Energy Model
It has projected a new protocol i.e. ENHANCED Different statement of our model is discussed. Initial order
LEACH-MH in categorize to reduce the ingestion of force radio model is being used.
to enhance the full time of sensor network. ENHANCED
LEACH-MH protocol is developed for multi-hopping
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
• BS is located far away on or after the sensing ground 2. Chain Formation Phase.
and the sensor nodes are motionless once they are
3. Data Transmission Phase.
deployed.
• Sensor node is uniform; the entire sensor node has Suitable to decrease of clustering slide, clustering is not
same initial energy, a battery. containing in each round in our projected protocol. So sensor
• Radio channel is symmetric means the energy nodes use remaining energy of nodes to choose CH for the
consumed for transmitting a message is the same for subsequently round rather than BS station choosing the CHs.
receiving it. Clustering Phase
• Sensor node has understanding of its location and Clustering phase contains of following stages:
energy.
Radio Model for ENHANCED LEACH • Cluster Head Selection.
We utilize the parallel radio model concerned in [11] that is • Cluster Formation.
initial order radio model. In model, a radio dissipates Eelec =
50 nJ/bit to scurry the transmitter or receiver circuitry and Cluster Head Selection
‫א‬amp = 100 pJ/bit/m 2 for the transmitter amplifier. The radio
In our model, all nodes maintain a neighboring table to
has power control and can spend the lowly necessary energy
accumulate the data to neighbors. All nodes to absent in the
to get to the proposed recipients. The radios can be twisted off
radio range r of the distribution node are neighbors of the
to avoid in receipt of accidental transmissions. An r2 energy
node. All node receives the data communication in the radio
loss is used due to channel transmission [12,13]. The
range and updates its neighborhood table. Then each node
equations used to calculate transmission costs and in receipt of
calculates it distances from its neighbor nodes and also they
costs for a k-bit message and a space d are shown below:
calculate their weights by following formula:
Transmitting ݊

ETx (k, d) = ETx– elec (k) + ETx–amp (k, d) ͳ


ܹ݅ ൌ ܴ‫ ݅ܧ‬ൈ ෎ ʹ
ETx (k, d) = Eelec*k + ‫א‬amp * k* d2 ݀ ൫‫ ݅ݒ‬ǡ ‫ ݆ݒ‬൯
݆ൌͳ
Receiving
In the above equation Wi is the weight of node i and n
ERx(k) = ERx-elec(k) ERx(k) = Eelec*k represents number of nodes and d (vi, vj) is the reserve
between node i and node j. Now each node broadcasts its
Where Eelec is the energy degenerate to run the handset or
weight in the radio range r and the node which has the highest
source ampli¿er and ‫א‬fs d2 or ‫א‬amp d4 is the ampli¿er energy
weight among all its neighbors in the radio range r is selected
depend ahead acceptable bit-error rate. One can distinguish
as Cluster Head (CH).
that in getting information a group of energy is necessary.
Thus the no of transmission and getting should be compact, to Cluster Formation
make the most of the energy habit.
Behind the cluster pates are best liked, they (CHs) give off an
Getting is additionally large value operation, such that, the story word, that contains the nodes ID and jump head to find
amount of getting and transmissions ought to be lowest. out it as a result of other messages. RSSI (Received Signal
LEACH and ENHANCED LEACH use identical constants fury Information) the nodes engage their CH (Cluster
(Eelec, ‫א‬amp, and k) for shrewd energy costs; thus the Head).Now the node charge became husband and wife request
ENHANCED LEACH getting its energy investments by d and message to the recommended CH. The tie charge message
also the variety of transmissions and receives for every node. contains the CHs ID everywhere the node wants to join and by
Therefore, for a d4 model, ENHANCED LEACH will bring the same token it contains the nodes ID.
home the bacon level better savings compared to LEACH. In
The clustering phase is not posting online in every far and
our simulations, we have a tendency to use a packet length k
wide since of its steep overhead. If barring no one node dies in
of 2000 bits. With these radio parameters, once d2 is five
the cluster once the CH informs the BS that the sensors should
hundred, the energy exhausted within the electronic equipment
not embrace clustering in the component of the after round.
half equals the energy spent within the physical science half,
Saving sensors nodes appoint the dressy CHs headquarters on
and thus, the price to put on the air a packet are doubly the
the Residual longing of the nodes.
price to receive. It is unspecified that the radio channel is
bilaterally symmetric so the energy needed to put on the air a 3.3.2 Chain Formation Phase:
message from node i to node j is that the same as energy
For constructing the chain the ENHANCED LEACH code of
wanted to transmit a message from node j to node i for a given
behavior starts from fastest from the headquarters station and
signal to noise magnitude.
uses distrustful algorithm to comprise chain. Each node
We propose a Routing Protocol for WSNs in arrange to communicates by the whole of its two neighbors to give off
improve network fulltime and decrease communication cost. data. In node C0 lays end most from headquarters station. So
To process of protocol is separated into rounds. Every round chain starts from C0.After that node C1 is selected and so forth
consists of subsequent phases: till node C5.
1. Clustering Phase.
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
Leader Selection Check x and y value
At the hot off the press of each everywhere captain node is in Calculate space from the last added node to the
a job randomly. The high on the hog of selecting the any old cluster
way node is that if the node dies at aimless location absorb
If distance is less than minimum distance
will be robust. Trailing the leader is engaged a essential is
replace the complete node to begin the announcement Record cluster node ID
gathering. Ephemeral essential besides consumes love but the
Iterate loop to check next node if is at minimum
degree of token is so thick that the asking price for brief is as a
matter of fact small. distance
Check the cluster node id of the node which is at
3.3.3 Data Transmission
minimum distance
Node which have minimum energy to start communication,
disclosure to with neighbor node. The brother node fuses its Add the node to the chain
story mutually the story which it has confirmed and once • For data gathering process pick a node randomly
passes the word to its neighbor. This style continues before it which is the leader for the round and all the nodes in
reaches the flier node. Before the one at the control node the cluster post data towards it. Leader node fuse the
transmits the fused data to the BS. The captain node is once data to sends the information to the initial station
rotated randomly in each round.
Proposed work Implementation Plan: IV. RESULT ANALYSIS AND DISCUSSION

1. Implement the ENHANCED LEACH protocol:


A sensor network is formed by the whole of fifty nodes and on
• Assign unique x and y values for each node
outstrip of akin routing protocols are compared intimidation
While (last cluster node in the network) SENSORIA – a Graphical computer position based
customarily machine [14]. The am a match for of nodes are
Generate clusters group with specified area in the
antithetical for separately simulation from 50-400. The
width network
practice session of the routing protocols- LEACH and
Assign the value to clusters as x coordinate ENHANCED LEACH is analyzed in stipulations of
communication wriggle, everything energy matching fund and
Generate a random number up to maximum by the same token the network period. The small print of
length of the clusters simulation setup is given below in Table I.
Assign the value to cluster as y Table I. Simulation parameters and values
coordinate
Parameters Values
• Pick the node cluster node which is at largest distance
from the base station Number of nodes 50-400(Variable)
While (last cluster node of the network is checked) Energy/node 0.5J (Homogenous)
Get x and y coordinate of the cluster node Simulation area 40m x440m
Find the distance from the base station Transmission range of each node 70m
If this distance is higher than maximum distance Sensing range (each node) 8m
Assign to maximum distance value to the Location of base station At origin (0m x 0m)
cluster node
Data packet 2000 bits
Record clusternoderID
Control packet 248 bits
Iterate loop for next node in the cluster network
Data transmission speed 100 bits/sec.
Check cluster node ID of node which is at maximum
distance Bandwidth 5000 bits/sec.
Add the furthest node to the chain
• Make cluster starting from the uttermost node from The performance of Energy Efficient Clustered Chain Based
the initial station Power-Efficient Gathering Systems protocol in wireless sensor
While (last node of network is added to cluster) network protocol is being evaluated by simulation. For
simulation we used Network Simulator and tested our
Check x and y value of last added node to the cluster protocols performance with ENHANCED LEACH and
While (all the nodes are checked) LEACH.
If (node not added to the cluster)
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
For performance evaluations following parameters are taken
into account:
• Packet Deliver
• Energy consumption.
• End to End Deliver
Network size is considered as 40m X 40m and the numbers of
nodes are 36 which are scattered randomly in the sensor ¿elds.

Figure 4: Base Station is active to send the information to


neighbor node communication with base station.

Figure 1: Run the main file name is wsn.tcl. Run in the NS2
Simulator this file by using command [ns wsn.tcl].

Figure 5: Base Station is active to send the information to


neighbor ode communication with base station.
Fig. 6 shows the plot for the regular end to end postponement
for both LEACH and ENHANCED LEACH routing protocols
with respect to time. The simulation result shows that
ENHANCED LEACH taking less delay while for LEACH
Figure 2: Network Animator of my project taking high delay. When the simulation times of the network
are increasing the packet delivery ratio is also high and
constant.

Figure 3: Run the Network Animator see cluster are forming Figure 6: Packet Delivery Ratio
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]

Fig. 7 shows the plot for the regular end to end impediment to
V. CONCLUSION
LEACH and ENHANCED LEACH routing protocols for
dissimilar quantity of node. Reproduction effect shows that In paper, a relationship of 2 hierarchical routing protocols –
ENHANCED LEACH increasing the average end to end delay LEACH and ENHANCED LEACH is bestowed. Our study
after a certain node it is constant while for LEACH having a shows that ENHANCED LEACH performs higher than
low delay. When the number of node increase in network to LEACH of network time period, communication and therefore
standard delay are constant. share of node deaths. ENHANCED LEACH additionally put
associate degree comprehensive time period of the network
thanks to the energy potency. For giant networks, the first
death of the nodes reduces the network constancy in LEACH
as compared to ENHANCED LEACH.
In LEACH, native processing happens at mere nodes known
as cluster-heads and eventually aggregate information is
transmit to the descend node, whereas in ENHANCED
LEACH, no information aggregation happens. LEACH is
cluster-based hierarchy whereas ENHANCED LEACH can be
a chain-based approach. After we ensure the network time
period, ENHANCED LEACH puts comprehensive time period
of the network as there's a balance in energy distribution. The
number of node deaths in ENHANCED LEACH is smaller as
compared to LEACH.

Figure 7: Average End to End Delay VI. CONTRIBUTION OF RESEARCH


Fig. 8 shows the plot for the whole energy consumption (in The current works are showing the best performance
joules) for each LEACH and ENHANCED LEACH routing contribution for the student and researcher, who are interesting
protocols for various variety of rounds. The simulation to work on the evolution of the LEACH protocol. Here we
showing the ENHANCED LEACH have less energy measure and compare the ENHANCED LEACH QoS
consumption with no of rounds for a selected network size parameters like throughput and delay. ENHANCED LEACH
whereas for LEACH having the next. Once the quantity of can also be implied in the heterogeneous scenario which is one
rounds will increase within the network the energy another area seeking its applicability
consumption will increase. Within the case of LEACH
protocol, the message slide will increase with a rise within the References
variety of nodes deployed within the network.
[1] Raghunathan, V., Schurgers, C., Park, S., &Srivastava, M. B.
(2002). Energy-aware wireless microsensor networks. Signal
Processing Magazine, IEEE,19(2), 40-50.
[2] Yu, Y. Ch, and Gang Wei. "An improved ENHANCED LEACH
algorithm in wireless sensor network." Acta Electronica
Sinica 36.7 (2008): 1309-1313.
[3] Sen, Feng, Qi Bing, and Tang Liangrui. "An improved energy-
efficient ENHANCED LEACH-based protocol in wireless sensor
networks." Fuzzy Systems and Knowledge Discovery (FSKD), 2011
Eighth International Conference On. Vol. 4. IEEE, 2011.
[4] Alhasan, Hasan, et al. "EAPHRN: energy-aware ENHANCED
LEACH-based hierarchal routing protocol for wireless sensor
networks." Journal of American Science 7.8 (2011).
[5] Mundra, P. S., and Mr Ravinder Kumar. "Improved Data
Gathering Protocol for WSN." International Journal of
Electronics and Computer Science Engineering, vol.1, no.3,
pp.1208-1213, 2012.
[6] Linping, Wang, et al. "Improved algorithm of ENHANCED
LEACH protocol introducing double cluster heads in wireless
sensor network." Computer, Mechatronics, Control and Electronic
Engineering (CMCE), 2010 International Conference on. Vol. 1.
IEEE, 2010.
[7] Aliouat, Zibouda, and Makhlouf Aliouat. "Effective Energy
Management in Routing Protocol for Wireless Sensor
Figure 8: Energy consumption Networks." New Technologies, Mobility and Security (NTMS),
2012 5th International Conference on. IEEE, 2012.
2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
[8] Nehra, Vibha, and Ajay K. Sharma. "ENHANCED LEACH-E:
Power Efficient Gathering in Sensor Information System
Extended." Global Journal of Computer Science and
Technology 13.15 (2013).
[9] R. Sittalatchoumy, L. Sivakumar,’’ Performance Enhancement of
Energy Efficient Protocols for application in WSN,’’ Journal of
Theoretical and Applied Information Technology, Vol. 60 No.1,
2014.
[10] Gupta, Madhu, and Laxmi Saraswat. "Energy aware data
collection in wireless sensor network using chain based
ENHANCED LEACH." Recent Advances and Innovations in
Engineering (ICRAIE), 2014. IEEE, 2014.
[11] Lindsey, Stephanie, and Cauligi S. Raghavendra. "ENHANCED
LEACH: Power-efficient gathering in sensor information
systems." Aerospace conference proceedings, 2002. IEEE. Vol. 3.
IEEE, 2002.
[12] Steele, Raymond, H. Ahmadi, and A. Krishna. "Mobile Radio
Communications."IEEE Proceedings. Vol. 82. No. 9. [New York,
NY]: Institute of Electrical and Electronics Engineers, [1963-,
1994.
[13] Heinzelman, W. R., Chandrakasan, A., &Balakrishnan, H. (2000,
January). Energy-efficient communication protocol for wireless
microsensor networks. InSystem sciences, 2000. Proceedings of the
33rd annual Hawaii international conference on (pp. 10-pp).
IEEE.
[14] Al-Karaki, Jamal N., and Ghada Al-Mashaqbeh. "SENSORIA: A
new simulation platform for wireless sensor networks." Sensor
Technologies and Applications, 2007. SensorComm 2007.
International Conference on. IEEE, 2007.

You might also like