Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4877
Title: Optimization of Clustering Techniques in Wireless Sensor Networks
Authors: Shah, Abhinav N.
Keywords: Computer 2012
Project Report 2012
Computer Project Report
Project Report
12MICT
12MICT20
ICT
ICT 2012
CE (ICT)
LEACH-C
Clustering Techniques
Fuzzy c-Means (FCM)
Dynamic Clustering
Network Lifetime
Issue Date: 1-Jun-2014
Publisher: Institute of Technology
Series/Report no.: 12MICT20;
Abstract: A wireless sensor network is formed by the large number of tiny devices which consists of low-power trans-receivers which can be very efficient tool for gathering information from a particular or different type of environments.But sensor nodes have limited resources, so the path for communication between sensor node and Base Station should be chosen such that very less amount of energy is consumed to transfer this information. Sensor nodes are grouped into clusters for high scalability and better data aggregation. The Hierarchical WSNs are created using clusters, which supports in the appropriate utilization of the resources of the sensors. Here a cluster-head election technique is implemented that optimizes network lifetime with reduced energy consumption. LEACH and LEACH-C are the popular clustering protocol and they provide energy efficient routing. As these protocols are defacto standard for clustering techniques the focus has been on optimizing LEACH-C protocol to achieve better network lifetime energy consumption. Here, the FCM algorithm is used for the clustering startegy in place of simulated annealing algorithm. Also the other optimization techniques are carried out to achieve the better network lifetime than LEACH-C. Simulation results are taken after applying modified algorithm. It selects optimal number of clusterheads in each round and also forms better clusters. It consumes less energy and enhances network lifetime. The energy usage analysis is done and the mathematial derivation of the energy consumption in each phase of the the protocol is carried out.
URI: http://hdl.handle.net/123456789/4877
Appears in Collections:Dissertation, CE (ICT)

Files in This Item:
File Description SizeFormat 
12MICT20.pdf12MICT20913.68 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.