A Mental Clustering Algorithm Based on the Embedded Agent in Wireless Sensor Network

Article Preview

Abstract:

In this paper, a clustering protocol for Embedded Agent sensor network is proposed. In LEACH protocol, the selection probability P of candidate cluster head is constant without thinking about residual energy, which caused the lower residual energy easy to be the candidate cluster head. Compared with traditional structure of wireless sensor network, parameter was optimized. The confidence of the node, select probability and residual energy are the parameter of candidate cluster head, communication cost as the parameter of final cluster node. Compared with LEACH and ASCH, EACA take more parameters than LEACH. Results show that EACA can balance the energy load in the network, and effectively reduce more energy consumption.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2037-2041

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ai-Karaki J, U1-Mustafa R, Kamal A. Proc of the IEEE Workshop on High Performance Switching and Routing[C].Phoenix:IEEE Communications Society,2004: 241-245.

Google Scholar

[2] Akl R, Sawant U. Proc of the Consumer Communications and Networking Conference[C].Piscataway,NJ: IEEE, 2007: 860-864.

Google Scholar

[3] Soro S, Heinzelman W. Proc of the IEEE Parallel and Distributed Processing Symposium. Los Alamitos[C], CA: IEEE Computer Society, 2005: 48-63.

Google Scholar

[4] Heinzelman W. Chandrakasan A, Balakrishnan H. Proc of the 33rd Conf on System Sciences. Piscataway[C], NJ: IEEE, 2000: 3005-3014.

Google Scholar

[5] QI Ying-ying, YU Ji-guo, WANG Nan-nan. Computer engineering, 2011: 37(3): 83-86.

Google Scholar

[6] SMARAGDAKIS G, MATTA I,BESTAVROS A. In: Pro. of the Int'l Workshop on SANPA 2004, 2004: 165-190.

Google Scholar

[7] Cheng Wenjuan, Mu Zili, Tang Hao, and Zhou Lei. 2010: 88-91.

Google Scholar

[8] LONG Ji-zhen, CHEN Yuan-tao, DENG Dong-mei. Computer engineering. 2011: 4(37): 103-105.

Google Scholar

[9] YUE Hai-bing, GE Hong-wei. Computer engineering. 2010:1(36):118-120.

Google Scholar