Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

RAJIV GANDHI COLLEGE OF ENGINEERING

AND TECHNOLOGY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING

SOCIAL SPIDER OPTIMIZATION BASED ROUTING


PROTOCOL FOR ENERGY EFFICIENT WSN

Under the Guidance of Presented By,


Mr.A. Alexander, Arunkumar S (20TC0052)
Assistant Professor, Yuvaramji S (20TC0072)
Dept of ECE, RGCET. Sathish Kumar V (20TCL004)

Date: 25.11.2023
CONTENTS
 Abstract
 Aim/Scope of the Project
 Extraction System
 Existing System Diagram
 Drawbacks
 Proposed System
 Enhancement in Proposed System
 Proposed Architecture
 Algorithm in Proposed System
 Advantages & Applications
 Workdone
 References
ABSTRACT

 In order to address the fundamental trade-off between packet delay


and transmission power and delay we develop clustering with routing
schemes based on power-delay constraint of the Heterogeneous
Networks.
 In this project, the problem of how gather and aggregate data from the
whole sensor nodes to the base-station is solved with efficient way,
such that the energy consumption is reduced, messages collision are
prevented and the time latency is minimized.
 A new hybrid Deep Learning based Social Spider routing protocol is
proposed by incorporating the routing concept of WSN and performance
of our proposed algorithm is compared to LEACH algorithm.
AIM/ SCOPE OF THE PROJECT

 In Proposed system, the encoding scheme used for the


purpose of delay efficient and also it will combines three
packets into single packet that will leads to delay minimization
the network.

 The encoding method uses the Social Spider Optimization


scheme and also that method is convenient for the power
efficient Protocols.
EXISTING SYSTEM

 The Particle Swarm Optimization (PSO) Cluster Routing Algorithm in


Wireless Sensor Networks (WSNs) is proposed, focusing on graph
kernel optimization and multi-graph kernel principles.

 The algorithm uses shortest path (SP) to connect cluster head nodes
for packet transmission, comparing structural information to predict
links and cluster-heads.

 The method includes subgraph generation, kernel calculation, and


kernel classification stages.
EXISTING SYSTEM DIAGRAM
DRAWBACKS

 Energy optimization remains one of the most important challenges

since it is directly related to the network life- time.

 Existing system uses the fuzzy c means algorithm for the purpose of

delay minimization.

 The fuzzy c means algorithm will be complex when we are using

more no of nodes in multiprocessor system

 Energy consumption is high is the uncovered regions.

 Delay occurs while data is transmitted in the uncovered area.


PROPOSED SYSTEM

 The Deep Learning-based Social Spider Optimization protocol uses


clustering, location-based routing, and restricted flooding
techniques.
 It divides the network into four quadrants, randomly creating
clusters and assigning cluster heads.

 Three opportunistic schemes are proposed: power-efficient, delay-


efficient, and quasi-general.

 The protocol aims to balance packet delay and transmission power,


avoiding infinite packet delay due to symmetric packet arrivals.
ENHANCEMENT IN PROPOSED SYSTEM
 Organization: In contrast, cluster-based data transfer involves
organizing nodes into clusters with hierarchical structures.
 Control: Cluster-based data transfer involves local coordination
within clusters, often with a cluster head managing communication
within the cluster.
 Data Aggregation: While data aggregation can be applied in both
approaches, it is more inherent to cluster-based data transfer, where
cluster heads aggregate data from member nodes before forwarding
it.
 Overhead: Cluster-based data transfer can be more efficient in
terms of reducing communication overhead by aggregating data at
the cluster level.
PROPOSED ARCHITECTURE
SENSOR STORE DATA
NODE VALUES

CLUSTER COLLECTION OF
CREATION CLUSTER DATA DATA BASE
CALCULATE SERVER
HEAD
PARAMETERS
NEW ASSIGNMENT
ENERGY, QUERY
MEMORY, ARRIVAL
PROCESSOR
BANDWIDTH, NODE
ETC. THRESHOLD
BATTERY
POWER

BASE AGGREGATED DATA CUBE


STATION UNITS TECHNIQUE
ALGORITHM IN PROPOSED SYSTEM

 Initialize cluster centroids randomly


 Initialize clusters
 Iteratively assign data points to clusters and update centroids
 Assign data points to the nearest cluster
 Update centroids of each cluster
 Return the final clusters
ADVANTAGE & APPLICATION

 Reducing energy consumption during data transmission


 Efficient routing minimizes energy wastage
 SSOA enhances overall network lifespan
 SSOA adapts to changing network conditions by reselecting
cluster heads
 Clustering ensures balanced energy usage across nodes
 Mobile Data Communication
 Drone based Surveillance
 Underwater Monitoring
 Coalmine Monitoring
 Military Communication
WORKDONE

 Network Formation Done


 50 Numbers of nodes considered for the overall network
 Basic clusters with cluster head selection done
 Data Transmission done with the Random Number of
Nodes
REFERENCES
 Z. Abubaker, N. Javaid, A. Almogren, M. Akbar, M. Zuair, and J. Ben-Othman, ‘‘Blockchained service
provisioning and malicious node detection via federated learning in scalable Internet of Sensor
Things networks,’’ Comput. Netw., vol. 204, Feb. 2022, Art. no. 108691.
 A. S. Yahaya, N. Javaid, M. U. Javed, A. Almogren, and A. Radwan, ‘‘Blockchain-based secure
energy trading with mutual verifiable fairness in a smart community,’’ IEEE Trans. Ind. Informat., vol.
18, no. 11, pp. 7412–7422, Nov. 2022.
 S. Amjad, S. Abbas, Z. Abubaker, M. H. Alsharif, A. Jahid, and N. Javaid, ‘‘Blockchain based
authentication and cluster head selection using DDRLEACH in Internet of Sensor Things,’’ Sensors,
vol. 22, no. 5, p. 1972, Mar. 2022, doi: 10.3390/s22051972.
 A. U. Khan, M. B. E. Sajid, A. Rauf, M. N. Saqib, F. Zaman, and N. Javaid, ‘‘Exploiting blockchain and
RMCV-based malicious node detection in ETD-LEACH for wireless sensor networks,’’ Wireless
Commun. Mobile Comput., vol. 2022, pp. 1–15, Aug. 2022.
 T. Hewa, A. Braeken, M. Liyanage, and M. Ylianttila, ‘‘Fog computing and blockchain-based security
service architecture for 5G industrial IoTenabled cloud manufacturing,’’ IEEE Trans. Ind. Informat.,
vol. 18, no. 10, pp. 7174–7185, Oct. 2022
 M. J. Islam, A. Rahman, S. Kabir, M. R. Karim, U. K. Acharjee, M. K. Nasir, and S. Wu, ‘‘Blockchain-
SDN-based energy-aware and distributed secure architecture for IoT in smart cities,’’ IEEE Internet
Things J., vol. 9, no. 5, pp. 3850–3864, Mar. 2022.

You might also like