0% found this document useful (0 votes)
85 views

Wireless Sensor Network Protocol With PEGASIS GA To Enhance The Network Lifetime

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, Pdf Url: https://www.ijtsrd.com/papers/ijtsrd38645.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38645/wireless-sensor-network-protocol-with-pegasis-ga-to-enhance-the-network-lifetime/dipak-prasad-poudel

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Wireless Sensor Network Protocol With PEGASIS GA To Enhance The Network Lifetime

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, Pdf Url: https://www.ijtsrd.com/papers/ijtsrd38645.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38645/wireless-sensor-network-protocol-with-pegasis-ga-to-enhance-the-network-lifetime/dipak-prasad-poudel

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 5 Issue 2, January-February 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Wireless Sensor Network Protocol with


PEGASIS (GA) to Enhance the Network Lifetime
Dipak Prasad Poudel1, Preeti Sondhi2
1MTech Scholar, 2Assistant Professor,
1,2Universal Group of Institutions, Lalru, Punjab, India

ABSTRACT How to cite this paper: Dipak Prasad


This paper discusses the need for energy-efficient communication in wireless Poudel | Preeti Sondhi "Wireless Sensor
sensor networks and identifies the key energy dissipation sources as well as Network Protocol with PEGASIS (GA) to
countermeasures to ensure a long lifetime of the network. In remote and Enhance the
dangerous settings, wireless sensor networks can collect trustworthy and Network Lifetime"
reliable information and can be used in national defence, military affairs, Published in
industrial control, traffic management, medical care, smart home, etc. The International Journal
sensor whose resources are reserved is low-cost and relies on the battery to of Trend in Scientific
supply energy, so it is necessary to use its power efficiently for routing. In this Research and
research work, first we use the greedy chain to implement the LEACH and Development IJTSRD38645
PEGASIS Protocol and then we use the Genetic Algorithm to construct the data (ijtsrd), ISSN: 2456-
routing chain, which uses its parameters of crossover and mutation and finds 6470, Volume-5 | Issue-2, February 2021,
an optimised data collection routing route. For the same number of nodes, the pp.1075-1078, URL:
Genetic Algorithm increases the network lifespan. Simulations are performed www.ijtsrd.com/papers/ijtsrd38645.pdf
and, on the basis of energy consumption and number of rounds, the effects of
PEGASIS and Genetic Algorithm are compared with each other. Copyright © 2021 by author (s) and
International Journal of Trend in Scientific
KEYWORDS: wireless sensor network, Routing Protocol, Leach, Pegasis protocol, Research and Development Journal. This
Genetic Algorithm, Energy efficiency etc is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)

INTRODUCTION ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK


In communication and sensor networks, the Wireless Sensor Routing protocols are essentially classified into following
Network (WSN) plays the most important role and is also categories, which are:-
becoming a very important part of wireless sensor networks.
Mobility-based Protocols
There are a large number of sensor nodes in the wireless
In WSNs, mobility introduces new challenges to routing
sensor network that are used for collecting data under
protocols. Sink mobility requires energy-efficient protocols
different conditions. In different applications ranging from
to ensure the transmission of data to mobile sinks
home to industry and from medical to military, wireless
originating from source sensors.
sensor networks are applied. Most network applications
for[1] wireless sensors need some form of self-configuration Multipath-based Protocols
and automatic functionality. The key problems in wireless There are two routing samples in view of the transmission of
sensor networks are the creation of routing protocols data between the source sensors and the sink: single-path
capable of using the smallest amount of energy required by routing, multipath routing. In single-path routing, the
different communication protocols[2]. shortest path for each source[4] sensor delivers the data to
the sink. Each source sensor finds the first 'k' shortest paths
Routing in Wireless Sensor Networks
to the sink in multipath routing and splits its load uniformly
Routing is a method of forming a route between sources with
among these paths.
a destination at the request of data transfer. The network
layer is typically used in WSNs to enforce the routing of Heterogeneity-based Protocols
incoming data. It is understood that[3] the source node does There are two types of sensors in this type of sensor network
not hit the sink directly, usually on multi-hop networks. architecture: line-powered sensors have no energy
Therefore, their packets have to be relayed by intermediate constraints, battery-powered sensors have insufficient
sensor nodes. The resolution is given by the efficiency of lifetime, and can therefore use their usable energy efficiently
routing tables. These contain node choice lists for any given by reducing their data transmission and processing
destination of a packet. The role of the routing algorithm is potential.
the routing table, along with the assistance of the routing
protocol for its construction and maintenance.

@ IJTSRD | Unique Paper ID – IJTSRD38645 | Volume – 5 | Issue – 2 | January-February 2021 Page 1075
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Location-based Protocols It is self-adaptive and self-organized. LEACH protocol uses
Sensor nodes are named by means of their locations in round as unit, each round is made up of cluster set-up stage
location-based protocols. The distance of position and steady-state stage, for the purpose of reducing
information sensor networks between two unique energy unnecessary energy costs, the steady stage must be much
consumption nodes can be determined. longer than the set-up stage.
Hierarchical Protocols Advantages
Clustering is an energy-efficient communication protocol in Outperforms conventional routing protocols
the hierarchical Clustering protocol that can be used by the LEACH is completely distributed, requiring no control
sensors to circulate their sensed data to the sink. information from the base station
Nodes do not need global topology information
Data Centric Protocols
Data is delivered from source sensors to the sink in data- Disadvantages
centric protocols, as the source sensors circulate. Their data Nodes must have data to send in the allotted time
to the sink; some form of aggregation can be done by Perfect correlation is assumed, which might not be true
intermediate sensors on the data originating from several always
source sensors and the aggregated data can be sent into
PEGASIS
the[5] sink. Due to lower transmission needed to transmit
PEGASIS is Power-Efficient Gathering in Sensor Information
the data from the sources to the sink, this process will result
Systems. PEGASIS form open chain staring from node which
in energy savings.
is farthest from Base Station .PEGASIS assume that global
LEACH information is available. This algorithm uses greedy
LEACH is the first network protocol that uses hierarchical algorithm for chain construction. Before first round of
routing for wireless sensor networks to increase the life time communication chain formation is done. During formation of
of network. All the nodes in a network organize themselves chain care must be taken so that nodes already in chain
into local clusters, with one node acting as the cluster-head. should not revisited .When a node die then chain is
All non-cluster-head nodes transmit their data to the cluster- reconstructed by bypassing that node. In data gathering
head, while the cluster-head node receive data from all the cycle each node forms a[8] data packet of its own in network.
cluster members, perform signal processing functions on the For each data gathering cycle leader is elected among all
data (e.g., data aggregation), and transmit data to the remote nodes in network. Each node in network receives a data
base station. Therefore, being a cluster-head node is much packet and fuses it with its own data and forwards it to other
more energy-intensive than being a non-cluster-head node. neighbouring node. PEGASIS uses a simple token passing
Thus, when a cluster-head node dies all the nodes that approach which is initiated by leader to start data
belong to the cluster lose communication ability. transmission from ends of chain.
LEACH incorporates randomized rotation of the high-energy GENETIC ALGORITHM
cluster-head position such that it rotates among the sensors The Genetic Algorithm is a heuristic search algorithm
in order to avoid draining the battery of any one sensor in focused on natural selection and evolution principles.
the network. In this way, the energy load associated with Genetic algorithms are evolutionary algorithms (EA) that use
being a cluster-head is evenly distributed among the nodes. genetic operators, such as mutation, selection and crossover,
Since the cluster-head node knows all the cluster members, to solve optimization problems. In a genetic algorithm, the
it can[6][7] create a TDMA schedule that tells each node candidate solution (fitness value) is created by developing a
exactly when to transmit its data. In addition, using a TDMA population of chromosomes. The chromosome population is
schedule for data transfer prevents intra-cluster collisions. generated randomly.
The operation of LEACH is divided into rounds. Each round
Results and Discussion
begins with a set-up phase when the clusters are organized,
The work performed requires applying the PEGASIS
followed by a steady-state phase where several frames of
protocol. The protocol is implemented using the traditional
data are transferred from the nodes to the cluster-head and
PEGASIS implementation form, Greedy Chain. The Genetic
onto the base station. Hierarchical protocols are defined to
Algorithm is then used to execute it. From the farthest node
reduce energy consumption by aggregating data and to
from the base station, the greedy chain initiates the creation
reduce the transmissions to the Base Station. LEACH is
of the chain. The next node, at a smaller distance from the
considered as the most popular routing protocol that use
others, is picked. So the inter-nodal distances are
cluster based routing in order to minimize energy
determined and the nodes are chosen. During this process,
consumption.
the distances start to increase towards the end of the chain,
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol resulting in further dissipation of energy. All simulations
is a TDMA based MAC protocol. The principal aim of this were performed on an area of 100m*100m and nodes were
protocol is to improve the lifespan of wireless sensor distributed randomly in this field. Using 100 nodes, the
networks by lowering the energy consumption required to implemented protocol PEGASIS is simulated. PEGASIS uses a
create and maintain Cluster Heads. LEACH Protocol is a greedy approach and a Genetic Algorithm to construct the
typical representative of hierarchical routing protocols. chain. Each node has an initial energy level that is the same.

1. First energy is .5
Protocol 10 20 30 40 50 60 70 80 90
LEACH 1500 1560 1610 1700 2000 2250 2310 2450 2650
PEGASIS 2260 2320 2360 2420 2460 2500 2570 2630 2740
PEGASIS (GA) 2930 2990 3225 3420 3500 3610 3790 4250 4800

@ IJTSRD | Unique Paper ID – IJTSRD38645 | Volume – 5 | Issue – 2 | January-February 2021 Page 1076
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470

Fig.1: LEACH, PEGASIS, PEGASIS(GA) comparison when energy .5


2. Energy is .25
Protocol 10 20 30 40 50 60 70 80 90
LEACH 670 710 760 790 920 1000 1150 1230 1340
PEGASIS 1100 1160 1180 1197 1205 1240 1255 1320 1520
PEGASIS(GA) 3000 3110 3350 3400 3510 3590 3860 4200 4480

Fig.2: LEACH, PEGASIS, PEGASIS (GA) comparison when energy .25


Conclusion References
We have introduced a new protocol for WSN routing [1] Vivek Katiyar, Narottam Chand, Surender Soni,
operations in this research paper. The protocol is “Clustering Algorithm for Heterogeneous Wireless
accomplished by optimising routing paths using the GA Sensor Networks: A Survey”, International Journal of
algorithm, providing efficient multi-path data transmission Wireless and Mobile Netwroks, 2010.
to obtain secure communications in the event of node faults.
[2] Vinay Kumar, Ganjeev Jain, Sudarshan Tiwari, “Energy
We aimed to preserve the full network life time, while
Efficient Clustering Algorithms in Wireless Sensor
effectively achieving data transmission. In terms of data
Networks: A Survey”, International Journal of
collection and network lifespan, our analysis was completed
Scientific & Engineering Research, 2011.
to assess the efficiency of the Genetic algorithm, LEACH and
PEGASIS protocol. In addition, it is concluded that the overall [3] N. Xu, A survey of sensor network applications, IEEE
performance of the Genetic algorithm is higher in terms of Communications Magazine 40 (8) (2002) 102–114.
data collection than PEGASIS.
[4] D. J. Dechene, A. El Jardali, A. Sauer, “A Survey of
Future Work Clustering Algorithms for Wireless Sensor Networks”,
Other optimization algorithms such as particle swarm International Journal of Computer & Wireless
optimization (PSO), artificial bee colony algorithm (ABO) to Communication, Vol 4, No2, Decemebr, 2013.
get optimised or shortest path should investigate potential
[5] B. Revathy, G.Rekha, “Latest Algorithms in Wireless
changes to the gathering mechanisms for further
Sensor Networks for Energy Conservation A Survey”,
improvements in reliability.

@ IJTSRD | Unique Paper ID – IJTSRD38645 | Volume – 5 | Issue – 2 | January-February 2021 Page 1077
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
International Journal of Engineering Research & Monitoring Alerting and Controlling System”,
Technology, Vol 3, Issue 10, October 2014. International Conference On Information
Communication And Embedded Systems IEEE, on 25-
[6] Md. Golam Rashed and M. Hasnat Kabir, “WEP: an
26 Feb 2016, pp. 978-1-5090-2552- 7/16/
Energy Efficient Protocol for Cluster Based
Heterogeneous Wireless Sensor Network”, [13] Anwar, Raja & Bakhtiari, Majid & Zainal, Anazida &
International Journal of Distributed and Parallel Qureshi, Kashif. (2015). A Survey of Wireless Sensor
Systems (IJDPS), 2011. Network Security and Routing Techniques. Research
Journal of Applied Sciences, Engineering and
[7] Ashok Kumar and Narottam Chand, “Location Based
Technology. 9. 116-1026. 10.19026/rjaset.9.2595.
Clustering in Wireless Sensor Network”, World
Academy of Science, Engineering and Technology, [14] Xunpeng Rao1, Panlong Yang1,2,3, Yubo Yan1,
2011. (Student Member, Ieee), Hao Zhou2, (Member, Ieee),
And Xuangou Wu4 China, in “Optimal Recharging
[8] F Bai, H. Mu and J. Sun “Power Efficient Zoning
With Practical Considerations in Wireless
Clustering Algorithm for Wireless Sensor Networks”.
Rechargeable Sensor Network”, date of publication
In the proceedings of the Information Engineering
February 8, 2017, date of current version April 24,
and Computer Science, 1-4, 2011.
2017, pp. 4401-4409
[9] W. Yang and W. T. Zhu “Voting- o n Grid Clustering for
[15] Beihua Ying, School of Information Science and
source localization in Wireless Sensor Networks”, in
Engineering, Ningbo Institute of Technology, Zhejiang
the proceedings of International Conference on
University, Ningbo, “An Adaptive Compression
Communication, 1 -5, 2014.
Algorithm for Energy-Efficient Wireless Sensor
[10] Xiaohan Li, Fengpeng Yuan and JanneLindqvist Networks” in Advanced Communication Technology
Rutgers University, “Feasibility of Software-Based (ICACT), 2017 19th International Conference
Duty Cycling of GPS for Trajectory-Based Services”, in Bongpyeong, South Korea on 19-22 Feb. 2017, pp.
2016 13th IEEE Annual Consumer Communications & 861-868
Networking Conference (CCNC) on 9-12 Jan. 2016, pp.
[16] Farooq, Umer. (2019). Wireless Sensor Network
293-306
Challenges and Solutions.
[11] MassinissaSaoudi, AhceneBounceur, Reinhardt Euler, 10.13140/RG.2.2.22191.59043.
TaharKechadi and Alfredo Cuzzocrea in,
[17] Kumari, Usha & Padma, Tatiparti. (2019). Energy-
“EnergyEfficient Data Mining Techniques for
Efficient Routing Protocols for Wireless Sensor
Emergency Detection in Wireless Sensor Networks”,
Networks: Proceedings of ICSCSP 2018, Volume 2.
in 2016 Intl IEEE Conferences 2016, pp. 766 – 771
10.1007/978-981-13-3393-4_39.
[12] K. Lokesh Krishna, J. Madhuri, Dr. K. Anuradha, “A
ZigBee based Energy Efficient Environmental

@ IJTSRD | Unique Paper ID – IJTSRD38645 | Volume – 5 | Issue – 2 | January-February 2021 Page 1078

You might also like