You are on page 1of 5

This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2017 conference.

A Hybrid Energy Efficient FF Algorithm for


Wireless Sensor Network
Raghu Kalyana1 and Setti Naga Aruna2
Department of E.C.E., Kakinada Institute of Technology and Science, Divili, India
Email: 1 k.raaghu7@gmail.com 2 aruna430kits@gmail.com

Abstract—Wireless Detector Network may be a major and previous couple of years, a range of upgrades is printed to
extremely attention-grabbing technology utilized in numerous lower the energy demand in Wireless Detector Network, as
applications like monitoring the inaccessible conditions in a chiefly energy dissipation is a lot of for wireless transmission
very specific space. Every detector node consists of A battery,
transmitter, receiver and a processor. Exchange or recharging and reception. To tackle with of these challenges cluster has
the battery isn’t potential. So increasing the network lifetime by been found to be the economical technique.
reducing the consumption of energy levels of all the detectors Basically cluster may be classified into 3 methodologies.
and leveling consumption of energy level at each detector are the initial methodology is centralized cluster wherever the base
most challenges within the analysis of the routing protocols in station can tack the network into clusters, second methodology
Wireless Sensor Networks. During this paper, associate Energy
consumption clump for wireless detector networks victimization is distributed cluster wherever nodes tack themselves into
Hybrid Firefly algorithm (HFA) is enforced at the base station clusters and third methodology is Hybrid cluster shaped be-
(BS). A cost value operate has been outlined to reduce the space cause the ensuing configuration of the higher than 2 strategies.
between the clusters to optimize the consumption of energy level many protocols are projected in earlier to increase the sensing
of the network. The performance is compared with the protocols element network life time. The already existed technique
like LEACH and PSOC.
Index Terms—Wireless Sensor Network, Clustering methods, known as LEACH [1]. LEACH could be a distributed cluster
Fire Fly (FF) algorithm, Energy efficient clustering, Hybrid FF the algorithmic rule, wherever nodes build choices with none
algorithm. centralized management. At the start, it detects Cluster Head
with a likelihood, p and call are board cast. Where cluster head
I. I NTRODUCTION selection, a billboard message is transmitted by each CH to the
Wireless detector Network (wsn) is created by network opposite sensor detector and each one amongst the opposite
where each sensor node detects and communication among CH detector find out a cluster to belongs to, by choosing
built the mistreatment information signals and easier to de- the cluster detector may be mistreatment smallest amount of
ployed indiscriminately or manually to sense, monitor and communication energy reached (depend on the signal strength
perceive the desired space. Wireless detectors have several of every CH info). All detectors have an opportunity to become
limitations that build the plan to follow the network protocol Cluster Head detector to equal to maintain the energy power
troublesome. One of them is restricted energy offer. It required spent per circular by every sensing detector.
more power to communicate each detector to others detectors, The projected centralized, cluster based energy efficient
here power consumption most critical to managing the detector method to increase the detector network lifespan by victim-
network. ization Hybrid FF algorithmic [2] rule has been formed. The
important plan is to implement planned protocol there is a
A. Wireless Sensor Network Clustering Formation choice of intra cluster space b/w itself and the one of the
Here, the sensing element nodes area unit separated into cluster and energy improve management of the WSN. A high
little teams, that area unit known as clusters. All the clusters energy efficient detector node make as a cluster head to use
form as a single cluster head (CH), it can monitor the and to produces cluster member of unit area equally positioned
remaining other detectors. Detectors in a very cluster don’t throughout the total detector field.
share the information with the sink detectors straightly. They The Proposed paper is organized as follows: Section II pro-
are going to gathering the info and send to the CH. The Cluster vides a short description of the necessary related to papers that
head can combine this information and sends it to the BS. That unit area. The system model for the group detector network
the consumption of energy and variety of collecting message presented in Section III. The implementation of the system
to the base station (BS) and the variety of active detectors in with proper coverage is discussed in Section III. Section IV
communication is additionally decreased. During this order, organized with the simulation results. Conclusion presented in
the network period is multiplied. Section V.
Main approaches projected to this point area unit centered
on creating the changes at waterproof and network layer. To II. R ELATED W ORK
a lot of major challenges in cluster head area unit to mend Heinzelman et al look at the protocols for communica-
the grid and variety of cluster nodes in a very WSN. For a tion [1] which can be cut back the energy dissipation of the

978-1-5090-4442-9/17/$31.00 2017
c IEEE 1635
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2017 conference.

WSN and that they planned a replacement protocol referred to


as LEACH. It is a clump based mostly protocol that uses the
randomized rotation of cluster heads to equally contribute the
energy load related the detector within the network. A detector
becomes a Cluster Head for this circularly if the haphazardly
chosen variety is a smaller amount than the subsequent thresh-
old. Those compared the outputs with previous algorithms like
LEACH & PSOC. The rotation is simulated by obtaining every
detector to settle on a random variety T b/w zero and one:
 p
1 ,
1−p(rmod p )
if n ∈ G
T (n) = (1)
0, otherwise Fig. 1. The radio model for first order based.

where the p is cluster head, r is that the circular variety current


and G is represented the cluster of detectors that haven’t been III. S YSTEM M ODEL
cluster heads (CH) with in the last 1/p rounds. Once the CH
A. Network Methodology
choice, every cluster head (CH) prepares a Time Division
Multiple Access (TDMA) schedule and sends to any or all This is mainly dealing with the network methodology is
the cluster detectors there in the individual cluster. With this mentioned. Assume the consisted network have N completely
the created part of Low Energy Efficient Clustering Hierarchy multiple sensor detectors it can be monitor and detects and
(LEACH) can get completed. collect require data and area unit indiscriminately deployed
N. A. Latif, et al proposed Particle Swarm optimization uniformly inside a M × M sq. region. The subsequent as-
(PSOC) algorithmic program [3] the cluster energy level sumptions area unit created for the network model.
for wireless detector networks (WSN) victimization, that is 1. Every detector in WSN is individual and stand alone and
enforced at the base station. The main theme of an algorithm maintained efficient energy.
is to seek out place related with a position that ends down the 2. Every detector can monitor the tasks periodically and
simplest analysis of a fitness in detector operate. Throughout always collects the acquire data to transmitted to the Base
every generation, every particle knowledge of information re- Station.
garding its best earliest group position and single best position 3. In sensor Network a base station presented in outside or
of detectors to updates its own resolution by utilization of inside of the field.
equations shown below. 4. Every node have it’s own capability of transmitting power
it is also variable
vid (t) = w × vid (t − 1) + c1 ϕ1 (pid − xid (t − 1)) 5. Every detector is eligible to perform either cluster or
+ c2 ϕ2 (pgd − xid (t − 1)) (2) cluster head.
6. To avoid information diffusion the redundant gathered
xid (t) = xid (t − 1) + vid (t). (3) information so the all the data sent can be reduced.
7. Every single hop the information communication can be
Here v represents the velocity of particles, x is the position done.
of detecting particles, pid is the best position of the particle,
pgd is the position at globally, w is denoted an inertia weight B. Radio Energy Model
of particles.
The implementation of radio energy model is based the
V. Kumar et al proposed [4] A rule to increase network energy level of first order is used in [5]. Here a power
period of time in Wireless sensing detector Network. The ways transmitter dissipates the radio energy level and running its
for knowledge transfer square measure hand-picked in such own power and power receiver electronic device dissipates
some way that the entire energy consumption on the trail is energy at the receiver the resultant model as shown in Fig. 1.
decreased. So as to support the more measurable and fine The power dissipation of energy is directly proportional to the
knowledge aggregation, often times sensing element nodes sq. of the area. For extended power consumption at distance is
square measure sorted into non-overlapping, disjoint teams proportional to d, Here d is represented as the distance between
or subsets, that square measure known as clusters. Clusters T x and Rx detectors. To realize a suitable S/N magnitude
can produce hierarchic Wireless sensing element Networks, relation for transmission associated with l a message of 1 bit
that develop economically utilize of the restricted resources over a distance d, the radio energy model given by:
(power) of sensing element nodes, so they extend the period of
time of the sensing network. A lot of work towards clustering ET X (l, d) = ET X−elec (l, d) + ET X−amp (l, d)

is done, but most of the proposed algorithm implemented and l.Eelec + l.εf s .d2 , if d < d0
studied of Hybrid Fire Fly (HFF) method for formation of = (4)
clusters. l.Eelec + l.εmp .d4 , if d ≥ d0

1636
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2017 conference.

bit messege received, the radio energy model: 4) Movement: The firefly’s movement i towards high
brighter firefly j is given by
ERX = l.Eelec . (5) 2
xi = xi + β0 e−γri,j (xj − xi ) + α (12)
Here E is denoted by the energy power dissipation at trans-
mits, E is the radio energy power dissipation at receives, ε and where the 2nd term is due to the attraction while the 3rd term
ε depends on the electronic equipment transmitter used and d is randomization via α being the randomization parameter.
is the distance of threshold transmission, E is the energy power
D. Hybrid FF Algorithm Cluster Formation
consumption per one bit at transmitter and receiver working
given by A centralized algorithm combines of the Firefly (FF) method

εf s and Differential Evolution [2] to determine the fitness level
d0 = . (6) of the 1 st ranked in sorted population is again divided into
εmp
two sub-populations. The solution in a population represents
C. Protocol Description with in a specified searching space a solution which is located
1) Fire Fly (FF) Algorithm: The Firefly recently algorithm randomly. The ith the solution, Xi is represented as
developed it is one of the meta-heuristic method [6] Dr. Xin
She yang was introduced in the year 2007, this model dis- Xi (t) = xi (1), xi (2), . . . , xi d(t). (13)
cussed that the behavior of fireflies. This algorithmic provide The 1st subpopulation subjected to undergo neighborhood
protocols to search out the positions among particles that end under optimization is contained the solutions with potential
with operating fitness level at effective analysis. This algorithm fitness values is, whereas a sub-population is subjected to
followed three regulations: operate the evolutionary function where xi(k) is the vector
1. All fireflies are unisex i.e an attraction will be other with k = 1, 2, 3, . . . , d, and t is the time step. Initially, the
fireflies regardless of their sex. evaluated fitness value of given solution. The best fitness
2. The main objective of fireflies depends on brightness. value produced is chosen by current best solution in the
3. Fireflies attractiveness that the brightness is directly pro- population [7]. The ranked newly evaluated solutions are
portional to it reduces the distance increased. based on the fitness values and two sub-populations. The 1st
These three rules prepared by random code of Fire Fly subpopulation that produced potential fitness values contained
algorithm. solutions where the fitness value ith is each solution in this
2) Brightness and Attractiveness of Fireflies: The inverse sub-population is then compared with its fitness value jth
square law represents the brightness and attractiveness i.e.: neighboring solutions. If the fitness value of the neighboring
solution jth is better, the distances b/w each result would then
I0
I(r) = . (7) be calculated exploitation the distance and quality euclidean
r2
live. β is attractiveness employed to work out the distances, it
Here I(r) is the brightness at a distance r and I0 is the represents following the following equation:
source of light intensity. The light intensity determined by
the medium. β = β0 exp(−γr2 i, j) (14)
I(r) = I0 exp(−γr). (8) where the predetermined attractiveness beta0 , light absorption
Here γ is the absorption coefficient of the medium. In order to coefficients rij and the ith solution and its jth neighboring
avoid the singularity at r = 0 in Eq. 7, the following Gaussian solution distances respectively. After, this new attractiveness
form of the approximation is considered. value was used to the position of the solution updated as given
below:
I(r) = I0 exp(−γr2 ). (9)
xid = xid + β(xjd −xid ) + α(δ − 1/2) (15)
The firefly attractiveness is proportional to the brightness seen
by the adjacent fireflies. So that the attractiveness β of a firefly where β is uniformly distributed random values its value, lies
is given by the equation below. b/w 0 to 1 and δ is uniformly distributed random values its
value lies b/w 0 to 1. Thus, the updated attractiveness values
β = β0 exp(−γrm ). (10) assisted the population to move towards the solution that
Here β0 is the attractiveness at r = 0. produced the significant fitness values. The population in this
3) Distance: ri,j is any two fireflies b/w distance i and solutions are subjected to under the evolutionary operations.
j which are located at xi and xj respectively, the Cartesian The solutions are produced by the mutation operation is that
distance is given by the equation below performed on the original counterparts. The ith is trivial
 solution, V i is generated based on the following equation:
 d
 Vi (t) = vi (1), vi (2), . . . , vi d(t)
r =  (x − x )2 .
(16)
ij i,k j,k (11)
k=1 Vi (t) = xi(best) F.(xr1t − xr2t ) (17)
Here xi,k is the kth component of the spatial coordinate xi of where xb est(t) is the best solution of vector current, F is
the ith firefly and d is the number of dimensions. the mutation factor, xr1 and xr2 are chosen vectors randomly

1637
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2017 conference.

from the other solutions. Next, the crossover operation that


involved the parent and the trivial produced by the offspring
solution. The vectors offspring solution is ith, Y i, are repre-
sented as follows:

Yi (t) = yi (1), yi (2), . . . , yi d(t) (18)



vi (t), ifR < CR
yi (t) = (19)
xi (t), otherwise.

A uniformly distributed random variables is R its lies b/w


0 to 1 and the predefined cross-over CR is constant. A
selection operation is required to keep the population size
constant population is produced by the offspring solution. The
performance as follows:
Fig. 2. A uniformly distributed sensor network snape shot.

Yi (t), if f (Yi (t) < f (Xi (t)))
Xi (t + 1) = (20)
xi (t), if f (Yi (t) > f (Xi (t))).
Data:
• S is particles position is generated to selects the K randomly chosen CH.
The offspring solution is produced by exact equation would • The closest (x, y) coordinates generated position with randomly
be replaced by the if the fitness value is better than the Result: To determined the Cluster Head Posiotions
exact solution. Otherwise, the population for the next iteration while t < Max Generation of CHs do
To map the particles positions with the closest (x, y) coordinates
remains constant. The cost function Evaluated
Based on the fitness level sorted Population;
1. Initialize K randomly selected cluster heads (CH) and X_Best-first half f (x);
particles of S among in the eligible cluster heads. X_worst-second half f (x);
for i = 1 to n0 /2 (all n fireflies) do
2. Calculate the each particle cost function: for j = 1 to n0 /2 (all n fireflies) do
i. For each detector ni , i = 1, 2, . . . , N . if Ij > Ii then
Update the Position of Particles;
a. Calculate distance d(ni , CHp,k ) b/w the node ni end
The position of Particles changes are;

and all cluster heads CHp,k . end


b. Assign detector ni to cluster head CHp,k where: end
for i = (n0 /2) + 1 to n do Generate trivial solution, Vi (t);
Perform crossover, Yi (t);
d(ni , CHp,k ) = min{d(ni , CHp,k )} (21) Perform selection, Xi (t);
X-combine (Xbest:Xworst);
Find the present best fire flies and given to Rank ;
for k = 1, 2, . . . , K. end
Post process the results;
ii. Using equation calculate cost function. End procedure;
3. Find the present fireflies and given to Rank.
4. Particle position are Update. Algorithm 1: Hybrid Firefly algorithm is formed clustering
5. The particle’s position value change in the limit.
6. Updated the closest (x, y) coordinates position with the
new Map.
7. The max no. of iterations is reached until Repeat the steps Optimization-Centralized (PSOC) and LEACH. The perfor-
two to six. mance of simulation is going on until consumed energy of
The optimal group of cluster heads and their associated all the detectors.
clusters [8] recognized by BS. The transmitted message that The life span of network represents in Fig. 3, the proposed
consists the cluster head Identification for each detector return method briefly explained the network life time that was
to all detectors in the WSN. compared with protocols of LEACH and PSOC. The HFFA
provides less intra-cluster distance and network partition is
IV. S IMULATION R ESULTS very High. The optimally distributed cluster heads measure
The simulation results of Wireless Sensor network have across in the total network. So the consumption of energy by
300 detectors in a network area is 200 m × 200 m. The all the detectors for communication can be reduced because
proposed algorithm is evaluated in MATLAB and middle the distance between cluster heads and their clusters are very
area of Network consisted a Base Station. A uniformly dis- less.
tributed detecting elements in a network snap shot shown in Fig. 4 gives the network lifetime of detectors having homo-
Fig. 2. In total no of sensor detectors 5% of a set to be geneous power. From the results it can be clearly understood
clustered. The projected protocol performance is compared that Hybrid Firefly (HFF) algorithm gives better network life
with the antecedently projected algorithms Particle Swarm span when compared to other two protocols.

1638
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2017 conference.

from the simulations indicate that clump mistreatment Hybrid


Firefly algorithmic rule offers a higher network period of time
compared to LEACH, FFA, and PSOC. The implementation of
hybrid is a technique it improves clusters in wireless sensing
element networks (WSN).
R EFERENCES
[1] W. R. Heinzelman, A. Chandrakasan, and B. Hari, “Energy-efficient
communication protocol for wireless microsensor networks,” in IEEE
Fig. 3. Network lifetime for the nodes with heterogeneous energy. Transactions on Wireless Communications, vol. 1. IEEE, 2002,
pp. 660–670.
[2] T. Hassanzadeh and M. R. Meybodi, “A new hybrid approach for data
clustering using firefly algorithm and k-means,” in Artificial Intelligence
and Signal Processing (AISP), 2012 16th CSI International Symposium
on, IEEE, 2012, pp. 007–011.
[3] N. A. Latiff, C. Tsimenidis, and B. Sharif, “Energy-aware clustering for
wireless sensor networks using particle swarm optimization,” in Personal,
Indoor and Mobile Radio Communications. PIMRC 2007. IEEE 18th
International Symposium on, IEEE, 2007, pp. 1–5.
[4] V. Kumar, S. Jain, and S. Tiwari et al., “Energy efficient clustering
algorithms in wireless sensor networks: A survey,” IJCSI International
Journal of Computer Science Issues, vol. 8, no. 5, pp. 1694–0814, 2011.
Fig. 4. Network lifetime for the nodes with homogeneous energy.
[5] W. Cheng and H. Shi, “Aeec: An adaptive energy efficient clustering
algorithm in sensor networks,” in Industrial Electronics and Applications.
V. C ONCLUSION ICIEA. 4th IEEE Conference on, IEEE, 2009, pp. 3950–3954.
[6] A. Hashmi, N. Goel, S. Goel, and D. Gupta, “Firefly algorithm for
This paper mainly discussed with the clustering formed unconstrained optimization,” IOSR Journal of Computer Engineering
(IOSR-JCE), vol. 11, pp. 75–78, May–June 2013.
with aware of energy. A Hybrid Firefly algorithm protocol for [7] U. Sur and G. Sarkar, “Hybrid firefly algorithm based distribu-
wireless detecting element networks mistreatment of cluster tion state estimation with regard to renewable energy sources,” in
heads enforced for the primary time. A price performance is Microelectronics, Computing and Communications (MicroCom), 2016
International Conference on, IEEE, 2016, pp. 1–6.
determined, that may take the most distance b/w the member [8] A. Rajan and T. Malakar, “Optimal active power dispatch using hybrid
of cluster and cluster heads and therefore the energy of the firefly algorithm,” in India Conference (INDICON), 2014 Annual IEEE,
cluster head remain candidates are in an account. Results IEEE, 2014, pp. 1–7.

1639

You might also like