Pivot variable location-based clustering algorithm for reducing dead nodes in wireless sensor networks

  • S. Jancy
  • C. Jayakumar
S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing


The information technology has grown so rapidly that it has led to the development of compact size and inexpensive sensor nodes. Several sensor nodes together form a WSN. Though the WSN is compact in size, they can be equipped with radio transceivers, sensors, microprocessors which are embedded and sensors. One of the major critical issues with WSN is energy efficiency. With WSN, various energy-efficient techniques are being employed. Among clustering techniques, LEACH, HEED, EAMMH, TEEN, SEP, DEEC, K-means clustering algorithm are some of the most popular energy-efficient techniques which are employed. These are hierarchical based protocol which saves energy by balancing the energy expense. Detailed review and analysis of these protocols are presented, and midpoint location algorithm is proposed in this paper. The methodology used for reduction in dead nodes while transmitting the data is also discussed. In the proposed work, path construction phase (PCP) and alternative path construction phase (APCP) are created in order to reduce dead nodes. During the processes of data transmission if a node is found out that it will fail and APCP is applied, the cluster head is changed while applying the APCP. The cluster head is chosen based on midpoint location and highest node energy. The cluster head becomes permanent if the node has midpoint location and the highest energy. If the node does not have midpoint location and highest energy, it becomes a temporary cluster head. The proposed techniques are compared with EAMMH protocol and LEACH protocol using MATLAB. When compared with EAMMH, the dead nodes were reduced with subsequent rounds.


Wireless sensor networks Clustering LEACH HEED, EMMAH protocols 


Compliance with ethical standards

Conflict of interest

Authors have no conflict of interest in publishing their work in this journal.


  1. 1.
    Zawaideh F, Salamah M (2014) Adaptive balanced clustering for wireless sensor network energy optimization. Netw Complex Syst. ISSN: 2224-610X (Paper). ISSN: 2225-0603 (Online) 4(4).
  2. 2.
    Devi GU, Balan EV, Priyan MK, Gokulnath C (2015) Mutual authentication scheme for IoT application. Indian J Sci Technol 8(26)Google Scholar
  3. 3.
    Mohaisen Linda F, Joine Laurie L (2017) Interference aware bandwidth estimation for load balancing in EMHR-energy based with mobility concerns hybrid routing protocol for VANET-WSN communication. Ad Hoc Netw 66:1–15CrossRefGoogle Scholar
  4. 4.
    Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10Google Scholar
  5. 5.
    Manogaran G, Varatharajan R, Priyan MK (2018) Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Appl 77(4):4379–4399CrossRefGoogle Scholar
  6. 6.
    Singh SK, Singh MP, Singh DK (2010) Energy efficient homogenous clustering algorithm for wireless sensor networks. Int J Wireless Mobile Netw (IJWMN) 2(3):49CrossRefGoogle Scholar
  7. 7.
    Tripathy AK, Chinara S (2012) Comparison of residual energy-based clustering algorithms for wireless sensor network. Int Sch Res Netw ISRN Sen Netw Article ID 375026, 2012:10Google Scholar
  8. 8.
    Samayveer Singh A, Aruna Malik B, Rajeev Kumar C (2017) Energy efficient heterogeneous deec protocol for enhancing lifetime in WSNs. Eng Sci Technol Int J 20:345–353CrossRefGoogle Scholar
  9. 9.
    Balan EV, Priyan MK, Gokulnath C, Devi GU (2015) Fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 50:109–114CrossRefGoogle Scholar
  10. 10.
    Sharmaa R, Mishraa N, Srivastava S (2015) A proposed energy efficient distance based cluster head (DBCH) algorithm: an improvement over LEACH. Procedia Comput Sci 57:807–814CrossRefGoogle Scholar
  11. 11.
    Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018) Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools Appl 1–21Google Scholar
  12. 12.
    Gowrishankar, S Basavaraju TG, Manjaiah Handy MJ, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: IEEE international conference on mobile and wireless communications networksGoogle Scholar
  13. 13.
    Reddy BB, Rao KK (2013) Adaptive cluster head probability for LEACH protocol. IJCCN Int J Comput Commun Netw 3(3) ISSN 2289-3369Google Scholar
  14. 14.
    Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Appl 77(8):10195–10215CrossRefGoogle Scholar
  15. 15.
    Devi GU, Priyan MK, Balan EV, Nath CG, Chandrasekhar M (2015) Detection of DDoS attack using optimized hop count filtering technique. Indian J Sci Technol 8(26)Google Scholar
  16. 16.
    Divya C, Krishnan N, Gandhi Mathy T (2013) Energy efficient stable election protocol for clustered heterogeneous wireless sensor networks. IOSR J Comput Eng (IOSR-JCE) e-ISSN: 2278-0661, ISSN: 2278-8727 12(5) 55–64.
  17. 17.
    Heinzelman WR, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670CrossRefGoogle Scholar
  18. 18.
    Gokulnath C, Priyan MK, Balan EV, Prabha KR, Jeyanthi R (2015) Preservation of privacy in data mining by using PCA based perturbation technique. In IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials (ICSTM), pp 202–206Google Scholar
  19. 19.
    Khediri SEL, Nasri N, Wei A, Kachouri A (2014) A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput Sci 32:1180–1185CrossRefGoogle Scholar
  20. 20.
    Manogaran CT G, Priyan M (2017) Centralized fog computing security platform for IoT and cloud in healthcare system. Exploring the convergence of big data and the internet of things, 141Google Scholar
  21. 21.
    Puneet A, Vidushi S (2013) Cluster head selection in wireless sensor networks under fuzzy environment. Hindawi Publishing Corporation ISRN Sensor Networks, vol 2013, Article ID 909086, 8Google Scholar
  22. 22.
    Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189Google Scholar
  23. 23.
    Dhankhar S, Singh S (2016) Performance comparison of LEACH & HEED clustering protocols in WSN using MATLAB-A review. Int J Tech Res (IJTR) 5(1)Google Scholar
  24. 24.
    Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Clust Comput 1–12Google Scholar
  25. 25.
    Mahapatra RP, Yadav RK (2015) Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput Sci 57:1005–1014CrossRefGoogle Scholar
  26. 26.
    Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C(2017) A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen Comput SystGoogle Scholar
  27. 27.
    Priya S, Varatharajan R, Manogaran G, Sundarasekar R, Kumar PM (2018) Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal Ubiquitous Comput 1–11Google Scholar
  28. 28.
    Parmar J, Pirishothm A (2015) Study of wireless sensor networks using leach, teen and apteen routing protocols. Int J Sci Res (IJSR) ISSN (Online): 2319–7064Google Scholar
  29. 29.
    Kanisha B, Lokesh S, Kumar PM, Parthasarathy P, Chandra Babu G (2018) Speech recognition with improved support vector machine using dual classifiers and cross fitness validation. Personal Ubiquitous Comput 1–9Google Scholar
  30. 30.
    Kumar PM, Gandhi UD (2017) A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr EngGoogle Scholar
  31. 31.
    Mundada MR, Thimmegowda N, Bhuvaneswari T, Cyrilraj V (2013) Clustering in wireless sensor networks: performance comparison of EAMMH and LEACH protocols using MATLAB. Adv Mater Res 705:337–342CrossRefGoogle Scholar
  32. 32.
    Balan EV, Priyan MK, Devi GU (2015) Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In: IEEE international conference on communications and signal processing (ICCSP), pp 0185–0189Google Scholar
  33. 33.
    Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput Appl. Google Scholar
  34. 34.
    Chaudhary R, Vatta S (2014) Review paper on energy- efficient protocols in wireless sensor networks. IOSR J Eng 04(02):2278–8719CrossRefGoogle Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  1. 1.CSE DepartmentSathyabama Institute of Science and TechnologyChennaiIndia
  2. 2.CSE DepartmentSri Venkateswara College of EngineeringChennaiIndia

Personalised recommendations