Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Optimized LEACH-based Energy Efficient Protocol for M2M Communications in Green IoT: Development of New Hybrid Algorithm

Author : Umakant L Tupe 1 Dr.Sonali Kadam 2 Dr.Parikshit N Mahalle 3

Date of Publication :18th March 2021

Abstract: Internet of Things (IoT) is a promising model, which has attained more demand in research field nowadays. The multiple sophisticated and well-performing devices integrated with IoT system require more energy. Hence, the problem of energy consumption in IoT network is considered as the significant research area. Moreover, Green IoT takes the role of minimizing energy consumption in IoT devices thus achieving sustainable environment for IoT systems. The main intention of this proposal is to develop an energy-efficient protocol for M2M communication in Green IoT using a clustering process incorporated with hybrid meta-heuristic algorithm. The energy-efficient Green IoT is developed by the proposed LEACH protocol, aiming to diminish the power consumption at different levels. The main objective of the proposed protocol is to minimize the energy consumption of M2M communication, by minimizing the distance between the devices, and delay while transmitting data with the development of cluster head selection. In order to attain this objective, the proposed LEACH protocol utilizes the hybrid meta-heuristic algorithm that merges the beneficial concepts of both Whale Optimization Algorithm (WOA), and Deer Hunting Optimization Algorithm (DHOA), and the hybrid algorithm is termed as Whale-based DHOA (W-DHOA). The combination of these two algorithms in LEACH protocol performs well in cluster head selection to minimize the energy consumption, thus maximizing the network lifetime, which leads to frame an energy efficient Green IoT.

Reference :

    1.  Ning Li, Yingqing He, Cong Wang, Yancheng Chen, and Jianhui Xu, "Energy-efficient power allocation for massive M2M communication over LTE-A cellular uplink", EURASIP Journal on Wireless Communications and Networking, December 2018
    2.  Rowayda A.Sadek, "Hybrid energy aware clustered protocol for IoT heterogeneous network", Future Computing and Informatics Journal, vol.3, no.2, pp.166-177, December 2018.
    3. M. Li, F. R. Yu, P. Si, and Y. Zhang, "EnergyEfficient Machine-to-Machine (M2M) Communications in Virtualized Cellular Networks with Mobile Edge Computing (MEC)," IEEE Transactions on Mobile Computing, vol. 18, no. 7, pp. 1541-1555, 1 July 2019.
    4. B. L. Parne, S. Gupta, and N. S. Chaudhari, "SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTEA Network," IEEE Access, vol. 6, pp. 3668-3684, 2018.
    5. T. M. Behera, U. C. Samal, and S. K. Mohapatra, "Energy-efficient modified LEACH protocol for IoT application," IET Wireless Sensor Systems, vol. 8, no. 5, pp. 223-228, 10 2018.
    6.  X. Li, J. Peng, J. Niu, F. Wu, J. Liao, and K. R. Choo, "A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1606-1615, June 2018.
    7. K. Renuka, S. Kumari, D. Zhao, and L. Li, "Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems," IEEE Access, vol. 7, pp. 51014-51027, 2019.
    8. Salman A. AlQahtani, "Analysis of a Hybrid Priority Scheme for Multiclass M2M Communications Over LTE-A Networks", Arabian Journal for Science and Engineering, vol.43, no.12, pp.6981–6993, December 2018.
    9. F. K. Shaikh, S. Zeadally, and E. Exposito, "Enabling Technologies for Green Internet of Things," IEEE Systems Journal, vol. 11, no. 2, pp. 983-994, June 2017.
    10. A. Ali, G. A. Shah, and M. Shoaib, "Energy Efficient Uplink MAC Protocol for M2M Devices," IEEE Access, vol. 7, pp. 35952-35962, 2019.
    11.  M. Li, F. R. Yu, P. Si, and Y. Zhang, "EnergyEfficient Machine-to-Machine (M2M) Communications in Virtualized Cellular Networks with Mobile Edge Computing (MEC)," IEEE Transactions on Mobile Computing, vol. 18, no. 7, pp. 1541-1555, 1 July 2019.
    12.  J. Shen, A. Wang, C. Wang, P. C. K. Hung, and C. Lai, "An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT," IEEE Access, vol. 5, pp. 18469-18479, 2017.
    13. C. S. Abella, Salvo Bonina, Antonino Cucuccio, Salvatore D‟Angelo, Gianluca Giustolisi, Alfio D. Grasso, Antonio Imbruglia, Giorgio S. Mauro, Giuseppe A. M. Nastasi, Gaetano Palumbo, Salvatore Pennisi, Gino Sorbello, and Antonino Scuderi, "Autonomous Energy-Efficient Wireless Sensor Network Platform for Home/Office Automation," IEEE Sensors Journal, vol. 19, no. 9, pp. 3501-3512, 1 May1, 2019.
    14. S. Aslam, W. Ejaz and M. Ibnkahla, "Energy and Spectral Efficient Cognitive Radio Sensor Networks for Internet of Things," in IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3220-3233, Aug. 2018.
    15. U. Banerjee, A. Wright, C. Juvekar, M. Waller, Arvind, and A. P. Chandrakasan, "An EnergyEfficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications," IEEE Journal of Solid-State Circuits, vol. 54, no. 8, pp. 2339-2352, Aug. 2019.
    16. R. Amin, S. H. Islam, G. Biswas, M. K. Khan, L. Leng, and N. Kumar, "Design of an anonymitypreserving three-factor authenticated key exchange protocol for wireless sensor networks", Computer Networks, vol.101, pp.42-62, 4 June 2016.
    17. S. Sicari, A. Rizzardi, L. A. Grieco, and A. CoenPorisini, "Security, privacy and trust in Internet of Things: The road ahead", Computer Networks, vol.76, pp.146-164, 15 January 2015.
    18.  SudhanshuTyagi, and NeerajKumar, "A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks", Journal of Network and Computer Applications, vol.36, no.2, pp.623-645, March 2013.
    19.  Liu J.L., Ravishankar C.V.,"LEACH-GA: Genetic algorithm-based energy-efficient adaptive clustering protocol for wireless sensor networks", Int. J. Mach. Learn. Comput, vol 1, pp.79–85, 2011.
    20.  Smaragdakis G., Matta I., Bestavros, "A. SEP: A stable election protocol for clustered heterogeneous wireless sensor networks", 2nd IEEE International Workshop on Sensor and Actor Network Protocols and Applications, Boston, MA, USA, pp. 1–11, 22 August 2004.
    21. S. Faisal, N. Javaid, A. Javaid, M. A. Khan, S. H. Bouk, Z. A. Khan, "Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks", Journal of Basic and Applied Scientific Research, March 2013.
    22. T. D. Nguyen, J. Y. Khan and D. T. Ngo, "A Distributed Energy-Harvesting-Aware Routing Algorithm for Heterogeneous IoT Networks," IEEE Transactions on Green Communications and Networking, vol. 2, no. 4, pp. 1115-1127, Dec. 2018.
    23. Y. Chen et al., "Energy-Autonomous Wireless Communication for Millimeter-Scale Internet-ofThings Sensor Nodes," IEEE Journal on Selected Areas in Communications, vol. 34, no. 12, pp. 3962- 3977, Dec. 2016.
    24. Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen, "Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture", Peer-to-Peer Networking and Applications, pp 1–16, 19 July 2019.
    25. R. Majumder, G. Bag and K. Kim, "Power Sharing and Control in Distributed Generation With Wireless Sensor Networks," IEEE Transactions on Smart Grid, vol. 3, no. 2, pp. 618-634, June 2012.
    26. Seyedali Mirjalili and Andrew Lewis, " The Whale Optimization Algorithm", Advances in Engineering Software, vol. 95, pp.51–67, 2016.
    27. G Brammya, S Praveena, N S Ninu Preetha, R Ramya, B R Rajakumar, and D Binu, "Deer Hunting Optimization Algorithm: A New Nature-Inspired Meta-heuristic Paradigm", 24 May 2019.
    28. Yifeng Zhao, Kai Liu, Xueting Xu, Huayu Yang, and Lianfen Huang, "Distributed Dynamic Cluster-Head Selection and Clustering for Massive IoT Access in 5G Networks", Applied Sciences, vol. 9, no.1, pp. 132, January 2019.
    29. M. Marsaline Beno, Valarmathi I. R, Swamy S. M and B. R. Rajakumar, “Threshold prediction for segmenting tumour from brain MRI scans”, International Journal of Imaging Systems and Technology, Vol. 24, No. 2, pages 129-137, 2014.
    30.  A.H.Gandomi, X.-S.Yang, S.Talatahari, and A.H.Alavi, "Firefly algorithm with chaos", Communications in Nonlinear Science and Numerical Simulation, vol.18, no.1, pp.89-98, January 2013.
    31. SeyedaliMirjalili, Seyed MohammadMirjalili, and AndrewLewis, "Grey Wolf Optimizer", Advances in Engineering Software, vol.69, pp.46-61, March 2014

Recent Article