Wail Mardini
Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN
Mardini, Wail; Yassein, Muneer Bani; Khamayseh, Yaser; Ghaleb, Baraq
Authors
Abstract
Minimizing the energy consumption for data transmission is one of the most important design considerations in Wireless Sensor Networks (WSNs). The clustering approach is considered one of the most effective methods to prolong the network lifetime in WSNs. Hybrid, Energy-Efficient, and Distributed clustering approach (HEED) is considered one of the most energy-efficient clustering algorithms that uses intra-communication cost and residual energy to elect the Cluster Heads (CHs). In this paper, we aim at examining different inter-cluster routing protocols over HEED and evaluate their performance. Moreover, an enhanced version to HEED, namely Rotated HEED (RHEED), is proposed in this paper. The modified version conducts the setup phase according to certain rules and schedule, with HEED performs this step at the beginning of some rounds. At the beginning of every round the CHs wait a pre-defined period of time to receive a re-clustering message from the BS. If they do not receive the re-clustering message, they will continue rotating the cluster head within the same cluster. The simulation results show that the RHEED outperforms the HEED protocol by more than 20% in term of network lifetime and residual energy.
Citation
Mardini, W., Yassein, M. B., Khamayseh, Y., & Ghaleb, B. (2014). Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN. WSEAS Transactions on Communications, 13, 275-290
Journal Article Type | Article |
---|---|
Publication Date | 2014 |
Deposit Date | Apr 3, 2023 |
Print ISSN | 1109-2742 |
Electronic ISSN | 2224-2864 |
Publisher | World Scientific and Engineering Academy and Society |
Peer Reviewed | Peer Reviewed |
Volume | 13 |
Pages | 275-290 |
Keywords | Sensor Network; Clustering Protocols; HEED; Cluster Head; Energy Consumption; Distributed; Hybrid |
Publisher URL | https://wseas.org/wseas/cms.action?id=7652 |
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs)
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search