Energy Aware Cluster Head Selection for Maximizing Lifetime Improvement in Internet of Things

Energy Aware Cluster Head Selection for Maximizing Lifetime Improvement in Internet of Things

Praveen Kumar Reddy Maddikunta, Rajasekhara Babu Madda
DOI: 10.4018/978-1-5225-9866-4.ch061
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Energy efficiency is a major concern in Internet of Things (IoT) networks as the IoT devices are battery operated devices. One of the traditional approaches to improve the energy efficiency is through clustering. The authors propose a hybrid method of Gravitational Search Algorithm (GSA) and Artificial Bee Colony (ABC) algorithm to accomplish the efficient cluster head selection. The performance of the hybrid algorithm is evaluated using energy, delay, load, distance, and temperature of the IoT devices. Performance of the proposed method is analyzed by comparing with the conventional methods like Artificial Bee Colony (ABC), Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and GSO algorithms. The performance of the hybrid algorithm is evaluated using of number of alive nodes, convergence estimation, normalized energy, load and temperature. The proposed algorithm exhibits high energy efficiency that improves the life time of IoT nodes. Analysis of the authors' implementation reveals the superior performance of the proposed method.
Chapter Preview
Top

1. Introduction

The development of the sensing devices has expanded with the fast advancement of innovation (Kawamoto et al., 2013; Li et al., 2016). In the field of network technology WSN is considered as the principle importance (Duan et al., 2014). WSN is used to provide quick operation with sufficient self-organization throughout the world at any location. In addition, through the continuous improvement, WSN has been utilizing in vast applications (Dai & Xu, 2010; Agarwal et al., 2015; Wu et al., 2016). The system interconnected with computing device, digital and mechanical instruments, animals, people or other objects is called IoT (Kougianos et al., 2016; Liu et al., 2016; Park et al., 2016; Misra et al., 2016). These IoT are supplied with unique identifiers. Additionally, in absence of user- to- user or user- to- computer influence, the IoT system has the capability to convey data over the network. Thus, people have close interaction with the physical world based on the real-time activity of the sensor nodes (Ashraf & Habaebi, 2015; Perera & Vasilakos, 2016). Users can observe, sense and regulate the objects placed in the corresponding environment instead of customizing the information (Li et al., 2016; Zhang et al., 2016; Wu et al., 2016).

The resource of the nodes in WSN based IoT have limited capability in terms of processing, bandwidth, volume of storage, power of battery which differentiate WSN from other networks (Wu et al.,2013; Yachir et al., 2016). Basically, the WSN are provided with battery power which is to be recharged Huang et al., 2015. Under such instance, proper scheduling of energy utilization is required especially when the sensors are distantly connected (Abusalah et al., 2008; Zhong et al., 2010). As a distributed wireless network, WSN is vulnerable to many attacks proper security mechanisms must be provided for confidential data (Lin et al., 2015; Dey et al., 2016). Numerous nodes transfer multiple data from node to the base station about the same event, which leads to transfer redundant data (Moosavi et al., 2016; Di Marco et al., 2016). Thus, the consumption of energy associated with the network become high. Since there are three main processes for the nodes such as information sensing, processing and transmitting, complexity of network has increased. Therefore, the transfer of redundant data should be reduced and the large amount of energy should be saved in order to enhance the life expectancy of the network (Cavalcante et al., 2016; Hsu et al., 2016; Raza et al., 2016). With the rapid development of the Internet of Things, the security issues in wireless sensor network WSN, especially traffic anomaly detections, have attracted researchers' attention. As a distributed wireless network, WSN is vulnerable to many attacks, there should be proper end to end trust mechanisms should be provided for sensing data (Lin et al., 2015).

Complete Chapter List

Search this Book:
Reset