Next Article in Journal
Forecasting Natural Gas Production and Consumption in United States-Evidence from SARIMA and SARIMAX Models
Previous Article in Journal
Forecast of Distribution and Thickness of Gas Hydrate Stability Zone at the Bottom of the Caspian Sea
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol

1
Department of Computer Engineering & Technology, Guru Nanak Dev University, Punjab 143005, India
2
Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab 144402, India
3
Al-Nahrain Nano-Renewable Energy Research Center, Al-Nahrain University, Baghdad 10072, Iraq
4
Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
5
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
6
Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
*
Author to whom correspondence should be addressed.
Energies 2021, 14(19), 6016; https://doi.org/10.3390/en14196016
Submission received: 26 August 2021 / Revised: 15 September 2021 / Accepted: 16 September 2021 / Published: 22 September 2021

Abstract

:
A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device with a limited quantity of energy. One of the primary roles of the sensor node is to store and transmit the collected information to the base station (BS). Thus, the life span of the network is the main criterion for the efficient design of the FANETS Network, as sensor nodes always have limited resources. In this paper, we present a methodology of an energy-efficient clustering algorithm for collecting and transmitting data based on the Optimized Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol. The selection of CH is grounded on the new optimized threshold function. In contrast, LEACH is a hierarchical routing protocol that randomly selects cluster head nodes in a loop and results in an increased cluster headcount, but also causes more rapid power consumption. Thus, we have to circumvent these limitations by improving the LEACH Protocol. Our proposed algorithm diminishes the energy usage for data transmission in the routing protocol, and the network’s lifetime is enhanced as it also maximizes the residual energy of nodes. The experimental results performed on MATLAB yield better performance than the existing LEACH and Centralized Low-Energy Adaptive Clustering Hierarchy Protocol in terms of energy efficiency per unit node and the packet delivery ratio with less energy utilization. In addition, the First Node Death (FND) is also meliorated when compared to the LEACH and LEACH-C protocols.

1. Introduction

Due to the significant need and importance of Flying Ad-hoc networks in diverse fields, such as defence, political, and industrial applications, a trend towards Wireless Sensors Network (WSN) has been seen in the last decade. WSN consists of a randomly deployed micro-sensor node collection in a given region and a minimum of one sink or Base Station (BS). The FANET contain several sensor nodes:
  • Source nodes (normal node with sensors).
  • Intermediate sensor nodes (particularly cluster heads in clustered networks).
  • BS.
Some micro-sensor nodes also assess parameters such as temperature and pollution, the physical environment, heat emitted, and many more according to the need and deployment. Nodes gather and transmit data to the BS, and then the user will receive information through the internet [1]. WSN has the following objectives:
  • To monitor and record activities within the supervised area.
  • To detect and record events inside the supervised area.
  • Evaluation based on selected standards and parameters.
Usually, WSN is a battery-powered sensor node that is neither rechargeable nor replaceable, and most of the energy is used in gathering, processing, and packet transmission. The limitation of energy consumption is the biggest constraint in WSN. Furthermore, data replication is another limitation that affects and reduces sensor nodes’ energy [2]. Thus, saving energy to improve network life is also a priority for WSN. The routing protocol is the mechanism by which the data can be moved from the source to the destination. It aims to achieve network scalability, a high data transmission rate, and energy consumption efficiency. Various routing protocols were established over recent years to prolong the network’s life by reducing the power usage by WSN.
The proposed routing protocols rely upon multiple metrics, such as the communication model, the structure of the network, and topology [1,2,3]. Clustering uses the data aggregation [2] feature to balance energy as WSN employs clustering routing protocols to achieve energy efficiency. Clustering also reduces the number of routing packets. It provides greater scalability, lower load, minimum energy usage, data aggregation, crash prevention, load balancing, latency step-down, failure resilience, greater robustness, communication assurance, and network life maximization.
FANETs are a form of Ad-hoc network configuration of unmanned aerial vehicles (UAVs). UAVs track a particular region by taking pictures, gathering other details based on their sensors, and transmitting them to the BS as a UAV-to-ground (U2G) communications system. Unlike traditional cable infrastructure used in general topology, FANETS require more critical challenges in the context of topology:
  • The best way to monitor regions, minimize cost, and maximize network efficiency.
  • Cut down the adverse impacts of the high mobility of UAVs.
  • Traditional routing protocols cannot efficiently manage flying networks due to high node mobility and topology changes.
The range and mobility of UAVs are considered the second concern after energy consumption, and these are also assumed as the primary influencers for UAV network topologies [4,5].
Therefore, it is essential that a new routing protocol be created, which takes these factors into account and handles all the topological changes in the network. Because of the many problems faced by FANETS and the air-network settings, such a paper provides a pact for routing the UAV communication mechanism known as UAV-to-UAV communication. Moreover, with the help of this framework based on the Flying Ad-hoc network protocol, it facilitates optimal contact between UAVs. LEACH [3] is one of the notable WSN clustering routing protocols. In this sensor, nodes are collected in groups called clusters, and each one chooses one cluster as the leading cluster, called the cluster head, and the remaining nodes in a cluster are called cluster members [4]. Nodes collect information from their surroundings and relay it to their CH. Data from cluster participants obtained by CH are grouped, compressed, and delivered to the sink once they have been aggregated. By decreasing the number of transmission packets through cluster construction, the LEACH protocol improves the lifespan of WSNs. However, it does not take the distance or current node energy into account while selecting the cluster head, which is considered one of the various downsides. The CH only uses a single hop when communicating with the sink, which is another downside that makes LEACH irrelevant for vast networks.
This paper proposes a protocol using LEACH, which collects inputs consisting of gathered information about UAVs. Based on such knowledge, the selection of CH and contact routes that stay active for a long time may be developed. The main aim is to find highly autonomous routes (longer operating life), residual energy, and a better probability of delivery success. The best path, best connections, and improved network capacity can be achieved from the proposed routing protocols.
This paper is disseminated as follows: Section 2 presents the background of the flying Ad Hoc Network (FANET) and the LEACH Protocol. Section 3 consists of the related work. In Section 4, our newly proposed routing protocol and the specifics of the implementation system are outlined. Section 5 covers the performance evaluation of the suggested routing protocol. Section 6 presents the conclusion and the future work.

2. Background

2.1. Flying Ad Hoc Networks (FANETS)

After the mobile ad hoc mobile (MANET), vehicular ad-hoc vehicle (VANET), and with the help of wireless sensor networks, we have been able to move and operate new devices in a self-reliant way to create more complicated structures. In FANET, devices are commonly called unmanned aerial vehicles (UAVs), and UAVs have introduced a new network paradigm by which we can innovatively perform various operations. WSN comprises an autonomous sensor nodes network for environmental detection and monitoring of the region. These sensor nodes link together to form a wireless network arbitrarily placed in the required geographical region. All sensor nodes capture data and send it to the BS through wireless communication via other SNs. Each WSN node contains the four significant elements indicated in Figure 1. The power unit (usually batteries) is the only energy source to provide all other units, as follows:
(1)
Wireless transmission unit, consisting of two modules of radio frequency for emission and reception that provide wireless connectivity for linking the node to the network.
(2)
Sensing unit, incorporating the data attained by one or more sensors, and an ADC (Analog to Digital Converter) for converting a sensor-produced analogue signal into a numerical signal.
(3)
Treatment unit, whereby the CPU, storage, and routing protocol are the main parts. This unit performs the protocols of communication that enable communication between nodes.
As FANETS results in high mobility, stronger connectivity and expansion in device zones are the essential elements that differ from its predecessor MANET. Moreover, FANETs can travel independently in a three-dimensional space. It generalizes topologies from 2D to 3D by a free movement scheme due to the ability of the drones to run in 3D, as shown in Figure 2. Such a new technique has appealed to researchers and industry because it can provide the power to drive real-life applications. FANETs are commonly used to make connections with hard-to-access sites in regions with natural hazards and for military applications. The traditional networks can scan the damage with the help of FANETs and automatically shut down after a disastrous incident (such as a seism, cyclone, storm, flood disaster, and dam breakage). In addition, UAVs can be fitted to furnish a continuous aerial view with cameras and other forms of sensors that are equipped to save lives for emergencies and help crews or firefighters. Direct contact from the UAVs to the BS on the ground can at some point be impossible in broad coverage areas.
However, hop-to-hop communication can solve this problem, whereby a routing protocol identifies the best route/path from source to destination [5]. The highly mobile UAVs ensure that the topology of the network will change over time. Thus, it is one of the critical problems to identify and manage routes [6]. Due to the routing protocols, the discovery, establishment, and maintenance of routes between two nodes through communication are possible. These protocols can reduce overhead and bandwidth usage. A FANET routing protocol is considered more complicated than fixed network protocols because of features such as the dynamic topology algorithm, mutual intervention, limited battery capacity, and the UAV’s limited resources. With the high mobility of UAVs in FANET, it is possible that a UAV may not be at a sufficient distance to communicate with one another.
Hence, it is necessary to choose alternate routes by using routing information. This link can be established across intermediate nodes in several hops. In other words, communication cannot be contained on each device’s range of action but the sum of the radius of action of each device. The mobility of a UAV is also very significant for deciding the contact pathways and their spatial structure. These routes are generally reorganized, and as a result, allow continuous movement and interconnection between the UAVs. Therefore, it is essential to dynamically carry out the routing process to make UAVs more autonomous and reduce the delay-time between the source node and a target node [7]. FANETs are widely used to track regions with images or videos by using various sensors. Therefore, it is incredibly critical for the QoE metrics to assure the consistency of the video streaming and also ensure adequate data transmission.

2.2. Low-Energy Adaptive Clustering Hierarchy (LEACH)

For WSN, the Low-Energy Adaptive Clustering Hierarchy (LEACH) is a pioneering protocol for routing in clusters. The primary purpose is to improve the efficiency of energy usage by using a random number for rotation-based CH selection. In LEACH, activities are performed in several rounds, each with two phases: The setup-phase and steady-state. During the setup-phase process of CH selection, the cluster set up and the Multiple Access Time Division (TDMA) schedule assignment for the member nodes is carried out. Each node in the selection process of the CH participates by creating a random priority value from 0 to 1. A node can become CH if the value of T(n) determined by Equation (1) is greater than the random number generated by a sensor node between 0 and 1.
T ( n ) = p 1 p ( r ) m o d ( 1 p )       n G 0 ,       O t h e r w i s e
Here, p refers to the proportion of sensor nodes required to become CHs among all sensor nodes. The current round is indicated by r, and G is the number of sensor nodes not participating in the previous 1/p rounds of the CH election. A node in round r that became the CH will not be involved in the future 1/p rounds. Such a process gives every node an equal opportunity to turn into CH and allows equal energy dissipation throughout the sensor nodes. When a node is chosen as the CH, it sends out an advertising message to all other nodes in the network, as in the basic structure of LEACH shown in Figure 3. Sensor nodes join the corresponding cluster based on the received signal strength of the advertising message and send a joint message to its CH. CHs rotate in each round by producing a new advertising message centered on Equation (1) to spread the energy load in the sensor nodes equally. Following the creation of the cluster, each CH generates a TDMA schedule and distributes it to the cluster’s members.
The TDMA schedule prevents data collisions between member nodes and allows one to go into sleep mode. If every sensor node recognizes its TDMA schedule, the set-up process is considered complete. The steady-state phase follows the set-up process. The TDMA schedule transmits sensed data from member nodes to the CH and from the CH to the BS in the steady-state process. Throughout their allotted time slot, the member nodes submit data to the CH. When one cluster member node transmits data to the CH during its allotted period, another cluster member node goes to sleep. LEACH’s property eliminates collisions between clusters and energy dissipation, extending the battery life of all participant nodes. In addition, CHs gather and transfer data to BS directly from their cluster’s members. Data are also transmitted from the CH to the BS using the TDMA plan that has been assigned. For data transmission, the CH detects the channel’s states and waits if the channel is busy (another CH is using it); otherwise, it uses the channel to send data to the BS. Generally, LEACH is a fully distributed routing protocol. As a result, the protocol demands no extra information. The following are the key advantages of LEACH:
  • The clustering in the LEACH protocol reduces the amount of energy used for communication between sensor nodes and the BS, extending the network’s longevity.
  • Data aggregation used by CH saves a significant amount of energy by reducing the associated data locally.
  • Nodes in the network are placed into sleep mode, which does not get a TDMS slot as CH assigned TDMA schedules. Thus, collisions within the cluster are prevented, and the sensor node battery life is extended.
  • Every sensor node in the LEACH protocol has an equal probability of becoming the CH at least once. This randomized rotation of the CH increases the network lifespan.
However, LEACH, on the other hand, has several drawbacks, which are as follows:
  • At the end of each cycle, the CH is selected at random from all sensor nodes. There would be an equal chance for both high-energy sensor nodes and low-energy sensor nodes to attain the tag of CH. If the CH is picked as the sensor node with the least energy, it will expire fast, the network’s resilience is harmed, and the network’s lifespan is reduced.
  • LEACH does not guarantee the position and quantity of CHs in each round. In a basic LEACH, cluster formation is random, resulting in an unbalanced distribution of clusters in the network.
  • CH’s position in some clusters may be in the center of the clusters, while in others, the CH’s location may be towards the cluster’s edges. As a result, intra-cluster communication in this circumstance consumes more energy and reduces the sensor network’s overall performance.
CH and BS communicate via the LEACH protocol using Single-Hop communication, as remote CHs consume more energy than CHs close to the BS. Thus, energy is dissipated unevenly, reducing the sensor network’s lifespan.

3. Related Work

The selection of the CH based on residual energy is crucial as it affects network performance and lifetime. The network life duration will be extended if the chosen CH is a sensor node with the highest energy leftover among all the cluster members. LEACH-B (LEACH-Balanced) [6,7] is proposed as an improved variant of LEACH, which keeps the number of CHs practically optimal [8]. LEACH-B is a decentralization technique for the development of clusters that improves the choice of the CHs process, based on the residual energy of the nodes. LEACH-B is initially the same as the LEACH methodology, but in the case of CH selection, it adds a second phase that takes into account the remaining energy and ensures that each round has an equal number of CH.
The improved LEACH (I-LEACH) is a clustering routing system [9] in which the selection of CHs is based on residual energy, node location, and neighbors’ numbers. The CH selection in the original LEACH algorithm is solely based on the pre-set threshold function, with no consideration for other parameters that affect the network’s life duration. The I-LEACH solution solves this problem by incorporating the residual energy, the count of neighbors’ nodes, and the distance to the BS factors in the threshold function.
LEACH-C is a centralized LEACH clustering method [10] that picks CHs based on the remaining energy of nodes and thus builds clusters in the network. LEACH-C employs a centralized technique to select the most proficient CH from a pool of nominated CHs, thereby addressing the efficiency issue raised by the conventional LEACH protocol [11]. Sensor nodes send information to the sink about their remaining energy and position in the first phase. The sink computes the average energy of nodes grounded on these data and then determines which nodes will be CHs. As a result, in this round, nodes with more leftover energy than the average will be chosen as CHs. The rest become various regular sensor nodes, and the steady phase is the same as LEACH.
The mobility element in the standard LEACH algorithm is included in LEACH-M (Mobile LEACH) [12]. During the set-up and steady phases, this mobility affects both CHs and cluster member nodes, although the BS is assessed as stationary in the original LEACH. CHs are selected from the pool of nodes according to the least attenuation and are the nodes with minimum mobility among all nodes. The elected CHs then communicate their choice in the transmission frequency to all nodes. According to LEACH-M authors, all nodes are initially homogeneous, and GPS may be used to search for sensor nodes. LEACH-M elects CHs using the same threshold function as LEACH; however, unlike LEACH, LEACH-M considers node mobility during the data transmission step.
In [13], the authors suggested VH-LEACH, an upgraded V-LEACH technique. The main goal of this protocol is to modify the way a CH is elected. The CH is chosen in the VH-LEACH algorithm based on the largest residual energy. First, clusters are formed, and then CHs are selected. Every CH collects information about the cluster members’ remaining energy. Following that, the CH selects a VH (Vice Cluster-Head) with the max left-over energy within the cluster.
In [14], the authors presented LEACH-T, a unique LEACH-based clustering routing protocol that allows the number of time slots in TDMA of each CH to be fixed based on the count of cluster member nodes. LEACH-T takes into consideration the residual energy of nodes throughout the cluster formation phase, resulting in an optimum number of CHs. T-LEACH incorporates changeable time slots for different CHs in the steady phase. In the LEACH-T approach, a dynamic mechanism to assign time slots (TDMA) depending on the number of cluster members is used instead of on a certain fixed allocation of time slots to CH. This means that if the number of nodes inside the cluster is minimal, the CH should only be allocated a few time slots and major time slots should be allocated if the number of member nodes is enormous. As a result, it may either transfer data from CHs from a single hop or use multi-hop to the sink.
In [15], the authors proposed a Time-based Cluster-Head Selection Algorithm for LEACH (TB-LEACH), which alters the CH selection process to maximize the network’s life cycle. Set-up and steady stages are the two primary phases of TB-LEACH. Instead of the random selection of CHs used in LEACH, the TB-LEACH algorithm picks CHs based on a random timer in the first phase. The number of CHs in each round is fixed, unlike LEACH, and is denoted by a counter. The TB-LEACH (Time-based LEACH) was introduced by [15] to modify the process of CH selection for enhancing a network’s life cycle. The two main phases of TB-LEACH are establishment and steady steps. The TB-LEACH algorithm selects CH based on a random timer in the first phase instead of the random selection of CHs used in LEACH. As opposed to LEACH, in each round, the number of CHs is fixed and indicated by a counter. If the random duration expires and the counter fails to reach the required number of CHs, the node broadcasts a CH-ADV advertisement message to all nodes in the current round, announcing that it has become a CH via CSMA, even if the node is not a CH node (normal node). Following the determination of CHs, the remaining tasks are identical to the LEACH algorithm.
In [16,17,18,19], the authors the Energy-Aware Distance-based Cluster Head selection and Routing (EADCR) to extend the network lifespan of WSNs using the Fuzzy C-Means (FCM), residual energy of nodes, Euclidean distance from the BS, and cluster centroid. Clusters are formed in the EADCR by employing the FCM method at the BS. Then, using a fitness function, each cluster chooses its CH, and the initial energy and residual energy of all nodes influence the fitness function. Table 1 shows a comparison of LEACH descendants, Table 2 describes advantages and disadvantages, and in Table 3, a comparison is conducted on the basis of various parameters.

4. Proposed Methodology

This paper suggests an energy consumption management methodology based on the LEACH protocol to solve the energy overloading issue. This protocol also functions with the concept of around. The period between attaining a new clustering and data collection was repeatedly carried out with this new clustering known as around. The suggested clustering protocol follows the same two phases as in the existing LEACH protocol. The first is the setup phase, in which the establishment process of clusters and the selection of CHs (cluster head) are exerted, and the steady-state phase deals with the data transmission but with specific enhancements. Each node determines whether to become a cluster head for the current round during the setup phase. If the number of cluster heads is decreased, then every cluster head would occupy a wider area, which will cause a problem as certain cluster members will be far from their cluster heads and use a lot more energy for communication [20]. The exceeding count of cluster heads will heighten the entire network’s energy consumption and expurgate network life due to the connection among the CH. The BS requires much more power than ordinary procedures. The CH is chosen according to the threshold value with specific energy-dependent characteristics, but in the original LEACH protocol, the CH is selected randomly without energy usage. Therefore, to achieve minimal energy consumption, it is crucial to select the optimal cluster and cluster head [21].

4.1. Setup Phase

4.1.1. Cluster Formulation and Cluster Head Selection

In our recommended protocol, all nodes are presumed as a separate cluster, and all nodes instituting a cluster are candidates for CH selection shown in Figure 4. In the process of selecting CH, all CH applicant nodes also require their current energy and residual energy information in addition to the existing LEACH protocol threshold T(n) [22]. This is done to reduce the chance of selecting a node with low energy and to match the network’s overall energy load distribution. If a low energy node is selected as a CH, it might induce the imbalanced use of the overall energy of the network. By picking a random number between 0 and 1 for all regular nodes, if the selected number is less or equal to the T(n) value, which Equation (1) can obtain, then the node becomes a cluster head for the current round’ otherwise, a node will remain as an ordinary node in a cluster.
T ( n ) = p 1 p ( r ) m o d ( 1 p ) D x       n G 0 ,       O t h e r w i s e
In this equation, p refers to the proportion of sensor nodes required to become CHs among all sensor nodes, r is the current round, and G is the set of candidate nodes for the cluster head that has not been picked as a CH in the past 1/p rounds.
D x = [ R e D r A R e A D r ]
Re is the residual energy of the node in the network calculated by Equation (3), Dr is the drain rate of the node (the method to report the rate at which energy is degenerated at a specified node)m and A R e and A D r are the average residual energy and average drain rate.
The function to compute the residual energy of the nodes in the network is as follows:
Rei = (INTiCETi)
where INTi is the Initial energy of a node and CETi is the current energy.
A node selects a CH nearest to it rather than choosing a CH that is closest to the base station. The distance between the node to every CH and further every CH to the Base station is calculated. To calculate the distance between each node and the CH, and the CH and the BS, we calculated the Euclidean distance.
The minimum distance formula between two locations in the xyz-space is stated as the square root of the sum of the squares of the differences between corresponding coordinates.
When a node has chosen a cluster head with a minimum distance, the cluster head receives a message stating that the distance is minimal and that it will be part of the cluster. This procedure is repeated for all of the nodes, or for the number of rounds necessary, before choosing the right cluster head for them as shown in below mentioned Algorithm 1.
Algorithm 1 for Setup Phase:
Some Notations used in algorithm:
NN: Numbers of nodes      CH: Cluster Head
BS: Base station           N: For Every node
START
All N in NN has probability to be selected as CH
For Every Node (N), where N ∈ NN
  For every N select random number between 0 and 1
    If (Select random number <= T(n))
      Then N is selected as CH and N broadcast a message of its CH status
    Else
      N become Ordinary Node
      N receive Message by other about their CH status
    End of if
End of for loop
For Every CH (Procedure to Select Min Distance between N and CH and CH to BS)

   Each node Select CH with Min distance to reach BS
   After previous step Node become a part of selected CH

End of for loop
For Every CH
   TDMA Schedule is constructed for each node(N) to Transfer data
   CH send information about the TDMA schedule to each Node(N)
End of for loop

4.1.2. Steady-State Phase

Following the sending of a petition message from ordinary nodes, the cluster heads execute the Time-division multi-access (TDMA) procedure for every node. The TDMA scheduling gives every member node a timescale and ensures that each node is permitted to send in its particular time frame only or is permitted to wait and go into sleep mode, by which the set-up phase is completed.
The steady-stage phase begins after the setup stage ends, identically as in the LEACH protocol. However, in our proposed protocol, we added a feature to prevent redundant data from being sent to the base station. As in this, common nodes collect data from the local surroundings. Each node then transmits the collected data to the CH, which was previously selected in the setup phase and is in its own allocated TDMA time slot. The steady-stage phase begins after the setup stage ends, identically as done in the LEACH protocol. However, in our proposed protocol, we had added a feature to preclude surplus data [23,24] from being sent to the base station. The CH combines collected data from its various parts, and a data compression algorithm is executed to commingle the data. Now, on the compressed data, an essential XOR operation is executed on the data sensed by the neighbor nodes to prevent the CH from sending duplicate data to the BS. In the XOR procedure, the scrambling of data in bits is done. In this, the data that produces the result as ‘True’ are considered duplicate, and the opposite with a ’False’ outcome case. The duplicate collected data will not be sent if the data sent out are identical as compared bit by bit [23]. Thus, it avoids sending duplicate data again and also decreases the amount of data sent to BS. Hence, as a result, the entire network will use less energy. The energy consumed for data transmission is determined through the cluster head involvement and estimated by equation [24,25,26,27,28] below.
T o t a l E R ( P a c k e t d a t a , d ) = E c ( P a c k e t d a t a ) + E f s t ( P a c k e t d a t a ) d 2
T o t a l E R ( P a c k e t d a t a , d ) is the reduction of energy, which is carried out while sending packet data, E c is the amount of energy reduced through the transmitter and receiver circuit, Efst is the amplifier parameter for transformation constituting the free-space technique, and d is the distance between the CH and the ordinary node (Euclidean distance).
The degree of reduction in energy is calculated by the equation mentioned below:
T o t a l E R ( P a c k e t d a t a , d )   =   E c ( P a c k e t d a t a ) + m p   ( P a c k e t d a t a ) d 2
mp is the amplifier parameter for transformation constituting the multi-path fading model.

5. Experimental Results, Analysis, and Discussion

This section of results and discussions presents the performance evaluation and comparison between our proposed LEACH-EE protocol with LEACH and LEACH-C protocols. We use some essential metrics for the evaluation process, such as the cluster headcount and the building time for a cluster, energy usage, network lifetime, and the probability of success. In this experimentation, we use MATLAB as a simulation environment. Table 4 shows other parameter settings for the simulation process.
One hundred FANETS are set up arbitrarily in the area of 100 m × 100 m square meters. As depicted in Figure 5, the BS node is placed at position (50, 50).

5.1. Number of Clusters

Optimizing the clustering number would result in more efficient energy usage as it will automatically minimize energy consumption. Moreover, if the number of clusters is below the optimum value, more nodes are further away from CHs, causing more rapid network energy consumption. If cluster numbers exceed the optimum number, this will result in a high number of CHs required to send data to the BS covering long distances. In Figure 6, all three protocols are compared, and the relationship between several cluster and node placements can also be seen in Figure 5.

5.2. Consistency in Number of Cluster Head

The number of cluster heads highly impacts the energy efficiency of the protocol. If the count of cluster heads is small, the data transmission period of sensor nodes to CH would be too long, leading to additional energy consumption. Excess data transmission by the cluster will also lead to overconsumption of energy. The overall network load increased as the number of cluster heads grew. Even with this, the total energy consumption per round of networks had also been raised. It degrades the network fusion efficiency of data, and the life of the network shrinks.
Figure 7 exhibits the details about the LEACH Protocol, the LEACH-C Protocol, and our proposed EE-LEACH protocol headcounts per round. The variation in the cluster head number can be seen in the figure below as the LEACH Protocol has high fluctuation in the cluster head number due to the cluster headcount being randomly dependent on the threshold function model, which has high randomness. From Figure 7, we can see that the cluster headcount fluctuates in the range of 4 ≤ k ≤ 16 in the LEACH protocol, 2 ≤ k ≤ 14 in LEACH-C, while in the proposed protocol it is 3 ≤ k ≤ 10, which is the most optimal. The proposed protocol calculates the optimal cluster headcount based on the threshold that includes some energy parameters, thereby helping in reducing the randomness of cluster headcounts.
If a significant number of dead nodes are present in the network, the overall capacity of the cluster will be decreased accordingly to balance the energy consumption of the network.

5.3. Cluster Lifetime

A life cycle for a cluster is the cumulative time from creation to disposition for the cluster. When the clustering algorithm is executed, the FANETS node with the most appropriate value is elected as CH and takes over the cluster’s task. We can track the life cycle of the FANET’s nodes with a measurement parameter with two parts, a stable period and an irregular period. However, in our case, we mainly use the time between the first node death and the last node death, which is known as the unstable period. FANETS are mainly used for environmental monitoring as a wide range of sensor nodes are deployed over a wide distribution of area. If a large number of nodes dies, the collected information would not be able to reach its destination. The time from the FND to the last death node (LND) indicates that the period is uncertain. These strategies can be employed in environmental surveillance and disaster management since a broad area is needed to place sensor nodes. The wide range means that specific data obtained cannot effectively evaluate the surrounding factors in the case of the death of many nodes.
This research also analyzes network life using FND and shows several clear advantages while evaluating our proposed methodology compared to the two protocols. As shown in Figure 8, the FND has 1710, 2022, and 2618 rounds and LND has 2343, 2786, and 3990 under three protocols. Compared with LEACH and LEACH-C, our proposed algorithm increased FND by 53% compared with LEACH and 30% compared to LEACH-C.

5.4. Residual Energy

The energy utilization of nodes is categorized primarily into three sections: Data transfer, data receipt, and cluster negotiation communication. The more extended nodes that are alive, the more uniform energy usage there will be. The result is that the energy usage by the proposed protocol is highly consistent compared to LEACH and LEACH-C, as shown in Figure 9. The approach suggested in the paper decreases energy consumption across the clusters and energy consumption within the cluster.

5.5. Probability of Delivery Success

Energy is one of the best and most efficient properties for FANETS nodes. FANETS usually have a small dry-cell battery and can operate for only a couple of minutes, about 30 to 50 min. The broad application of these FANETS is affected by this limited amount of energy. Optimizing energy in these nodes is hugely beneficial to improving the durability of FANETS.
The energy used by various sensors, the energy used for communication between FANETS, and the power used for motor control to carry UAVs into the air are the three mechanisms in the Flying Adhoc network that use the most energy. The most crucial factor for optimizing the energy in FANETS is the probability of success in delivering the packet to the Base station. This parameter indicates how successfully the packet is delivered to the intermediate nodes based on an average number of packets received by the BS. As shown in Figure 10 and Figure 11, our proposed protocol can send up to 75% of packets to BS, the LEACH and LEACH-C success rates are 9% and 16%. In our proposed protocol, it can be seen that efficiently selecting CH increases the network density and increases the probability of success for delivering a packet to BS. This is because, with the optimal number of clusters and optimal CH selection in a network, the packet drops ratio decreases.

6. Conclusions

Today, wireless sensor networks are commonly employed in several sectors, and the research focus on wireless sensor networks was always directed towards the LEACH protocol. This paper presents a solution that employs an enhanced version of the LEACH protocol known as EE-LEACH in which the issues of the standard LEACH protocol are addressed and had tried to remove them efficiently. First, for the total energy usage each round, the appropriate number of cluster heads is estimated. This trial reveals that the methodology presented can regulate the headcount of clusters to vacillate between 3 ≤ k and ≤ 10. The EE- LEACH protocol successfully boosts FND to 1710 rounds and enhances its network life by 118 percent compared to the conventional LEACH and LEACH-C.
Moreover, it increases the proportionality of data packets received through BS. As nodes’ energy consumption is considered more balanced, there are many death nodes, which will not affect the total power usage as only 2.00174 × 10−4 J is consumed per node unit because there are no more than 10 clusters in total. This approach presents a novel CH selection and packet routing threshold function that includes the node’s residual power. We have seen that, while comparing with other algorithms like LEACH and LEACH-C, EE-LEACH delivers better outcomes in terms of network life, residual energy, and reliability.
In the future, it is worth studying the optimization of multiple paths as this work is only intended to improve the life cycle of WSNs and minimize data transmission energy usage. We had considered a flat environment, but we tried to implement this in a 3D and multidimensional environment in our plan. Thus, the LEACH protocol should also be enhanced in future research utilizing a combination of some intelligent algorithms of AI or machine learning algorithms. Furthermore, we will attempt to offer a clustered routing protocol that addresses as many challenges as possible, including QoS parameters, additional security, and tolerating faults, particularly in the situation of dead CH, with the least amount of complexity. Finally, we will also consider modulation and coding strategies in the future to make the network more efficient and more reliable. This study can also be extended to the evaluation and assessment of microfluidics, which further offers numerous benefits in various disciplines such as biology, chemistry, and medical diagnostics [29].

Author Contributions

Conceptualization: S.B. (Salil Bharany), S.S.; methodology: S.B. (Sumit Badotra); validation: O.I.K., Y.A.; formal analysis: S.A. and F.A.; investigation: S.B. (Salil Bharany), S.B. (Sumit Badotra), S.S.; resources: S.B. (Salil Bharany); data curation: S.S.; writing original draft preparation: S.B. (Salil Bharany); wrting review and editing: S.B. (Salil Bharany), S.S., S.B. (Sumit Badotra), Y.A.; visualization: S.B. (Salil Bharany); supervision: S.S., Y.A.; project administration: O.I.K., Y.A., F.A., S.B. (Sumit Badotra), S.S.; funding acquisition: S.A., F.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Taif University, TURSP-2020/150.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The study did not report any data.

Acknowledgments

We deeply acknowledge Taif University for supporting this study through Taif University Researchers Supporting Project Number (TURSP-2020/150), Taif University, Taif, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Santhosh Kumar, G.; Paul, M.V.; Vinu, K. Poulose jacob, mobility metric based LFACH-mobile protocol. In Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, IFFF, Chennai, India, 14–17 December 2008; pp. 248–253. [Google Scholar]
  2. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. Energy-Efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; p. 8020. [Google Scholar] [CrossRef]
  3. Beiranvand, Z.; Patooghy, A.; Fazeli, M. I-LEACH: An efficient routing algorithm to improve performance & to reduce energy consumption in Wireless Sensor Networks. In Proceedings of the The 5th Conference on Information and Knowledge Technology, Shiraz, Iran, 28–30 May 2013; pp. 13–18. [Google Scholar] [CrossRef]
  4. Badotra, S.; Panda, S. Snort based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. Clust. Comput. 2020, 24, 501–513. [Google Scholar] [CrossRef]
  5. Zafar, W.; Khan, B.M. Flying ad-hoc networks: Technological and social implications. IEEE Technol. Soc. Mag. 2016, 35, 67–74. [Google Scholar] [CrossRef]
  6. Tong, M.; Tang, M. LEACH-B: An improved leach protocol for wireless sensor network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010; pp. 1–4. [Google Scholar] [CrossRef]
  7. Badotra, S.; Sundas, A. A systematic review on security of E-commerce systems. Int. J. Appl. Sci. Eng. 2021, 18, 1–19. [Google Scholar]
  8. Yang, B.; Liu, M.; Li, Z. Rendezvous on the fly: Efficient neighbor discovery for autonomous UAVs. IEEE J. Sel. Areas Commun. 2018, 36, 2032–2044. [Google Scholar] [CrossRef]
  9. Kaur, A.; Grover, A. Leach and extended leach protocols in wireless sensor network-a survey. Int. J. Comput. Appl. 2015, 116, 1–5. [Google Scholar] [CrossRef]
  10. Sahoo, B.M.; Amgoth, T.; Pandey, H.M. Particle swarm optimization based energy efficient clustering and sink mobility in heterogeneous wireless sensor network. Ad Hoc Networks 2020, 106, 102237. [Google Scholar] [CrossRef]
  11. Kaur, M.; Munjal, A. Data aggregation algorithms for wireless sensor network: A review. Ad Hoc Networks 2020, 100, 102083. [Google Scholar] [CrossRef]
  12. Xiuwu, Y.; Qin, L.; Yong, L.; Mufang, H.; Ke, Z.; Renrong, X. Uneven clustering routing algorithm based on glowworm swarm optimization. Ad Hoc Networks 2019, 93, 101923. [Google Scholar] [CrossRef]
  13. Kim, D.-S.; Chung, Y.-J. Self-Organization routing protocol supporting mobile nodes for wireless sensor network. In Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS’06), Hangzhou, China, 20–24 June 2006; Volume 2, pp. 622–626. [Google Scholar] [CrossRef]
  14. Mehmood, A.; Mauri, J.L.; Noman, M.; Song, H. Improvement of the wireless sensor network lifetime using LFACH with vice-cluster head. Ad-Hoc. Sens. Wirel. Netw. 2015, 28, 1–17. [Google Scholar]
  15. Jin, G.C. An improvement routing protocol based Lfach for wireless sensor netw. Appl. Mech. Mater. 2014, 614, 472–475. [Google Scholar]
  16. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An improved energy-efficient routing protocol for wireless sensor networks. Sensors 2019, 19, 4579. [Google Scholar] [CrossRef] [Green Version]
  17. Badotra, S.; Panda, S. Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Clust. Comput. 2019, 23, 1281–1291. [Google Scholar] [CrossRef]
  18. Sumit, B.; Panda, S.N. A survey on software defined wide area network. Int. J. Appl. Sci. Eng. 2020, 17, 59–73. [Google Scholar]
  19. Vinodhini, R.; Gomathy, C. Momhr: A dynamic multi-hop routing protocol for WSN using heuristic based multi-objective function. Wirel. Pers. Commun. 2019, 111, 883–907. [Google Scholar] [CrossRef]
  20. Lin, D.; Wang, Q.; Lin, D.; Deng, Y. An energy-efficient clustering routing protocol based on evolutionary game theory in wireless sensor networks. Int. J. Distrib. Sens. Networks 2015, 11, 409503. [Google Scholar] [CrossRef] [Green Version]
  21. Khalaf, O.I.; Sokiyna, M.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Web attack detection using the input validation method: DPDA theory. Comput. Mater. Contin. 2021, 68, 3167–3184. [Google Scholar] [CrossRef]
  22. Subahi, A.F.; Alotaibi, Y.; Khalaf, O.I.; Ajesh, F. Packet drop battling mechanism for energy aware detection in wireless networks. Comput. Mater. Contin. 2021, 66, 2077–2086. [Google Scholar]
  23. Alotaibi, Y. A new database intrusion detection approach based on hybrid meta-heuristics. Comput. Mater. Contin. 2021, 66, 1879–1895. [Google Scholar] [CrossRef]
  24. Li, G.; Liu, F.; Sharma, A.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Research on the natural language recognition method based on cluster analysis using neural network. Math. Probl. Eng. 2021, 2021, 9982305. [Google Scholar] [CrossRef]
  25. Alsufyani, A.; Alotaibi, Y.; Almagrabi, A.O.; Alghamdi, S.A.; Alsufyani, N. Optimized intelligent data management framework for a cyber-physical system for computational applications. Complex Intell. Syst. 2021, 1–13. [Google Scholar] [CrossRef]
  26. Veeraiah, N.; Khalaf, O.I.; Prasad, C.V.P.R.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021, 9, 120996–121005. [Google Scholar] [CrossRef]
  27. Suryanarayana, G.; Chandran, K.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A. Accurate magnetic resonance image super-resolution using deep networks and gaussian filtering in the stationary wavelet domain. IEEE Access 2021, 9, 71406–71417. [Google Scholar] [CrossRef]
  28. Salem, A.O.A.; Shudifat, N. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquitous Comput. 2019, 23, 901–907. [Google Scholar]
  29. Gagliano, S.; Cairone, F.; Amenta, A.; Bucolo, M. A real time feed forward control of slug flow in microchannels. Energies 2019, 12, 2556. [Google Scholar] [CrossRef] [Green Version]
Figure 1. WSN units.
Figure 1. WSN units.
Energies 14 06016 g001
Figure 2. Basic FANET Structure.
Figure 2. Basic FANET Structure.
Energies 14 06016 g002
Figure 3. LEACH Clustering Structure.
Figure 3. LEACH Clustering Structure.
Energies 14 06016 g003
Figure 4. Basic structure of the proposed protocol.
Figure 4. Basic structure of the proposed protocol.
Energies 14 06016 g004
Figure 5. Distribution of network nodes. Energies 14 06016 i001 represents the BS and is considered as ordinary sensor nodes.
Figure 5. Distribution of network nodes. Energies 14 06016 i001 represents the BS and is considered as ordinary sensor nodes.
Energies 14 06016 g005
Figure 6. Number of clusters vs. number of nodes.
Figure 6. Number of clusters vs. number of nodes.
Energies 14 06016 g006
Figure 7. Number of cluster heads vs. number of rounds.
Figure 7. Number of cluster heads vs. number of rounds.
Energies 14 06016 g007
Figure 8. Lifetime vs. rounds.
Figure 8. Lifetime vs. rounds.
Energies 14 06016 g008
Figure 9. Residual energy vs. rounds.
Figure 9. Residual energy vs. rounds.
Energies 14 06016 g009
Figure 10. Delivery Success.
Figure 10. Delivery Success.
Energies 14 06016 g010
Figure 11. Packet success ratio.
Figure 11. Packet success ratio.
Energies 14 06016 g011
Table 1. Comparison of LEACH descendants.
Table 1. Comparison of LEACH descendants.
ProtocolDescriptionResearch FocusModelling Criteria
LEACHBasic approachLoad balancingEnergy saving
LEACH-BLEACH-B ensures a near-optimal number of CHs in each turn. After that, it considers the leftover energy when selecting CHs after the first round.Equilibrating the count of CHLeft over energy
LEACH-CThe BS uses a centralized algorithm to generate clusters and elect CHs based on node location and leftover energy.Varying in CHPosition of BS and persisting energy of nodes
LEACH-MFor data transmission to the BS, LEACH-M makes use of both conventional nodes and CH mobility. As a result, it’s well-suited to mobile surroundings.Mobility and status of nodesMobility factor
LEACH-ICHs are chosen based on the amount of energy left, the position of the nodes, and the number of neighbors they had. The leftover energy is then used to update the threshold function. As a result, I-LEACH calculates the ideal cluster size.Efficiency of energyResting energy, Neighbors number and node’s location
LEACH-VHCHs are chosen based on left over energy, and when the remainder energy of a cluster head reaches a certain level, a VH node takes over as the CH.Multiple CHs in the clusterResting energy
LEACH-TLEACH-T analyses leftover energy while forming clusters and envisions a network with the optimal number of CHs.Optimum Count of CHsResting energy
LEACH-TBAlways a predetermined number of CHs is there. Thus, TB-LEACH CHs depend on a random timer for selection.Cluster head varying Random timer
Improved-LEACHDistance and left-over energy are two criteria in the selection of CHs.Efficiency of energyDistance from node to BS
EADCRImprove network life by employing the FCM method to set up clusters and choose CHs using a fitness function that relies on the Euclidean distance and nodes ‘s remaining energy.Efficiency of energyEuclidean distance and left-over energy
BN LEACHThis model for choosing CHs use the Bayesian Network.Balancing the loadDensity, distance and residual energy
Table 2. Advantages and weaknesses of various LEACH protocols.
Table 2. Advantages and weaknesses of various LEACH protocols.
ProtocolCategoryAdvantagesLimitations
LEACHResidual energy—Enhances the network’s life cycle by utilizing the TDMA schedule.
—Balancing energy usage.
—The number of packets for communication is decreased.
—Reduces nodes’ energy discharge.
—Assuming that CH nodes are not uniformly deployed.
Random election of CH.
—The number of nodes is not distributed evenly in each cluster
—Uses the single hop.
LEACH-B—Consistent Count of CHs.
—Considers leftover energy after the initial turn
—Improves the longevity of the network.
—Growth in overhead cost.
LEACH-CCentralized—optimum no. of clusters.
—high no. of turns in a small network zone
—The residual energy is the key for CH selection.
—The strategy of centralization provides better distribution of CHs.
—Needs location information of nodes. Centralization brings in an overhead on the Base station.
—The single hop transmission adds an additional overhead
LEACH-MMobility—CHs as well as non-CH node as high mobility.
—An extremely efficient in terms of energy
—Supplementary overhead.
LEACH-IResidual energy—Chose CH grounded on the left-over energy and node’s location. —CH combines received data to save costs of further data transfer, but nodes that receiving different data it is not practical.
LEACH-VHEnergy efficiency—CHs selection on the fundament of the leftover energy.
—Substitutes CH by VH node when the main CH attains a threshold.
—Supplementary treatment for VH node.
—Drives data from CHs to Bs in a single hop.
LEACH-T—Determines the number of time slots in TDMA based on the number cluster members.
—Bids an optimum count of clusters.
—CHs are selected randomly.
LEACH-TB—Enhances the network’s life cycle and the CHs count is fixed—Grounded on a random timer CHs selection is carried out.
Improved-LEACHDistance—Enhancing network performance through optimal CH selection.—Complexity of calculation
EADCR—Improve the network lifespan—CH selection is a complex process
BN LEACH—Execute better than other—High complexity
Table 3. Comparison based on certain metrics.
Table 3. Comparison based on certain metrics.
ProtocolNo of CH’sCH SelectionNo of Nodes in ClusterCluster MethodMobility ScalabilityEnergy EfficiencyResiduary EnergyLocalization
LEACHIndeterminateRandomIndeterminateDisseminatedStaticFixedHighNoNo
LEACH-BDeterminateRandom, Residual EnergyIndeterminateDisseminatedStaticEffectiveVery HighYesYes
LEACH-CDeterminateResidual EnergyIndeterminateCentralizedStaticEffectiveVery HighYesYes
LEACH-MIndeterminateResidual Energy, MobilityIndeterminateDisseminatedMobileVery effectiveVery HighYesYes
LEACH-IDeterminateResidual Energy,IndeterminateDisseminatedStaticVery effectiveVery HighYesNo
LEACH-VHIndeterminateResidual Energy,IndeterminateDisseminatedStaticVery effectiveVery HighYesYes
LEACH-TDeterminateResidual Energy,IndeterminateDisseminatedStaticEffectiveHighYesNo
LEACH-TBDeterminateRandomIndeterminateDisseminatedStaticFixedHighNoNo
Improved-LEACH IndeterminateDistance and residual EnergyIndeterminateDisseminatedStaticEffectiveHighYesYes
EADCRDeterminateEuclidean distance, Residual EnergyIndeterminateCentralizedStaticEffectiveVery HighYesYes
BN LEACHIndeterminateDensity, Distance Residual EnergyIndeterminateDisseminatedStaticEffectiveHighYesYes
Table 4. Simulation parameters.
Table 4. Simulation parameters.
ParameterDefault Value
Simulation area100 × 100
Number of nodes100
Minimum distance between nodes2 m
Simulation runs10
Simulation time120 s
BS position(50, 50)
Initial energy0.5 J
Probability of becoming a node as CH0.1
Energy for transferring of each bit50 × 0.000000001
Energy for receiving50 × 0.000000001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. https://doi.org/10.3390/en14196016

AMA Style

Bharany S, Sharma S, Badotra S, Khalaf OI, Alotaibi Y, Alghamdi S, Alassery F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies. 2021; 14(19):6016. https://doi.org/10.3390/en14196016

Chicago/Turabian Style

Bharany, Salil, Sandeep Sharma, Sumit Badotra, Osamah Ibrahim Khalaf, Youseef Alotaibi, Saleh Alghamdi, and Fawaz Alassery. 2021. "Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol" Energies 14, no. 19: 6016. https://doi.org/10.3390/en14196016

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop