Skip to main content

An Improved Algorithm of LEACH Protocol Based on Node’s Trust Value and Residual Energy

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 699))

Abstract

In previous clustering algorithms for wireless sensor networks such as LEACH, the residual energy of the node is not considered into the election of the cluster head, and there is no security mechanism for identifying malicious nodes. In response to this phenomenon, we propose a WSN clustering routing algorithm based on node’s trust value and residual energy to eliminate the negative influence of malicious nodes as well as to balance energy consumption of the network. The simulations show that the proposed algorithm prolongs the network lifetime and has a better performance in the communication quality.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Khan, W.Z., Saad, N.M, Aalsalem, M.Y.: An overview of evaluation metrics for routing protocols in wireless sensor networks. In: 2012 4th International Conference on Intelligent and Advanced Systems, pp. 588–593 (2012)

    Google Scholar 

  2. Li, X.H, Hong, S.H., Fang, K.L.: A heuristic routing protocol for wireless sensor networks in home automation. In: 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–8 (2009)

    Google Scholar 

  3. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless sensor networks. In: Proceedings of Hawaii International Conference on System Sciences. Hawaii (2000)

    Google Scholar 

  4. Yao, Y., Gehrke, J.: The cougar approach to in-network query processing in sensor networks. In: SIGMOD Record (2002)

    Google Scholar 

  5. Chakraborty, S., Khan, A.K.: Evaluation of wireless sensor network routing protocols with respect to power efficiency. In: 2013 5th International Conference on Computational Intelligence and Communication Networks, pp. 123–128 (2013)

    Google Scholar 

  6. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660–670 (2002)

    Article  Google Scholar 

  7. Younis, O., Fahmy, S.: HEED: a hybrid energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 3(4), 660–669 (2004)

    Article  Google Scholar 

  8. Tao, Z., Jiang, S.F.: Clustering algorithm for wireless sensor networks with mobile cluster heads. Comput. Eng. Appl. 52(5), 75–78 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miaoyuan Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Huang, M., Bai, E., Jiang, X., Wu, Y. (2017). An Improved Algorithm of LEACH Protocol Based on Node’s Trust Value and Residual Energy. In: Yuan, H., Geng, J., Bian, F. (eds) Geo-Spatial Knowledge and Intelligence. GRMSE 2016. Communications in Computer and Information Science, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-10-3969-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3969-0_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3968-3

  • Online ISBN: 978-981-10-3969-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics