Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

An Improvement of Leach Protocol using Cross Layer Leach - Heed and Super Cluster Head

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Sandeep Kaur, Daljeet Kaur, Gagandeep

Sandeep Kaur, Daljeet Kaur and Gagandeep. An Improvement of Leach Protocol using Cross Layer Leach - Heed and Super Cluster Head. International Journal of Computer Applications 175(7):10-15, October 2017. BibTeX

	author = {Sandeep Kaur and Daljeet Kaur and Gagandeep},
	title = {An Improvement of Leach Protocol using Cross Layer Leach - Heed and Super Cluster Head},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2017},
	volume = {175},
	number = {7},
	month = {Oct},
	year = {2017},
	issn = {0975-8887},
	pages = {10-15},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017915598},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The Wireless Sensor Networks (WSN) resides of a large number of sensor nodes that are incomplete in energy, processing power, and storage. The energy of nodes is the most important consideration amid them because the lifetime of Wireless Sensor Networks is incomplete by the energy of the nodes. LEACH is one of the most famous clustering mechanisms; it elects a cluster head (CH) created on a probability model. This paper improves LEACH protocol using Cross Layer LEACH and HEED and Super Cluster Head. Hybrid Energy Efficient Distributed protocol for the heterogeneous wireless sensor network have been reported. The main requirements of the wireless sensor network are to prolong the network lifetime and energy efficiency. Here, Heterogeneous- HEED: A Protocol for clustered heterogeneous for Wireless Sensor Network has been proposed to prolong the network lifetime. These proposed works provide a better result in terms of o live nodes, energy dissipation, message cost when compared to traditional leach protocol.


  1. Ablolfazl Afsharzadeh Kazerooni “Leach And Heed Clustering Algorithms In Wireless Sensor Networks: A Qualitative Study” Advances in Science and Technology Research Journal, Volume 9, Issue 25, 2015.
  2. Ablolfazl Afsharzadeh Kazerooni (2015) “Leach And Heed ClusteSring Algorithms In Wireless Sensor Networks: A Qualitative Study” ASTRJ, Volume 9, Issue 25, 2015
  3. Annoa, J., Barollib, L., Durresic, A., Xhafad, F., & Koyamae, A. (2008), “Performance evaluation of two fuzzy-based cluster head selection systems for wireless sensor networks”, Mobile Information Systems, 4, 297– 312.
  4. Baljinder Singh“Jamming attack in MANET: A Selected Review” International Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 4, April 2015.
  5. Dawood.M.Sheik., (2012), “Study of Energy Efficient Clustering Algorithm for Wireless Sensor Networks” International Journal of Emerging Research in Management &Technology .
  6. Dehni. L., (2006), "Power Control and Clustering in Wireless Sensor Networks," in Challenges in Ad Hoc Networking. vol. 197, K. Agha, et al., Eds., ed: Springer US.
  7. Grover.A., (2014), “AOMDV with Multi-Tier Multi-Hop Clustering in Wireless Sensor Networks” Advanced Engineering Technology and Application,Adv. Eng. Tec. Appl. 3, No. 3, 29-33 .
  8. Harneet Kour “Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network” International Journal of Computer Applications (0975 – 8887) Volume 4 – No.6, July 2010.
  9. Hashmi S and T. Moufth, (2003), “A New Transport Layer Sensor network protocol”, IEEE 
Transactions, vol. 5,pp.118-156, Mar.2003
  10. Heinzelman.W.R., (2000), “Energy-efficient communication protocol for wireless micro sensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on.
  11. K. Saghar, D. Kendall, and A. Bouridane. Raeed: A solution for hello flood attack. In IEEE, International Bhurban Conference on Applied Sciences & Technology Islamabad, (IBCAST 2015) Pakistan, 2015.
  12. Khalid Hussain, Abdul Hanan Abdullah,(2013), “Cluster Head Election Schemes for WSN and MANET‖: A Survey”, ISSN 1818-4952 © IDOSI Publications.
  13. Lynda Mokdad “DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks ” Elsevier B.V. All rights reserved 2015.
  14. M. Tariq and K. Saghar. Evaluation of a sensor network node communication using formal verification. In IEEE, International Bhurban Conference on Applied Sciences & Technology Islamabad, (IBCAST 2015) Pakistan, 2015.
  15. Maram Bani Younes (2015), “SCOOL: A Secure Traffic Congestion Control Protocol for VANETs” Wireless Communications and Networking Conference (WCNC): - Track 3: Mobile and Wireless Networks 2015 IEEE.
  16. Meng., (2013), "An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks." Journal of Computer Science and Technology 28, no. 3.
  17. OssamaYounis And Sonia Fahmy, Heed: ―A Hybrid, Energy-Efficient, Distributed Clustering Approach For Ad-Hoc Sensor Networks‖, (vol-3,issue- 4I 2009n 47907– 2066, Usa).
  18. Rahmani.N., (2010), "CAT: The New Clustering Algorithm Based on Two-Tier Network Topology for Energy Balancing in Wireless Sensor Networks," in Computational Intelligence and Communication Networks(CICN), 2010 International Conference on, 2010.
  19. Rohini Rawat (2015)“Mitigation of Jamming Attack in Vehicular Ad hoc Network” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June.


HEED, WSN, SCH, Protocol, Algorithm etc.