# Introduction ireless sensor network (WSN) is extensively used technologies of the innovative area. The sensing electronics extents the ambient conditions associated to the environment nearby the sensors and renovate them in to an electrical signal. In various applications, the distribution of sensor nodes is performed in an ad-hoc manner without cautious planning and engineering. In the last few years, rigorous exploration studies addressing the prospective of association among sensors in data gathering and handling and in the coordination and administration of the sensing accomplishments were conducted. Nonetheless, the sensor nodes are self-conscious in energy supply and bandwidth. Energy conservation is serious in WSNs. Replacing or recharging the batteries is not an option for the sensors deployed in hostile environments. Usually, the communication electronics in the sensor use most of the energy. Immovability is one of the major anxieties accompanying with the progression of WSNs [1]. A number of WSN applications necessitate definite sensing, coverage, and connectivity all over its operating time duration. The death of the first node might cause unpredictability in the network. Consequently, all of the sensor nodes in the network must be active in order to accomplish the goal during that period. One of the main obstacles to confirm these marvels is the unbalanced energy in gestion rate. Numerous techniques have been proposed to decrease the energy consumption rate, likewise clustering, proficient routing, and data accumulation. In a classic WSN application, sensor nodes are distributed in a province from where they collect data to accomplish definite goals. Data assortment may be an unbroken, intermittent, or event-based process. The WSN must be very steady in some of its applications such as security monitoring and motion tracking. The death of only one sensor node may agitate the coverage or connectivity and hence may weaken the immovability in this type of applications. Therefore, all of the organized sensor nodes in the WSN must be vigorous during their operational lifetime. Nevertheless, the sensor nodes are usually equipped with one-time batteries and most of the batteries are of low-energy type. Due to this intended, each sensor node must proficiently use its available energy in order to get better the lifetime of the WSN. Different techniques are used for the resourceful handling of this low obtainable energy in a sensor node. Group communication and election algorithm is one of the well known techniques. E e-mails: devkumar457@gmail.com , rajeshsharma.ercs@gmail.com Abstract-Wireless sensor network is extensively used technology now a day in real time application. It consists of a number of autonomous sensor nodes which are organized in various areas of interest to accumulate data and jointly convey that data back to a base station. But the sensor node has limited battery energy and it is also found that the WSN more vulnerable to severe kinds of security threats such as denial of service (DOS), Sybil, hello flood attack etc. In this, we proposed group communication using election algorithm to make the network most energy efficient and also make the network secure. The simulation of the proposed methodology is done between different network parameter such as PDR, end-to-end delay, throughput and energy consumption using the network simulator NS-2.34. Several techniques has been proposed or implemented to enhance the network lifetime and to form a secure network. In this section we discuss different methods proposed and implemented by various researchers in field of energy consumption and related to security threats over the network. Luigi Coppolino et al [2] proposed a hybrid, lightweight, distributed Intrusion Detection System (IDS) for wireless sensor networks. This IDS uses both misuse-based and anomaly-based detection techniques. It is composed of a Central Agent, which performs highly accurate intrusion detection by using data mining techniques, and a number of Local Agents running lighter anomalybased detection techniques on the motes. Decision trees have been adopted as classification algorithm in the detection process of the Central Agent and their behaviour has been analysed in selected attacks scenarios. The accuracy of the proposed IDS has been measured and validated through an extensive experimental campaign. K. Parameswari et al [3] proposed to develop an energy efficient secured data aggregation protocol for wireless sensor networks, which will alleviate the node misbehavior in thewireless sensor networks. The protocol involves mechanism for energy efficient aggregator selection. Mechanism for efficient node selection for reducing the network lifetime and the delay. Source node authentication by the sink. Aggregate or authentication as per listed in the packet header, by the sink. This protocol can be constructed on top of the preexisting key distribution and encryption schemes in the wireless sensor networks. Roshan Zameer et al [4] proposed a mechanism to provide security with a reactive security scheme that includes studying the behavioral aspect of attacks and congregating the security demands. This method in sequence conglomerates the security and the network rescue mechanism free from attacks and their impacts on the network. The simulation results such as Packet Delivery Ratio (PDR), malicious node movement, delay; transmission power illustrates various attack behaviors in WSN along with the reception power rate observed by the sink node and the Packet loss. Sudharsan Omprakash [5] proposed, a Secured Energy Efficient Clustering and Data Aggregation -[SEECDA] protocol for the diverse WSN, in which the security, energy proficient clustering, data aggregation are pooled to accomplish a best performance in terms of QOS by energy and security measures. The proposed approaches incorporate a security method, and an innovative cluster head election mechanism and the route will be chosen with less energy needed. The simulation result shows that the SEECDA balances the security, energy effectiveness and extends the network life time are high when compared to LEACH, EEHCA and EDGA, EECDA respectively. Malika BELKADI et al [6] presented the Secured Directed Diffusion routing protocol and regarding to the different types of transmissions in this protocol, it use three types of keys. These keys are: the individual key of a node u (IKu), which is used to secure communication between a node and the base station, the pair-wise key (Kpair) to secure communication between a node and one of its neighbors and finally the global key (BK), all the nodes in the sensor network share this key with the base station. The base station uses global key to encrypt the interest message and all the nodes in the network uses this key to decrypt the announcements from the base station. The nodes store the interest information in their interest cache and then encrypt the message using the global key to further broadcasting it. The communication cost is reduced by using this key. With the help of these keys they reduce the power consumption of nodes, so the lifetime of the network will be extended. Babaket al [7] proposed an algorithm which makes healthier use of energy and bandwidth which are two restrictions in wireless sensor networks. In the algorithm mobile agent is used to cluster the network and also create the tour to attain collected data from each cluster-head and deliver it back to the sink node. With suitable parameters set, simulation shows that the proposed algorithm exhibits better performance than original direct diffusion in terms of energy consumption [8]. Di Tang [9] proposed new secure and efficient cost-aware secure routing protocol to deal with these two conflicting issues through two modifiable parameters: energy balance control (EBC) and probabilistic-based random walking. They determine that the energy consumption is rigorously disproportional to the consistent energy exploitation for the given network topology, which significantly reduces the lifetime of the sensor networks. To resolve this problem, they also proposed well-organized nonuniform energy exploitation strategy to optimize the lifetime and message delivery ratio under the same energy resource and security prerequisite. We also provide a quantitative security analysis on the proposed routing protocol. The efficiency of energy can be improved using some algorithms. That route the data as per network and data communication systems. In this we will some of the energy efficient routing protocols which will be discussed which are LEACH (Low Energy Adaptive Clustering Hierarchy), PEGASIS (Power Efficient Gathering in Sensor Info. Systems) and TEEN (Threshold Sensitive Energy Efficient Sensor Network), HEED (hybrid energy-efficient distributed clustering method for ad hoc sensor networks) etc. # Global Journal of Computer # Overview of Routing techniques a) LEACH The function field of sensor network is the environment surveillance and location tracing. In such situation, the end user does not require any frequent data as each node of the data is not associated to each other. The responsibility of LEACH (low energy adaptive clustering hierarchy) is to merge ordinary date by cluster head and sent to sink. For that cause, any frequent data is not sent to the sink [10]. The LEACH postulations are as follows. i. Every node has adequate energy to send data to the sink and can manage transmission energy. ii. Every node has data to send at any time and close nodes have data associated with each other. The key objective of routing protocol for routing is transferring data from convey node to object node and finding the most appropriate path with exactness. Accordingly, with limited shared resources, energy disbursement needs to be optimized on transmission bandwidth in the network overhead or surrounded by the nodes. For this motive, the sensor network circumvents replica of data among the adjoining sensor nodes by clustering simplify routing and energy expenditure can be supervised proficiently. # b) PEGASIS The power-efficient gathering in sensor information systems [11] PEGASIS is based on two ideas that are chaining and data fusion. In PEGASIS every node can take twirl of being a leader of the chain where the chain can be created using greedy algorithms that are organized by the sensor nodes. PEGASIS presupposes that sensor nodes have a global understanding of the network nodes are motionless (no alliance of sensor nodes) and nodes have locality of information about all other nodes. PEGASIS performs data fusion excluding the end nodes in the chain. PEGASIS better than LEACH by removing the transparency of cluster formation decreases the sum of distances that non leader node have to broadcast less the number of transmissions and receives all nodes and use only one transmission to the BS per round. PEGASIS has the identical problems that LEACH suffers from. Also the PEGASIS does not extent, cannot be useful to sensor network where comprehensive knowledge of the network is not simple to obtain. Power efficient gathering in sensor information systems (PEGASIS) is an enhancement of the LEACH protocol. Rather than designing several clusters it makes chains of sensor nodes so that each and every node transmits and receives from a neighbourhood and only one node is selected from that chain to transmit to the base station. Collected data transfer from node to node, amassed and eventually sent to the base station. # c) HEED A hybrid energy-efficient distributed clustering methodology for an ad hoc sensor networks has a complement the insufficiency of the cluster head election algorithm in LEACH. HEED has the following features [10]. i. Sensor nodes are the analogous type of nodes and consume energy. ii. Sensor nodes have no mobility. iii. Sensor nodes do not have their individual location information. # d) TEEN Threshold sensitive energy efficient sensor network protocol is used for precipitous changes in the sensed attributes in the network. It uses a data centric mechanism and makes clusters in a hierarchical manner. Two threshold values are transmits to the nodes: hard threshold and soft threshold. The hard threshold is the least promising value of an attribute. Sensor nodes mail data to the cluster head only if they found the sensed value is higher than the hard threshold. If sensor nodes found that the sensed value is less than the feature value of threshold than they do not send the data to the cluster head. Due to this way only relative data is send by the sensor nodes. In addition, when sensor node again sense value greater than the hard threshold value than they check the difference between current and earlier value with soft threshold. If the dissimilarity is again greater than the soft threshold than the sensor nodes will send recent sensed data to the cluster head. This process will remove encumber from the cluster head [12]. The energy efficiency of cooperative communication has recently been investigated in [13] and [14]. The authors of [13] investigated the energy issues in a clustered sensor network, where sensors collaborate on signal transmission and/or reception in a deterministic way. It is shown that, if the long haul transmission distance (between clusters) is large enough, cooperative communications can dramatically reduce the total energy consumption still when all the association overhead is considered. Based on [13], the authors in [14] combine the cooperative communication scheme with a cross-layer design framework for multihop clustered sensor networks. The system is optimized to improve the overall energy efficiency and to reduce the network delay. # Proposed methodology Cooperative communication for clustered sensor networks has also been investigated in [15]. In [16], the authors analyze distributed space-time block coding (STBC)-based cooperative communication for multitier clustered wireless sensor networks. Based on their analysis on the SER and throughput performance, the authors show that cooperative communication is more energy efficient than direct communication. However, the number of cooperative nodes in each cluster is fixed, and the inherent circuit energy consumption of wireless transceivers is ignored, which has recently been reported to be important for lowpower wireless sensor networks. In this paper we uses group communication and election algorithm to make the network energy efficient and form secure network for data transmission. An Election algorithm is a particular principle algorithm, which is run for selecting the coordinator procedure among N number of procedures. These coordinator or leader process plays a significant role in the distributed system to sustain the consistency through synchronization. For example, in a system of client server mutual exclusion algorithm is preserved by the server process Ps, which is chosen from among the processes Pi where i=1, 2... N that is the group of processes which would use the crucial region. Election Algorithm is essential in these circumstances to prefer the server process among the existing process. Eventually all the processes must agree upon the leader process. If the coordinator process fails due to diverse reasons then instantly the election should happen to choose a new leader process to take up the job of the failed leader. Whichever process can instigate the election algorithm whenever it encounters that the failure of leader process. There can be situations that all N processes could call N synchronized elections. In anytime, process Pi is one amongst the following two states, when the election happens: Participant refers to the process is directly or indirectly involved in election algorithm, nonparticipant refers to the process in not engaged with the election algorithm currently. The goal of Election Algorithm is to choose and declare one and only process as the leader even if all processes participate in the election and at the end of the election, every process should agree upon the new leader process without any mystification. With no loss of simplification, the elected process should be the process with the largest process identifier. This may be any number demonstrating the order /birth/ priority/ energy of the process. All the process has a changeable called LEAD, which contains the process id of the current leader. When the process participates in the election, it sets this lead to NULL. Any Election Algorithm should assure the following two belongings [9]. 1. Safety: Any process P, has LEAD = NULL if it is participating in the election, or its LEAD =P, where P is the highest PID and it is alive at present. 2. Likeness: All the processes should agree on the chosen leader P after the election. That is, LEAD = PID Pi where i=1, 2,...,N. # Energy Conservation and group communication using election/bully algorithm Step 1 : Set Mobile Node M = {MN 1 , MN 2 ????.. MN i-2 , MN i-1 , MN i , MN i+1 , MN i+2 , MN i+3 , MN i+4 ??.. MN n } //Set of mobile Node's Step 2 : Set initial energy for each nodes E = {en 1 , en 2 , ---------, eni-2 , en i-1 , en i , en i+1 , en i+2 , en i+3 , en i+4 ---------------e and the node consist the energy 0.45 joule for the simulation time 400s. In this work, mainly focuses for providing better security by consuming less energy. The comparison of above is done using different parameter such packet delivery ratio, throughput, routing load, delay etc. # a) Measuring Parameter The performance of the WSN can be measured by using different parameter such as Throughput, Packet delivery ratio, end to end delay, routing load [18]. # b) Throughput It is the average rate of successful message delivery over a communication channel. # ?????????????????? ? ???????? ?????? c) Acket Delivery Ratio Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. Mathematically, it can be defined as PDR= S1÷ S2 # d) End To End Delay The average time it takes a data packet to reach the destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue. This metric is calculated by subtracting time at which first packet was transmitted by source from time at which first data packet arrived to destination. Mathematically, it can be defined as: Avg. EED=S/N In general, packet delivery ratio decreases as the number of load and network size were increased. The proposed algorithm is compared with the existing method in which our methodology provides greater no of the packet delivery ratio. The undesirable increase in End-to-End delay could be observed in Fig. 4 as compared when the network size increases. In our work, the end to end delay is calculated increase in network size with respect to simulation time. The simulation result of proposed work decreases the delay comparing with the existing methodology. The average energy consumption is compared with the existing and our methodology in which energy consumption is very less than the existing methodology as shown below in fig. 5 Figure 5 : Comparison of energy in joule Vs no. of nodes with existing and proposed methodology In figure 6, throughput is calculated between the network size and simulation time, throughput is the average no of delivery of packets in the given time period. After simulating the methodology it proves that our approach gives better throughput than the existing ones. # Global # Conclusion The basic requirement for the communication, secure and energy efficient network is the primary requirement which can be influence by different malicious node while the sensor node has limited energy to transmit the packets. In this paper we proposed group communication method using election/bully algorithm to lessen the consumption ratio of nodes energy. The comparison of proposed algorithm is done with the existing methodology and the simulation result proves that our method is more efficient. # Global 1![Figure 1 : Wireless Sensor Networks In Section II discuss related work for decreasing the energy consumption. The Section III discusses about the different routing techniques. Section IV describes the proposed methodology and last section presents conclusion the paper.](image-2.png "Figure 1 :") ![is a voracious chain-based power efficient algorithm. In addition, PEGASIS is based on LEACH. The key characteristics of PEGASIS are: o The Base Station is preset at long distances from the sensor nodes. o The sensor nodes are identical and energy constrained with consistent energy. o No mobility of sensor nodes.](image-3.png "") 2![Figure 2 : A Snapshot of scenario setup for energy efficient Routing](image-4.png "Figure 2 :") 3![Figure 3 : Comparison of PDR% for existing and proposed methodology](image-5.png "Figure 3 :") 4![Figure 4 : Comparison of End to End Delay with existing and proposed methodology](image-6.png "Figure 4 :") ![Journal of Computer Science and TechnologyVolume XIV Issue VIII Version I (](image-7.png "") 6![Figure 6 : Comparison of Throughput with existing and proposed methodology VI.](image-8.png "Figure 6 :") Step 3 : Select random nodeVolume XIV Issue VIII Version I D D D D D D D D ) EMN i Ñ?" N for election message generation Step 4 : Measure Speed, Where Speed i = Dist / (t 2 -t 1 ) // t1 initial time, t2 Broadcast Time, D distance travel Step 5 : Broadcast Elected message Elct-msg(en i , MN i , Speed i ) // eni energy of i th node, Speed i is speed of i th node THEN IF (radio-range<=550 && neighbour == True) THEN { Record time at t n ; // t n time in second'sGlobal Journal of Computer Science and Technology (Get info MN[j][en j ][Speed j ] node number, en j energy , speed i speed of node // j pointer not equal I, j } Now Compare IF (MN[en i ] < MN[en j ] && MN[speed i ]> MN[speed j ]) THEN { MN i eliminate from competition Set new MN i = MN j ; New MN i will generate election msg; THEN Go to step 5: } Else { MN i , will act as a coordinator; } Else { Says ack as: Out of range; Get neighbour MN i-1 , MN i-2 , MN i+1 , MN i+2}After Group Formation how to sends data to group//Manage and broadcast group message throughcoordinator under MANETSet mobile node = M; // mobile node 1SimulatorNS-2.34Area900x900Nodes30PacketCBR/TCPSpeed0.45/packetInitial Energy.75 jouleSimulation Time400ProtocolAODVe) Scenario SetupTable 1 shows the simulation setup of ourproposed algorithm. In this Scenario setup there are 30mobile nodes placed defined with trajectory with 900m× 900m area. The simulation time was taken 400 sec.Here the locations of nodes are random with a speed of0.45/packet. © 2014 Global Journals Inc. (US) Node has been less/discharged energy, then stop to send packet to them Else Communication starts, then sends packets to them Group-msg(S, Mn, type) // type contain packet info { Search Mn nodes in radio range; Broadcast actual data to all group members Mn; } V. ## Experimental Results We have discussed an improved algorithm in previous section and it is compared with previous algorithm. The implementation of an algorithm is done in well known network simulator NS-2.34 [17]. The simulation environment is setup to simulate the algorithm in which we take an area of 900x900 to transmit the packet CBR/TCP protocol AODV is used * Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms SubramanianGanesh RamachandranAmutha Journal of Communications and Networks 15 4 august 2013 * Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks LuigiCoppolino D'Salvatore AlessiaAntonio LuigiGarofalo Romano Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2013 * Aggregating Secure Data In Wireless Sensor Networks KParameswari MMohamedRaseen International Conference on Current Trends in Engineering and Technology, ICCTET'13 in proceeding of IEEE * Reactive Security Scheme using Behavioral Aspects of Attacks for Wireless Sensor Networks AnushaRoshan Zameer Ahmed RCAnigol Biradar International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2013 in proceeding of IEEE * A secured energy efficient clustering and data aggregation protocol for wireless sensor network SudharsanOmprakash GiridharanNanthagopal SantoshKumar Omprakash American Journal of Computation, Communication and Control 1 1 2014 * Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks BelkadiMalika AoudjitRachida DaouiMehammed LalamMustapha I.J. Information Technology and Computer Science 01 2014 * Using mobile agent in clustering method for energy consumption in wireless sensor network SalmanBabaknikmard Taherizadeh International Conference on Computer and Communication Technology (ICCCT) 2010 * Optimal Energy-Based Clustering with GPS-Enabled Sensor Nodes KAli SNeogy PKDas Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM) 2010 * Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks DiTang TongtongLi JianRen JieWu 99 * Improving the Energy Efficiency of a Cluster Head Election for Wireless Sensor Networks Jong-YongLee KyedongJung HanminJung DaesungLee ID 305037 International Journal of Distributed Sensor Networks 2014 08 September 14-19, 2008. 2008 Hindawi Publishing Corporation incentive-compatible opportunistic routing for wireless networks * A Comprehensive Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks NaveenSharma AnandNayyar International Journal of Application or Innovation in Engineering & Management 2319-4847 3 1 January 2014 * Energyefficiency of MIMO and cooperative MIMO in sensor networks SCui AJGoldsmith ABahai IEEE J. Sel. Areas Communication 22 6 Aug. 2004 * Cross-layer design of energy-constrained networks using cooperative MIMO techniques SCui AGoldsmith EURASIP Signal Process. J 86 8 Aug. 2006 * Performance analysis of distributed space-time block encoded sensor networks MDohler YLi BVucetic AHAghvami MArndt DBarthel IEEE Trans. Veh. Technol 55 7 Nov. 2006 * P Beaulahsoundarabai JThriveni K RVenugopal L MPatnaik