SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 4, August 2021, pp. 3106∼3113
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3106-3113 r 3106
Improved LEACH protocol for increasing the lifetime of
WSNs
Ikram Daanoune, Abdennaceur Baghdad, Abdelhakim Ballouk
Department of Electrical Engineering, Laboratory of Electronics, Energy, Automatics and Data Processing, Faculty of
Sciences and Techniques of Mohammedia, Hassan II University of Casablanca, Morocco
Article Info
Article history:
Received Sep 5, 2020
Revised Sep 29, 2020
Accepted Dec 5, 2020
Keywords:
Energy-efficiency
Improved LEACH
Network lifetime
Routing protocol
WSN
ABSTRACT
Recently, wireless sensor network (WSN) is taking a high place in several applications:
military, industry, and environment. The importance of WSNs in current applications
makes the WSNs the most developed technology at the research level and especially
in the field of communication and computing. However, WSN’s performance deals
with a number of challenges. Energy consumption is the most considerable for many
researchers because nodes use energy to collect, treat, and send data, but they have re-
stricted energy. For this reason, numerous efficient energy routing protocols have been
developed to save the consumption of power. Low energy adaptive clustering hierarchy
(LEACH) is considered as the most attractive one in WSNs. In the present document,
we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and
in data transmission, then we propose an enhanced protocol. The proposed algorithm
aims to improve energy consumption and prolong the lifetime of WSN through se-
lecting CHs depending on the remaining power, balancing the number of nodes in
clusters, determining abandoned nodes in order to send their data to the sink. Then
CHs choose the optimal path to achieve the sink. Simulation results exhibit that the
enhanced method can decrease the consumption of energy and prolong the life-cycle
of the network.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ikram Daanoune
Department of Electrical Engineering
Laboratory of Electronics, Energy, Automatics and Data Processing, Hassan II University
FST Mohammedia-Casablanca (B.P. 146 Mohammedia 20650 Morocco)
Email: ikrame.daanoune-etu@etu.univh2c.ma
1. INTRODUCTION
Recently, information technology has seen enormous progress in all domains, everything has been
digitized. WSN offers a better solution for efficiently gathering data from anywhere, even difficult areas where
human activity is impossible [1]. Various domains use WSN to ameliorate their production or quality of service
(QoS) [2]. Each sensor node has at least one sensor that serves to collect data. These micro-sensor nodes char-
acterize by self-configuration and self-adaptation, generally, they are alimented by non-rechargeable batteries.
Numerous applications use the WSN by reason of the weak-cost, the self-organization of nodes, the sensing
ability of sensors, the miniature dimension of the node which allows it to be deployed in hard environments to
supervise different types of physical and environmental conditions, easy in positioning, scattering over an large
region and giant fault tolerance [3–5]. However, the WSN faces several issue related to the power source.
The great use of energy in the various units of the sensor node limits the lifespan of these batteries,
which limits the lifespan of the entire network because batteries are the principal reasons for the lifetime of
Journal homepage: http://ijece.iaescore.com
Int J Elec & Comp Eng ISSN: 2088-8708 r 3107
the sensor node [6]. Consequently, the major constraint within the WSN is energy consumption. Therefore, it
is requisite to conserve energy in order to prolong the network life cycle. For this reason, numerous research
problems are defined as optimization issues referred at discovery useful design strategies, like deployment
coverage issue, data routing problem, cluster-head selection [7]. Thus several routing protocols have been
scheduled by researchers to reduce the energy consumption of network nodes [8, 9].
Routing protocols are divided mainly to 3 classes: hierarchical, data-centric, and location [9] as we
can see in Figure 1. Each class contains several protocols, such as LEACH [10], SPIN [11], HEED [12], MG-
LEACH [13], EDMHT [14], MBER [15], BRE-LEACH [16], and so on. Among the existing and the famous
routing protocols, there is LEACH protocol. LEACH has been the first and the oldest algorithm, it has been
considered as it is an energy-efficient clustering protocol which partitions the network to many groups of sensor
nodes. Thus, in any group, there are common nodes responsible to collect data and a randomly elected cluster
head which aggregates cluster data, compresses it then transmits it toward the collector. Even if LEACH aims
to extend the duration of the network, it remains limited by many constraints, such as the random selection
of CHs, single-hop between CHs and the sink regardless of the space and the remaining power. To improve
the energy efficiency in WSN various energy efficient routing protocol are proposed, such as EESRA [17],
O-LEACH [18], BPA-CRP [19], and so forth.
In this work, we suggest an ameliorated efficient-energy routing approach based on the clustering
method. This work is different from other existing studies because it is based on the remaining energy to select
CHs, it limits the number of nodes in each cluster which serves to balance the energy of the CHs, determines
abandoned nodes that can not join any cluster in order to send their data to the sink. Then every CH chooses the
optimal path to achieve the sink. Our enhanced protocol serves to prolong the life cycle of the network more
than LEACH by minimizing energy consumption.
The organization of the content of the present document is as pursue: the second part exposes the
related work. The third part introduces the proposed work. The fourth part exhibits the simulation results of
our protocol compared with the LEACH algorithm. A discussion of results is given in the fifth part. Finally,
the sixth part presents a conclusion of the paper.
Figure 1. Routing protocols classification
2. RELATED WORK
LEACH is the fundamental and the oldest protocol of hierarchical routing protocols, focused on clus-
tering [20], suggested by Heinzelman et al. in 2000 [10]. LEACH is characterized by the self-adaptation as well
as the self-organization; nodes organize themselves into clusters [21]. LEACH generates clusters in the net-
work and it provides a turn conception. Each turn includes two main stages. In the first stage, CHs are selected
randomly according to the threshold function defined in (1), then clusters are established in self-adaptation
[22]. In the second stage, it includes communication between normal nodes and their corresponding CHs, thus
communication between CHs and the collector. So, this last stage presents data transmission.
In the cluster formation, LEACH adopts a probability function to elect CHs. Each sensor node makes
choice an aleatory value betwixt zero and one. This node turns into a CH in the present period if the random
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3108 r ISSN: 2088-8708
value is inferior to the threshold function described in (1). Otherwise, it becomes a normal node [23]. Thereby,
normal nodes are looking for their CHs depending on the received signal from CHs.
TL(s) =
(
PL
1−PL∗(i mod(1/PL)) , s ∈ C
0 else
(1)
Here PL represents the CHs probability in the network, i is the number of the period; C is the number
of the sensor nodes that have not become CH in the previously 1/PL iterations.
In the stable stage, Once CHs are elected and clusters are formed, the data transfer begins. Every
normal node gathers its environment information, forward it to its CH. When data achieve CHs, these latter
aggregate their cluster data, then send them to the sink.
LEACH-centralized (LEACH-C) [24] is a centralized clustering algorithm. It is an enhancement of
the conventional LEACH approach. With similar to LEACH, LEACH-C splits every round into a set-up and
steady-state phase. In the beginning phase, unlike LEACH, in LEACH-C the base station (BS) selects CHs
at the hand of the average energy of nodes and the location. Based on this information, alone the nodes with
higher energy can be a CH.
Balanced residual energy-LEACH (BRE-LEACH) [16] selects CHs in terms of the remaining energy.
Then, it selects the CH that has the remaining energy more than the average remaining energy and the distance
to the BS less than the average distance as a root CH. This root is responsible to aggregate all CHs data and
sends them to the BS. Thereby, in the BRE-LEACH, CHs use the multi-hop technique to achieve the root CH.
3. THE PROPOSED PROTOCOL
In the LEACH protocol, the aleatory choice of CHs in the network results in an energy imbalance of
nodes, and not all nodes have the same opportunity to become CH. Thus, in the LEACH, the LEACH-C, and the
BRE-LEACH algorithms, the number of nodes in clusters is not the same, which creates an energy imbalance,
CHs with more cluster members can exhaust their energy early than others. Thereby, in these protocols, nodes
determine their clusters according to the power of the received signal from CHs. So, data of nodes that have
not accessed any cluster cannot achieve the BS.
For these causes, we propose in this paper a new LEACH-based routing protocol, it aims to minimize
energy consumption and extend the network lifetime. This approach is a new approach for picking out CHs
in the network depending on the residual energy of the sensor nodes and establishing clusters. Thereby, the
abandoned nodes that can not reach any cluster, can also send their data to the sink. Furthermore, it proposes
the multi-hop technique between CHs to choose the optimal route to the BS or the single hop directly to the sink
if it is the optimal path. The proposed approach supposes that in each round, there are clusters. The proposed
protocol introduces two phases:
3.1. First phase
The initial phase concerns CH selection and clusters formation. To save energy in the WSN, this new
approach proposes to select the CHs according to the remaining power of nodes. Thus, it forms clusters based
on a determined amount of nodes. The CH formation will be every round. At the starting of every iteration,
each sensor node designates an arbitrary value at interval zero and one. In case that, the chosen number is more
than the threshold function defined in (2), which is proposed in [16, 25], then this sensor node will be as a
common node (CN). In the other case, the sensor node will be picked out as a CH in the current iteration.
Tpr(s) =
(
PL
1−PL∗(i %(1/PL)) ∗ Erem
Ei
, s ∈ C
0 otherwise
(2)
Here PL represents the CHs probability in the network, i is the number of the period; C is a set of
sensor nodes that have not become CH in the previously 1/PL iterations. Ei presents the beginning energy of
nodes and Erem is the remaining energy at the i iteration.
Once CHs are elected, common nodes are looking for their corresponding CHs according to the power
of the received signal from CHs. The number of nodes in each cluster is determined Ncl in terms of the total
amount of nodes in the network and the number of CH desired.
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3109
Each common node constructs its table of CHs according to the received announcement message from
CHs. This table contains the distance between this node and the CHs. For selecting the CH corresponding,
the proposed approach suggests that the distance between the sensor node and its CH belongs will be less than
the threshold distance do defined in (3), and this CH has a number of nodes less than Ncl. In this way, the
node forwards a message to join the CH with the lowest distance in its table if there is a frame available in the
TDMA. On the other hand, when the first cluster in the table is filled, the node does the same procedure to the
second CH with the lowest distance, and so forth.
d0 =
s
Efs
Emp
(3)
Where, Efs is the energy consumed by the amplifier in the free space, and Emp in the multipath propagation.
Once clusters are established, nodes with distances in their tables equal to or greater than do, or the
availability on the TDMA schedule is not available, they can not join any cluster. These nodes called abandoned
nodes (ANs).
3.2. Second phase
Once the clusters are formed and ANs are determined, the second phase starts. This phase presents
the data transmission phase. Each CH receives data from the cluster member (that collects information from
the surrounding environment) and aggregates it. Then, every CH uses the multi-hop technique between CHs to
choose the optimal path to the BS or the single hop directly to the sink if it is the optimal route. Furthermore,
ANs can also send their data to the sink through the single hop. Finally, the closest CH to the sink sends its
own information with the aggregated packet of others CHs to the sink. Figure 2 illustrates the flow diagram of
the proposed protocol.
Figure 2. The flowchart of the proposed protocol
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3110 r ISSN: 2088-8708
4. SIMULATION AND RESULTS
In that part, we are used simulation to analyze and simulate the proposed protocol performance. Mat-
lab simulator is used to evaluate the proposed protocol and LEACH to put up a comparative analysis between
the proposed algorithm and the conventional LEACH algorithm. We considered 80 sensor nodes are distributed
haphazardly in the space of 100*100 m2
. The cluster probability is 5%, and the initial energy is 0.5 Joule. We
considered one BS that located outside the network with coordinates (50, 150), nodes and the BS are static, then
sensor nodes are homogeneous (having the same initial energy). Table 1 summarizes the simulation parameters
that we have made in evaluating the LEACH and the proposed protocol.
Table 1. The simulation criterion value
Parameter Value
Sensor nodes Number 80
Area 100 m*100 m
The cluster probability (PL) 5%
Initial energy (Ei) 0.5 J
BS location (x,y) (50,150)
ET x = ERx 50 nJ/bit
Efs 10 pJ/bit/m2
Emp 0.0013 pJ/bit/m4
Energy of data aggregation 5 nJ/bit
Size of packet 4000 bits
Number of rounds executed 2500
Figure 3 (a) shows the simulation results of the suggested approach as well as those of the origi-
nal LEACH according to the network lifetime metric. From these results, we drew the diagram depicted in
Figure 3 (b). The chart above shows a significant enhancement in the proposed protocol. In LEACH, the first
node die (FND) at the iteration 846th
while in the proposed protocol, the FND at the turn 609th
. Furthermore,
at the round 1003rd
, only the half of nodes that stay alive in the LEACH protocol, whereas in the developed
algorithm, the half node die (HND) at the 1714th
iteration. Thereby, In LEACH, at the turn 1615th
just one
node stills alive, so the network is almost finished, while at this round, more than the half nodes stay alive in the
proposed protocol (46 nodes). Finally, from the round 2499th
, 15 nodes remain alive in the proposed approach,
on the contrary, the network in LEACH is finished.
(a) (b)
Figure 3. The network lifetime in the LEACH and the proposed protocol, (a) Alive nodes in the network,
(b) Diagram of dead node in the network
Figure 4 compares the proposed solution against LEACH according to the remaining energy metric.
The remaining energy is the difference between the initial energy and the consumed energy. From these curves,
we can see that the remaining energy of total sensor nodes in the proposed protocol is gradually decrease
compared to the classical LEACH approach. Then, at the round 1200, it is almost null in the LEACH while
in the proposed protocol, it is still more than 15% of the initial energy of all the network nodes. From these
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3111
results, we can see that the proposed protocol in this paper can optimize the energy consumption and extend
the stability of the network better than the original LEACH protocol.
Figure 4. Total remaining energy of nodes in LEACH and the proposed protocol
5. DISCUSSION OF RESULTS
The LEACH protocol ameliorates the energy-efficiency compared to classical protocols used in WSN.
The LEACH-C uses the centralization method to improve the traditional LEACH approach by enhancing the
CH selection. The BRE-LEACH enhances the conventional LEACH algorithm by selecting CH according to
the residual energy, and picks out a root. But each of these protocols has several limitations. Table 2 illustrates
the advantages and disadvantages of the discussed protocols.
Table 2. The advantages and disadvantages of the proposed protocol with others protocols
Protocol Advantages Disadvantages
LEACH Improves the life-cycle of the network through us-
ing the TDMA schedule.
Selects CHs aleatory/ Uses the single hop.
Decrease energy dissipation of nodes. The number of nodes in clusters is randomly.
Decreases the no. of transmission packets. Abandoned nodes can not send their data to the BS
LEACH-C The centralization provides a better distribution. The centralization method needs an extra energy.
Achieves a large no. of turns in a minor area Uses the single-hop technique.
CH selection in accordance to remaining power. The number of nodes in each cluster is unbalanced.
Abandoned nodes data can not achieve the BS.
BRE-LEACH Enhances the network lifetime. No. of nodes in clusters is unbalanced.
CH choice depending on the residual energy. Abandoned nodes can not send their data to the BS.
Chooses a root CH according to the residual energy
and the distance to the BS
All CHs send aggregated data to the root even if the
BS is closer than the root.
The Proposed Protocol CH selection according to the remaining energy.
No. of nodes in cluster can not exceed a maximum. Abandoned nodes send data directly to the BS.
Abandoned nodes can send data to the BS. Does not consider other QoS parameters.
CHs use either the single or the multi-hop to choice
the optimal path.
6. CONCLUSION AND FUTURE WORK
In the present work, we have suggested a new approach for improving the performance of the con-
ventional LEACH protocol. Instead of selecting CHs randomly in LEACH, the developed protocol uses the
remaining energy to decide which nodes become as CH in the monitoring area. Furthermore, in LEACH, the
total amount of nodes in the clusters is not the same, which leads to an energy consumption imbalance, the
proposed protocol determines the maximum amount of nodes in every cluster. Rather than forwarding the ag-
gregated packets by CHs to the BS in a single hop, the proposed solution uses the multi-hop technique. The
result of simulation illustrates that the proposed approach prolongs the life-cycle of WSNs and decreases energy
consumption. For future extensions to this work, we intend to compare this protocol to other enhanced-LEACH
protocols. Thereby, we hope to make various enhancements in the present work such as determining the optimal
number of clusters in the network, enhancing the throughput, and other quality of service parameters.
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
3112 r ISSN: 2088-8708
REFERENCES
[1] I. Daanoune, A. Baghdad, and A. Ballouk, “An enhanced energy-efficient routing protocol for wireless sensor net-
work,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5462-5469, 2020,
doi: 10.11591/ijece.v10i5.pp5462-5469.
[2] A. Mahboub, E. M. E., M. Arioua, H. Barkouk, Y. El Assari, and A. El Oualkadi, “An energy- efficient clustering
protocol using fuzzy logic and network segmentation for heterogeneous WSN,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4192-4203, Oct. 2019.
[3] T.-P. Hong and G.-N. Shiu, “Solving the K-of-N Lifetime Problem by PSO,” International Journal of Engineering,
Science and Technology, vol. 1, no. 1, pp. 136–147, 2009.
[4] S. Alnajdi and F. Bajaber, “Determination of the K-optimal number of chains-based routing protocol formed by the
K-Means algorithm for the WSN,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS),
vol. 19, no. 2, pp. 917–930, 2020.
[5] P. A. Y and R. Balakrishna, “Implementation of optimal solution for network lifetime and energy consumption metrics
using improved energy efficient LEACH protocol in MANET,” TELKOMNIKA Telecommunication, Computing,
Electronics and Control, vol. 17, no. 4, pp. 1758–1766, Aug. 2019.
[6] N. A., N. J., and L. A. Raj, “Comparative analysis of energy based optimized dynamic source mul- tipath routing
protocol in WSNs,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 1,
pp. 441-455, Oct. 2019.
[7] C.-W. Tsai, T.-P. Hong, and G.-N. Shiu, “Metaheuristics for the Lifetime of WSN: A Review,” IEEE Sensors Journal,
vol. 16, no. 9, pp. 2812–2831, May 2016.
[8] R. K. Kodali and N. K. Aravapalli, “Multi-level LEACH protocol model using NS-3,” in 2014 IEEE International
Advance Computing Conference (IACC), Feb. 2014, pp. 375–380.
[9] I. Daanoune, A. Baghdad, and A. Balllouk, “A comparative study between ACO-based protocols and
PSO-based protocols in WSN,” in 7th Mediterranean Congress of Telecommunications, 2019, pp. 1–4,
doi: 10.1109/CMT.2019.8931320.
[10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless
microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,
vol. 1, 2000, p. 10.
[11] W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor
networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and network-
ing, 1999, pp. 174–185.
[12] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor net-
works,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, Oct. 2004, doi: 10.1109/TMC.2004.41.
[13] H. Ouldzira, H. Lagraini, M. Mouhsen, A.and Chhiba, and A. Tabyaoui, “MG-leach: an enhanced leach protocol for
wireless sensor network,” IJECE, vol. 9, no. 4, pp. 3139-3145, 2019.
[14] E. A. and I. M., “EDMHT-LEACH: Enhancing the performance of the DMHT-LEACH protocol for wireless sensor
networks,” in 16th Conference: Networking in Education and Research, 2017, pp. 1–6.
[15] M. Al-Jumaili and B. Karimi, “Maximum bottleneck energy routing (MBER) — An energy efficient routing
method for wireless sensor networks,” in 2016 IEEE Conference on Wireless Sensors (ICWiSE), 2016, pp. 38–44,
doi: 10.1109/ICWISE.2016.8187759.
[16] I. Daanoune, A. Baghdad, and A. Balllouk, “BRE-LEACH: A New Approach to Extend the Lifetime Of WSN,” in
Third Inter. Conference on Intelligent Computing in Data Sciences, IEEE, 2019, pp. 1–6.
[17] E. F. A. Elsmany, M. A. Omar, T.-C. W., and A. A. Altahir, “EESRA: Energy Efficient Scalable Routing Algorithm
for Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 96974–96983, 2019.
[18] W. Jerbi, A. Guermazi, and H. Trabelsi, “O-LEACH of Routing Protocol for Wireless Sensor Networks,”
in 13th International Conference on Computer Graphics, Imaging and Visualization, 2016, pp. 399–404,
doi: 10.1109/CGiV.2016.84.
[19] K. A. Darabkh, M. Z. El-Yabroudi, and A. H. El-Mousa, “BPA-CRP: A balanced power-aware clustering and routing
protocol for wireless sensor networks,” Ad Hoc Networks, vol. 82, pp. 155– 171, 2019.
[20] S. Smys, R. Bestak, J. I.-Z. Chen, and I. Kotuliak, Eds., International Conference on Computer Networks and Com-
munication Technologies. Springer, 2019, vol. 15.
[21] A. A. and V. M., “An extended vice-cluster selection approach to improve v leach protocol in WSN,”
in Third Int. Conference on Advanced Computing and Communication Technologies, 2013, pp. 236-240,
doi: 10.1109/ACCT.2013.60.
[22] F. X. and S. Y., “Improvement on LEACH Protocol of Wireless Sensor Network,” in International Conference on
Sensor Technologies and Applications (SENSORCOMM 2007), 2007, pp. 260–264.
[23] L. X., W. J., and B. L., “LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network,” in In-
ternational Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016, pp. 418-422,
doi: 10.1109/CyberC.2016.87.
Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
Int J Elec & Comp Eng ISSN: 2088-8708 r 3113
[24] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wire-
less microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002,
doi: 10.1109/TWC.2002.804190.
[25] J. Xu, N. Jin, X. Lou, T. Peng, Q. Zhou, and Y. Chen, “Improvement of LEACH protocol for WSN,” in 9th Interna-
tional Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 2174–2177.
BIOGRAPHIES OF AUTHORS
Ikram Daanoune is a Ph.D. student in Computer Sciences and Telecommunications, from Elec-
tronics, Energy, Automatic and Information Processing (EEA&TI) laboratory, Hassan II university,
Faculty of Sciences & Techniques (FST), Mohammedia, Morocco. She obtained her engineering
diploma on electrical & telecommunications at FST, Hassan II University, in 2018. She obtained her
license degree in electronic engineering and telecommunications, from FST, Sultan Moulay Slimane
University, in 2015. Her research interests focus on wireless sensor networks, ad hoc networks, and
routing protocols. She authored many research documents in indexed journals and conferences.
Abdennaceur Baghdad is a university professor at FST Mohammedia, Hassan II University
Casablanca-Morocco whither he educates the hyper-frequencies, electronic engineering, antenna,
and systems of telecommunication. He obtained his doctorate in Electronics from Lille University
France in 1992. He is a member of the EEA&TI laboratory at Hassan II University. He has more
than 30 years of teaching experience The research of BAGHDAD are focused on optical communica-
tion, electronic and embedded systems, telecommunication systems and information technology. He
oversees and he co-supervises many doctoral theses. He is a member of the organizing committees
of several international congresses in the same research area.
Abdelhakim Ballouk is a university professor at FST Mohammedia, Hassan II University
Casablanca-Morocco where he educates regulation & digital control, and linear & non-linear auto-
matic. He got his doctorate in Electronics from Bordeaux University France in 1992, in the automatic
domain. He is a participant of the EEA&TI laboratory at Hassan II University. He oversees and he
co-supervises many doctoral theses. His researches concentrated on Automatic (robust commands,
and predictive controls). His researches focused also in Telecommunication systems (Antenna, and
wireless sensor network).
Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)

More Related Content

PDF
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
PDF
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
PDF
Energy balanced improved leach routing protocol for wireless sensor networks
PDF
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
PDF
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
PDF
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
Energy balanced improved leach routing protocol for wireless sensor networks
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

What's hot (15)

PDF
Review on Clustering and Data Aggregation in Wireless Sensor Network
PDF
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
PDF
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
PDF
Energy balanced on demand clustering algorithm based on leach-c
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
PDF
Implementation of optimal solution for network lifetime and energy consumptio...
PPTX
energy efficient unicast
PDF
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
PDF
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
PDF
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
PDF
Iaetsd survey on wireless sensor networks routing
PDF
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
PDF
Performance evaluation of hierarchical clustering protocols with fuzzy C-means
PDF
Impacts of structural factors on
Review on Clustering and Data Aggregation in Wireless Sensor Network
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Energy balanced on demand clustering algorithm based on leach-c
A New Efficient Cache Replacement Strategy for Named Data Networking
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
Implementation of optimal solution for network lifetime and energy consumptio...
energy efficient unicast
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
Iaetsd survey on wireless sensor networks routing
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
Performance evaluation of hierarchical clustering protocols with fuzzy C-means
Impacts of structural factors on
Ad

Similar to Improved LEACH protocol for increasing the lifetime of WSNs (20)

PDF
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
PDF
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
PDF
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
PDF
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
PDF
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
PDF
Uneven clustering and fuzzy logic based energy-efficient wireless sensor netw...
PDF
Cluster Head Selection for in Wireless Sensor Networks
PDF
C04501027035
PDF
An enhanced energy-efficient routing protocol for wireless sensor network
PDF
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
PDF
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
PDF
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
PDF
6 ijcse-01222-1
PDF
29 ijaprr vol1-4-14-23kishor
PDF
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterog...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
OPTIMIZED CLUSTER ESTABLISHMENT AND CLUSTER-HEAD SELECTION APPROACH IN WSN
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
Uneven clustering and fuzzy logic based energy-efficient wireless sensor netw...
Cluster Head Selection for in Wireless Sensor Networks
C04501027035
An enhanced energy-efficient routing protocol for wireless sensor network
A CLUSTER-BASED ROUTING PROTOCOL AND FAULT DETECTION FOR WIRELESS SENSOR NETWORK
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
6 ijcse-01222-1
29 ijaprr vol1-4-14-23kishor
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Welding lecture in detail for understanding
PPTX
Construction Project Organization Group 2.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
web development for engineering and engineering
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Sustainable Sites - Green Building Construction
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Welding lecture in detail for understanding
Construction Project Organization Group 2.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Geodesy 1.pptx...............................................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
R24 SURVEYING LAB MANUAL for civil enggi
web development for engineering and engineering

Improved LEACH protocol for increasing the lifetime of WSNs

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 4, August 2021, pp. 3106∼3113 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i4.pp3106-3113 r 3106 Improved LEACH protocol for increasing the lifetime of WSNs Ikram Daanoune, Abdennaceur Baghdad, Abdelhakim Ballouk Department of Electrical Engineering, Laboratory of Electronics, Energy, Automatics and Data Processing, Faculty of Sciences and Techniques of Mohammedia, Hassan II University of Casablanca, Morocco Article Info Article history: Received Sep 5, 2020 Revised Sep 29, 2020 Accepted Dec 5, 2020 Keywords: Energy-efficiency Improved LEACH Network lifetime Routing protocol WSN ABSTRACT Recently, wireless sensor network (WSN) is taking a high place in several applications: military, industry, and environment. The importance of WSNs in current applications makes the WSNs the most developed technology at the research level and especially in the field of communication and computing. However, WSN’s performance deals with a number of challenges. Energy consumption is the most considerable for many researchers because nodes use energy to collect, treat, and send data, but they have re- stricted energy. For this reason, numerous efficient energy routing protocols have been developed to save the consumption of power. Low energy adaptive clustering hierarchy (LEACH) is considered as the most attractive one in WSNs. In the present document, we evaluate the LEACH approach effectiveness in the cluster-head (CH) choosing and in data transmission, then we propose an enhanced protocol. The proposed algorithm aims to improve energy consumption and prolong the lifetime of WSN through se- lecting CHs depending on the remaining power, balancing the number of nodes in clusters, determining abandoned nodes in order to send their data to the sink. Then CHs choose the optimal path to achieve the sink. Simulation results exhibit that the enhanced method can decrease the consumption of energy and prolong the life-cycle of the network. This is an open access article under the CC BY-SA license. Corresponding Author: Ikram Daanoune Department of Electrical Engineering Laboratory of Electronics, Energy, Automatics and Data Processing, Hassan II University FST Mohammedia-Casablanca (B.P. 146 Mohammedia 20650 Morocco) Email: ikrame.daanoune-etu@etu.univh2c.ma 1. INTRODUCTION Recently, information technology has seen enormous progress in all domains, everything has been digitized. WSN offers a better solution for efficiently gathering data from anywhere, even difficult areas where human activity is impossible [1]. Various domains use WSN to ameliorate their production or quality of service (QoS) [2]. Each sensor node has at least one sensor that serves to collect data. These micro-sensor nodes char- acterize by self-configuration and self-adaptation, generally, they are alimented by non-rechargeable batteries. Numerous applications use the WSN by reason of the weak-cost, the self-organization of nodes, the sensing ability of sensors, the miniature dimension of the node which allows it to be deployed in hard environments to supervise different types of physical and environmental conditions, easy in positioning, scattering over an large region and giant fault tolerance [3–5]. However, the WSN faces several issue related to the power source. The great use of energy in the various units of the sensor node limits the lifespan of these batteries, which limits the lifespan of the entire network because batteries are the principal reasons for the lifetime of Journal homepage: http://ijece.iaescore.com
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 r 3107 the sensor node [6]. Consequently, the major constraint within the WSN is energy consumption. Therefore, it is requisite to conserve energy in order to prolong the network life cycle. For this reason, numerous research problems are defined as optimization issues referred at discovery useful design strategies, like deployment coverage issue, data routing problem, cluster-head selection [7]. Thus several routing protocols have been scheduled by researchers to reduce the energy consumption of network nodes [8, 9]. Routing protocols are divided mainly to 3 classes: hierarchical, data-centric, and location [9] as we can see in Figure 1. Each class contains several protocols, such as LEACH [10], SPIN [11], HEED [12], MG- LEACH [13], EDMHT [14], MBER [15], BRE-LEACH [16], and so on. Among the existing and the famous routing protocols, there is LEACH protocol. LEACH has been the first and the oldest algorithm, it has been considered as it is an energy-efficient clustering protocol which partitions the network to many groups of sensor nodes. Thus, in any group, there are common nodes responsible to collect data and a randomly elected cluster head which aggregates cluster data, compresses it then transmits it toward the collector. Even if LEACH aims to extend the duration of the network, it remains limited by many constraints, such as the random selection of CHs, single-hop between CHs and the sink regardless of the space and the remaining power. To improve the energy efficiency in WSN various energy efficient routing protocol are proposed, such as EESRA [17], O-LEACH [18], BPA-CRP [19], and so forth. In this work, we suggest an ameliorated efficient-energy routing approach based on the clustering method. This work is different from other existing studies because it is based on the remaining energy to select CHs, it limits the number of nodes in each cluster which serves to balance the energy of the CHs, determines abandoned nodes that can not join any cluster in order to send their data to the sink. Then every CH chooses the optimal path to achieve the sink. Our enhanced protocol serves to prolong the life cycle of the network more than LEACH by minimizing energy consumption. The organization of the content of the present document is as pursue: the second part exposes the related work. The third part introduces the proposed work. The fourth part exhibits the simulation results of our protocol compared with the LEACH algorithm. A discussion of results is given in the fifth part. Finally, the sixth part presents a conclusion of the paper. Figure 1. Routing protocols classification 2. RELATED WORK LEACH is the fundamental and the oldest protocol of hierarchical routing protocols, focused on clus- tering [20], suggested by Heinzelman et al. in 2000 [10]. LEACH is characterized by the self-adaptation as well as the self-organization; nodes organize themselves into clusters [21]. LEACH generates clusters in the net- work and it provides a turn conception. Each turn includes two main stages. In the first stage, CHs are selected randomly according to the threshold function defined in (1), then clusters are established in self-adaptation [22]. In the second stage, it includes communication between normal nodes and their corresponding CHs, thus communication between CHs and the collector. So, this last stage presents data transmission. In the cluster formation, LEACH adopts a probability function to elect CHs. Each sensor node makes choice an aleatory value betwixt zero and one. This node turns into a CH in the present period if the random Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 3. 3108 r ISSN: 2088-8708 value is inferior to the threshold function described in (1). Otherwise, it becomes a normal node [23]. Thereby, normal nodes are looking for their CHs depending on the received signal from CHs. TL(s) = ( PL 1−PL∗(i mod(1/PL)) , s ∈ C 0 else (1) Here PL represents the CHs probability in the network, i is the number of the period; C is the number of the sensor nodes that have not become CH in the previously 1/PL iterations. In the stable stage, Once CHs are elected and clusters are formed, the data transfer begins. Every normal node gathers its environment information, forward it to its CH. When data achieve CHs, these latter aggregate their cluster data, then send them to the sink. LEACH-centralized (LEACH-C) [24] is a centralized clustering algorithm. It is an enhancement of the conventional LEACH approach. With similar to LEACH, LEACH-C splits every round into a set-up and steady-state phase. In the beginning phase, unlike LEACH, in LEACH-C the base station (BS) selects CHs at the hand of the average energy of nodes and the location. Based on this information, alone the nodes with higher energy can be a CH. Balanced residual energy-LEACH (BRE-LEACH) [16] selects CHs in terms of the remaining energy. Then, it selects the CH that has the remaining energy more than the average remaining energy and the distance to the BS less than the average distance as a root CH. This root is responsible to aggregate all CHs data and sends them to the BS. Thereby, in the BRE-LEACH, CHs use the multi-hop technique to achieve the root CH. 3. THE PROPOSED PROTOCOL In the LEACH protocol, the aleatory choice of CHs in the network results in an energy imbalance of nodes, and not all nodes have the same opportunity to become CH. Thus, in the LEACH, the LEACH-C, and the BRE-LEACH algorithms, the number of nodes in clusters is not the same, which creates an energy imbalance, CHs with more cluster members can exhaust their energy early than others. Thereby, in these protocols, nodes determine their clusters according to the power of the received signal from CHs. So, data of nodes that have not accessed any cluster cannot achieve the BS. For these causes, we propose in this paper a new LEACH-based routing protocol, it aims to minimize energy consumption and extend the network lifetime. This approach is a new approach for picking out CHs in the network depending on the residual energy of the sensor nodes and establishing clusters. Thereby, the abandoned nodes that can not reach any cluster, can also send their data to the sink. Furthermore, it proposes the multi-hop technique between CHs to choose the optimal route to the BS or the single hop directly to the sink if it is the optimal path. The proposed approach supposes that in each round, there are clusters. The proposed protocol introduces two phases: 3.1. First phase The initial phase concerns CH selection and clusters formation. To save energy in the WSN, this new approach proposes to select the CHs according to the remaining power of nodes. Thus, it forms clusters based on a determined amount of nodes. The CH formation will be every round. At the starting of every iteration, each sensor node designates an arbitrary value at interval zero and one. In case that, the chosen number is more than the threshold function defined in (2), which is proposed in [16, 25], then this sensor node will be as a common node (CN). In the other case, the sensor node will be picked out as a CH in the current iteration. Tpr(s) = ( PL 1−PL∗(i %(1/PL)) ∗ Erem Ei , s ∈ C 0 otherwise (2) Here PL represents the CHs probability in the network, i is the number of the period; C is a set of sensor nodes that have not become CH in the previously 1/PL iterations. Ei presents the beginning energy of nodes and Erem is the remaining energy at the i iteration. Once CHs are elected, common nodes are looking for their corresponding CHs according to the power of the received signal from CHs. The number of nodes in each cluster is determined Ncl in terms of the total amount of nodes in the network and the number of CH desired. Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 r 3109 Each common node constructs its table of CHs according to the received announcement message from CHs. This table contains the distance between this node and the CHs. For selecting the CH corresponding, the proposed approach suggests that the distance between the sensor node and its CH belongs will be less than the threshold distance do defined in (3), and this CH has a number of nodes less than Ncl. In this way, the node forwards a message to join the CH with the lowest distance in its table if there is a frame available in the TDMA. On the other hand, when the first cluster in the table is filled, the node does the same procedure to the second CH with the lowest distance, and so forth. d0 = s Efs Emp (3) Where, Efs is the energy consumed by the amplifier in the free space, and Emp in the multipath propagation. Once clusters are established, nodes with distances in their tables equal to or greater than do, or the availability on the TDMA schedule is not available, they can not join any cluster. These nodes called abandoned nodes (ANs). 3.2. Second phase Once the clusters are formed and ANs are determined, the second phase starts. This phase presents the data transmission phase. Each CH receives data from the cluster member (that collects information from the surrounding environment) and aggregates it. Then, every CH uses the multi-hop technique between CHs to choose the optimal path to the BS or the single hop directly to the sink if it is the optimal route. Furthermore, ANs can also send their data to the sink through the single hop. Finally, the closest CH to the sink sends its own information with the aggregated packet of others CHs to the sink. Figure 2 illustrates the flow diagram of the proposed protocol. Figure 2. The flowchart of the proposed protocol Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 5. 3110 r ISSN: 2088-8708 4. SIMULATION AND RESULTS In that part, we are used simulation to analyze and simulate the proposed protocol performance. Mat- lab simulator is used to evaluate the proposed protocol and LEACH to put up a comparative analysis between the proposed algorithm and the conventional LEACH algorithm. We considered 80 sensor nodes are distributed haphazardly in the space of 100*100 m2 . The cluster probability is 5%, and the initial energy is 0.5 Joule. We considered one BS that located outside the network with coordinates (50, 150), nodes and the BS are static, then sensor nodes are homogeneous (having the same initial energy). Table 1 summarizes the simulation parameters that we have made in evaluating the LEACH and the proposed protocol. Table 1. The simulation criterion value Parameter Value Sensor nodes Number 80 Area 100 m*100 m The cluster probability (PL) 5% Initial energy (Ei) 0.5 J BS location (x,y) (50,150) ET x = ERx 50 nJ/bit Efs 10 pJ/bit/m2 Emp 0.0013 pJ/bit/m4 Energy of data aggregation 5 nJ/bit Size of packet 4000 bits Number of rounds executed 2500 Figure 3 (a) shows the simulation results of the suggested approach as well as those of the origi- nal LEACH according to the network lifetime metric. From these results, we drew the diagram depicted in Figure 3 (b). The chart above shows a significant enhancement in the proposed protocol. In LEACH, the first node die (FND) at the iteration 846th while in the proposed protocol, the FND at the turn 609th . Furthermore, at the round 1003rd , only the half of nodes that stay alive in the LEACH protocol, whereas in the developed algorithm, the half node die (HND) at the 1714th iteration. Thereby, In LEACH, at the turn 1615th just one node stills alive, so the network is almost finished, while at this round, more than the half nodes stay alive in the proposed protocol (46 nodes). Finally, from the round 2499th , 15 nodes remain alive in the proposed approach, on the contrary, the network in LEACH is finished. (a) (b) Figure 3. The network lifetime in the LEACH and the proposed protocol, (a) Alive nodes in the network, (b) Diagram of dead node in the network Figure 4 compares the proposed solution against LEACH according to the remaining energy metric. The remaining energy is the difference between the initial energy and the consumed energy. From these curves, we can see that the remaining energy of total sensor nodes in the proposed protocol is gradually decrease compared to the classical LEACH approach. Then, at the round 1200, it is almost null in the LEACH while in the proposed protocol, it is still more than 15% of the initial energy of all the network nodes. From these Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 r 3111 results, we can see that the proposed protocol in this paper can optimize the energy consumption and extend the stability of the network better than the original LEACH protocol. Figure 4. Total remaining energy of nodes in LEACH and the proposed protocol 5. DISCUSSION OF RESULTS The LEACH protocol ameliorates the energy-efficiency compared to classical protocols used in WSN. The LEACH-C uses the centralization method to improve the traditional LEACH approach by enhancing the CH selection. The BRE-LEACH enhances the conventional LEACH algorithm by selecting CH according to the residual energy, and picks out a root. But each of these protocols has several limitations. Table 2 illustrates the advantages and disadvantages of the discussed protocols. Table 2. The advantages and disadvantages of the proposed protocol with others protocols Protocol Advantages Disadvantages LEACH Improves the life-cycle of the network through us- ing the TDMA schedule. Selects CHs aleatory/ Uses the single hop. Decrease energy dissipation of nodes. The number of nodes in clusters is randomly. Decreases the no. of transmission packets. Abandoned nodes can not send their data to the BS LEACH-C The centralization provides a better distribution. The centralization method needs an extra energy. Achieves a large no. of turns in a minor area Uses the single-hop technique. CH selection in accordance to remaining power. The number of nodes in each cluster is unbalanced. Abandoned nodes data can not achieve the BS. BRE-LEACH Enhances the network lifetime. No. of nodes in clusters is unbalanced. CH choice depending on the residual energy. Abandoned nodes can not send their data to the BS. Chooses a root CH according to the residual energy and the distance to the BS All CHs send aggregated data to the root even if the BS is closer than the root. The Proposed Protocol CH selection according to the remaining energy. No. of nodes in cluster can not exceed a maximum. Abandoned nodes send data directly to the BS. Abandoned nodes can send data to the BS. Does not consider other QoS parameters. CHs use either the single or the multi-hop to choice the optimal path. 6. CONCLUSION AND FUTURE WORK In the present work, we have suggested a new approach for improving the performance of the con- ventional LEACH protocol. Instead of selecting CHs randomly in LEACH, the developed protocol uses the remaining energy to decide which nodes become as CH in the monitoring area. Furthermore, in LEACH, the total amount of nodes in the clusters is not the same, which leads to an energy consumption imbalance, the proposed protocol determines the maximum amount of nodes in every cluster. Rather than forwarding the ag- gregated packets by CHs to the BS in a single hop, the proposed solution uses the multi-hop technique. The result of simulation illustrates that the proposed approach prolongs the life-cycle of WSNs and decreases energy consumption. For future extensions to this work, we intend to compare this protocol to other enhanced-LEACH protocols. Thereby, we hope to make various enhancements in the present work such as determining the optimal number of clusters in the network, enhancing the throughput, and other quality of service parameters. Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)
  • 7. 3112 r ISSN: 2088-8708 REFERENCES [1] I. Daanoune, A. Baghdad, and A. Ballouk, “An enhanced energy-efficient routing protocol for wireless sensor net- work,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5462-5469, 2020, doi: 10.11591/ijece.v10i5.pp5462-5469. [2] A. Mahboub, E. M. E., M. Arioua, H. Barkouk, Y. El Assari, and A. El Oualkadi, “An energy- efficient clustering protocol using fuzzy logic and network segmentation for heterogeneous WSN,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4192-4203, Oct. 2019. [3] T.-P. Hong and G.-N. Shiu, “Solving the K-of-N Lifetime Problem by PSO,” International Journal of Engineering, Science and Technology, vol. 1, no. 1, pp. 136–147, 2009. [4] S. Alnajdi and F. Bajaber, “Determination of the K-optimal number of chains-based routing protocol formed by the K-Means algorithm for the WSN,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 2, pp. 917–930, 2020. [5] P. A. Y and R. Balakrishna, “Implementation of optimal solution for network lifetime and energy consumption metrics using improved energy efficient LEACH protocol in MANET,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 4, pp. 1758–1766, Aug. 2019. [6] N. A., N. J., and L. A. Raj, “Comparative analysis of energy based optimized dynamic source mul- tipath routing protocol in WSNs,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 1, pp. 441-455, Oct. 2019. [7] C.-W. Tsai, T.-P. Hong, and G.-N. Shiu, “Metaheuristics for the Lifetime of WSN: A Review,” IEEE Sensors Journal, vol. 16, no. 9, pp. 2812–2831, May 2016. [8] R. K. Kodali and N. K. Aravapalli, “Multi-level LEACH protocol model using NS-3,” in 2014 IEEE International Advance Computing Conference (IACC), Feb. 2014, pp. 375–380. [9] I. Daanoune, A. Baghdad, and A. Balllouk, “A comparative study between ACO-based protocols and PSO-based protocols in WSN,” in 7th Mediterranean Congress of Telecommunications, 2019, pp. 1–4, doi: 10.1109/CMT.2019.8931320. [10] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 1, 2000, p. 10. [11] W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and network- ing, 1999, pp. 174–185. [12] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor net- works,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366–379, Oct. 2004, doi: 10.1109/TMC.2004.41. [13] H. Ouldzira, H. Lagraini, M. Mouhsen, A.and Chhiba, and A. Tabyaoui, “MG-leach: an enhanced leach protocol for wireless sensor network,” IJECE, vol. 9, no. 4, pp. 3139-3145, 2019. [14] E. A. and I. M., “EDMHT-LEACH: Enhancing the performance of the DMHT-LEACH protocol for wireless sensor networks,” in 16th Conference: Networking in Education and Research, 2017, pp. 1–6. [15] M. Al-Jumaili and B. Karimi, “Maximum bottleneck energy routing (MBER) — An energy efficient routing method for wireless sensor networks,” in 2016 IEEE Conference on Wireless Sensors (ICWiSE), 2016, pp. 38–44, doi: 10.1109/ICWISE.2016.8187759. [16] I. Daanoune, A. Baghdad, and A. Balllouk, “BRE-LEACH: A New Approach to Extend the Lifetime Of WSN,” in Third Inter. Conference on Intelligent Computing in Data Sciences, IEEE, 2019, pp. 1–6. [17] E. F. A. Elsmany, M. A. Omar, T.-C. W., and A. A. Altahir, “EESRA: Energy Efficient Scalable Routing Algorithm for Wireless Sensor Networks,” IEEE Access, vol. 7, pp. 96974–96983, 2019. [18] W. Jerbi, A. Guermazi, and H. Trabelsi, “O-LEACH of Routing Protocol for Wireless Sensor Networks,” in 13th International Conference on Computer Graphics, Imaging and Visualization, 2016, pp. 399–404, doi: 10.1109/CGiV.2016.84. [19] K. A. Darabkh, M. Z. El-Yabroudi, and A. H. El-Mousa, “BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks,” Ad Hoc Networks, vol. 82, pp. 155– 171, 2019. [20] S. Smys, R. Bestak, J. I.-Z. Chen, and I. Kotuliak, Eds., International Conference on Computer Networks and Com- munication Technologies. Springer, 2019, vol. 15. [21] A. A. and V. M., “An extended vice-cluster selection approach to improve v leach protocol in WSN,” in Third Int. Conference on Advanced Computing and Communication Technologies, 2013, pp. 236-240, doi: 10.1109/ACCT.2013.60. [22] F. X. and S. Y., “Improvement on LEACH Protocol of Wireless Sensor Network,” in International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), 2007, pp. 260–264. [23] L. X., W. J., and B. L., “LEACH Protocol and Its Improved Algorithm in Wireless Sensor Network,” in In- ternational Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016, pp. 418-422, doi: 10.1109/CyberC.2016.87. Int J Elec & Comp Eng, Vol. 11, No. 4, August 2021 : 3106 – 3113
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 r 3113 [24] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wire- less microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002, doi: 10.1109/TWC.2002.804190. [25] J. Xu, N. Jin, X. Lou, T. Peng, Q. Zhou, and Y. Chen, “Improvement of LEACH protocol for WSN,” in 9th Interna- tional Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 2174–2177. BIOGRAPHIES OF AUTHORS Ikram Daanoune is a Ph.D. student in Computer Sciences and Telecommunications, from Elec- tronics, Energy, Automatic and Information Processing (EEA&TI) laboratory, Hassan II university, Faculty of Sciences & Techniques (FST), Mohammedia, Morocco. She obtained her engineering diploma on electrical & telecommunications at FST, Hassan II University, in 2018. She obtained her license degree in electronic engineering and telecommunications, from FST, Sultan Moulay Slimane University, in 2015. Her research interests focus on wireless sensor networks, ad hoc networks, and routing protocols. She authored many research documents in indexed journals and conferences. Abdennaceur Baghdad is a university professor at FST Mohammedia, Hassan II University Casablanca-Morocco whither he educates the hyper-frequencies, electronic engineering, antenna, and systems of telecommunication. He obtained his doctorate in Electronics from Lille University France in 1992. He is a member of the EEA&TI laboratory at Hassan II University. He has more than 30 years of teaching experience The research of BAGHDAD are focused on optical communica- tion, electronic and embedded systems, telecommunication systems and information technology. He oversees and he co-supervises many doctoral theses. He is a member of the organizing committees of several international congresses in the same research area. Abdelhakim Ballouk is a university professor at FST Mohammedia, Hassan II University Casablanca-Morocco where he educates regulation & digital control, and linear & non-linear auto- matic. He got his doctorate in Electronics from Bordeaux University France in 1992, in the automatic domain. He is a participant of the EEA&TI laboratory at Hassan II University. He oversees and he co-supervises many doctoral theses. His researches concentrated on Automatic (robust commands, and predictive controls). His researches focused also in Telecommunication systems (Antenna, and wireless sensor network). Improved LEACH protocol for increasing the lifetime of WSNs (Ikram Daanoune)