• Title/Summary/Keyword: cluster-head

Search Result 430, Processing Time 0.027 seconds

Adaptive method for selecting Cluster Head according to the energy of the sensor node

  • Kim, Yong Min;LEE, WooSuk;Kwon, Oh Seok;Jung, Kyedong;Lee, Jong-Yong
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.19-26
    • /
    • 2016
  • The most important factor in the wireless sensor network is the use of effective energy and increase in lifetime of the individual nodes in order to operate the wireless network more efficiently. For this purpose, various routing protocols have been developed. The LEACH such a protocol, well known among typical cluster routing protocols. However, when a cluster head is selected, the energy consumption may not be equal because it does not take into account the energy of the nodes. In this paper, we seek to improve the cluster head selection method according to residual energy of each sensor node. This method then adaptively applies the LEACH algorithm and the cluster head section algorithm with consideration of node energy in accordance with the energy of the whole sensor field. Through the simulation, it was found that this proposed algorithm was effective.

Centralized Clustering Routing Based on Improved Sine Cosine Algorithm and Energy Balance in WSNs

  • Xiaoling, Guo;Xinghua, Sun;Ling, Li;Renjie, Wu;Meng, Liu
    • Journal of Information Processing Systems
    • /
    • v.19 no.1
    • /
    • pp.17-32
    • /
    • 2023
  • Centralized hierarchical routing protocols are often used to solve the problems of uneven energy consumption and short network life in wireless sensor networks (WSNs). Clustering and cluster head election have become the focuses of WSNs. In this paper, an energy balanced clustering routing algorithm optimized by sine cosine algorithm (SCA) is proposed. Firstly, optimal cluster head number per round is determined according to surviving node, and the candidate cluster head set is formed by selecting high-energy node. Secondly, a random population with a certain scale is constructed to represent a group of cluster head selection scheme, and fitness function is designed according to inter-cluster distance. Thirdly, the SCA algorithm is improved by using monotone decreasing convex function, and then a certain number of iterations are carried out to select a group of individuals with the minimum fitness function value. From simulation experiments, the process from the first death node to 80% only needs about 30 rounds. This improved algorithm balances the energy consumption among nodes and avoids premature death of some nodes. And it greatly improves the energy utilization and extends the effective life of the whole network.

The Threshold Based Cluster Head Replacement Strategy in Sensor Network Environment (센서 네트워크 환경의 임계값 기반 클러스터 헤드 지연 교체 전략)

  • Kook, Joong-Jin;Ahn, Jae-Hoon;Hong, Ji-Man
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.61-69
    • /
    • 2009
  • Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor networks. In this paper, we present the threshold based cluster head replacement strategy for clustering protocols in wireless sensor networks. This protocol minimizes the number of cluster head selection by preventing the cluster head replacement up to the threshold of residual energy. Reducing the amount of head selection and replacement cost, the life-time of the entire networks can be extended compared with the existing clustering protocols. Our simulation results show that our protocol outperformed than LEACH in terms of balancing energy consumption and network life-time.

  • PDF

Code Combining Cooperative Diversity in Long-haul Transmission of Cluster based Wireless Sensor Networks

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1293-1310
    • /
    • 2011
  • A simple modification of well known Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is proposed to exploit cooperative diversity. Instead of selecting a single cluster-head, we propose M cluster-heads in each cluster to obtain a diversity of order M. The cluster-heads gather data from all the sensor nodes within the cluster using same technique as LEACH. Cluster-heads transmit gathered data cooperatively towards the destination or higher order cluster-head. We propose a code combining based cooperative diversity protocol which is similar to coded cooperation that maximizes the performance of the proposed cooperative LEACH protocol. The implementation of the proposed cooperative strategy is analyzed. We develop the upper bounds on bit error rate (BER) and frame error rate (FER) for our proposal. Space time block codes (STBC) are also a suitable candidate for our proposal. In this paper, we argue that the STBC performs worse than the code combining cooperation.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

A Study on the Analysis of Korean Adults' Bead-type and the Distribution of Size for Improving the Fitness of Swimming Headgear (수영모 맞음새 개선을 위한 한국인의 두형분석과 치수분포에 관한 연구)

  • Kim, In-Sook;Kwon, Myoung-Sook;Yang, Min-Jae
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.8 s.145
    • /
    • pp.1079-1091
    • /
    • 2005
  • The purpose of this study was to point out the unification of the size of swimming headgear by measuring detailed measurement of head ferm and systematizes the head form. A total of 300 male and female Korean adults aged from 18 years old to 35 years old were measured through the direct measurement method. This study attempted to identify the head form of male and female adults using measurement data and the head form was classified through factor analysis and cluster analysis. (1) Based on the fact that this study especially focuses on the size of swimming headgear, factor analysis was performed far both direct measurements with hair and without hair. For the measurements with hair, seven factors were extracted. They were head thickness factor, head width factor, width of side head factor, height of back head factor, length of front head factor, circumference of front head factor, thickness of front head factor and head height factor. They explained the $70.95\%$ of the measurements. (2) The cluster analysis was executed to classify the somatotype of the korean head form on the basis of similarity. According to the cluster analysis result, the measurements with hair categorized types, 'Woman's long-hair type', 'Small type', 'Long and flat type', 'Large type'. (3) Head circumference B and Left tragion - Vertex - Right tragion circumference which are generally length and width in choosing swimming headgear size were selected as measurement items far size of swimming headgear. Direct measurements and sizes of four swimming headgear with different materials taking into account their elongation rate were also compared.

Design and Implementation of Cluster based Routing Protocol using Representative Path in Ubiquitous Sensor Network (무선 센서네트워크에서 대표경로를 이용한 클러스터기반 라우팅 프로토콜의 설계 및 구현)

  • Jang, You-Jin;Kim, Ah-Reum;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.91-105
    • /
    • 2010
  • A wireless sensor network communication technique has been broadly studied with continuous advances in ubiquitous computing environment. Especially, because the resource of the sensor node is limited, it is important to reduce the communication energy by using an energy-efficient routing protocol. The existing cluster-based routing protocols have a problem that they cannot select a cluster head efficiently by randomly choosing a head. In addition, because the existing cluster-based routing protocols do not support the large scale of network, they cannot be used for various applications. To solve the above problems, we, in this paper, propose a new cluster-based routing protocol using representative paths. The proposed protocol constructs an efficient cluster with distributed cluster heads by creating representative paths based on hop count. In addition, a new routing protocol supports multi-hop routing for data communication between a cluster member node and a cluster head as well as between cluster heads. Finally, we show that our protocol outperforms LEACH and Multihop-LEACH in terms of reliability and scalability.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

The Study of Head type Analysis for Milinary (모자 디자인을 위한 성인여성의 두부형태 분석)

  • 문남원
    • Journal of the Korean Society of Costume
    • /
    • v.37
    • /
    • pp.181-190
    • /
    • 1998
  • The purpose of this study was to provide basic information for women's women's head type for mil-inary. The subjects were 141 college women aged from 19∼23. Data were collected from the real anthropometric measurements and 4 index. Correlation coefficientss, factor analysis, cluster analysis and analysis of variance in SAS package. The results were as follows : 4 factors were extracted from 20 anthrometric measurements and in index data, which explain 60.0% of variance. The subjectss were classified into 4 clusters by 11 measurement and 4 index data. Each charicteristics of cluster by the measurements was flat, big, thick, small types in women's head. Each charicteristics of cluster by the index data was mostly flat in head thickness and wide, midium, narrow, very wide type in face.

  • PDF

Improvement of Cluster-head node's Transmission Method in Cluster-based WSN Protocol (클러스터 기반 WSN 프로토콜에서 클러스터 헤드 노드의 전송 방법 개선)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.87-91
    • /
    • 2019
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. Cluster-based Protocols elect Cluster Heads and divide sensor field into Clusters. The Cluster Head collects the data in the Cluster and transmits it to the Base Station. In the case of nodes elected as Cluster Heads, there is a problem of energy consumption. The chain-based Protocol links sensor nodes in a chain and finally transmits all data to the Base Station. In this paper, we intend to increase the network lifetime by using a chain to reduce the energy consumption of the Cluster Head in the Cluster-based Protocol, LEACH Protocol.