Uploaded by krist

18-sensors-1

advertisement
sensors
Article
An Energy-Efficient Clustering Routing Protocol
Based on a High-QoS Node Deployment with an
Inter-Cluster Routing Mechanism in WSNs
Kaida Xu 1 , Zhidong Zhao 1,2,3, *, Yi Luo 1 , Guohua Hui 4 and Liqin Hu 5
1
2
3
4
5
*
School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China;
xukaidahdu@gmail.com (K.X.); luoyi@hdu.edu.cn (Y.L.)
Hangdian Smart City Research Center of Zhejiang Province, Hangzhou Dianzi University,
Hangzhou 310018, China
College of Electronics and Information, Hangzhou Dianzi University, Hangzhou 310018, China
Key Laboratory of Forestry Intelligent Monitoring and Information Technology of Zhejiang Province,
School of Information Engineering, Zhejiang A & F University, Linan 311300, China;
guohua_hui@zafu.edu.cn
Department of Construction Engineering, Zhejiang College of Construction, Hangzhou 311231, China;
huliqin98@gmail.com
Correspondence: zhaozd@hdu.edu.cn; Tel.: +86-135-8804-5453
Received: 29 April 2019; Accepted: 16 June 2019; Published: 19 June 2019
Abstract: Currently, wireless sensor network (WSN) protocols are mainly used to achieve low power
consumption of the network, but there are few studies on the quality of services (QoS) of these
networks. Coverage can be used as a measure of the WSN’s QoS, which can further reflect the quality
of data information. Additionally, the coverage requirements of regional monitoring target points
are different in real applications. On this basis, this paper proposes an energy-efficient clustering
routing protocol based on a high-QoS node deployment with an inter-cluster routing mechanism
(EECRP-HQSND-ICRM) in WSNs. First, this paper proposes formula definitions for information
integrity, validity, and redundancy from the coverage rate and introduces a node deployment strategy
based on twofold coverage. Then, in order to satisfy the uniformity of the distribution of cluster
heads (CHs), the monitoring area is divided into four small areas centered on the base station (BS),
and the CHs are selected in the respective cells. Finally, combined with the practical application of
the WSN, this paper optimizes the Dijkstra algorithm, including: (1) nonessential paths neglecting
considerations, and (2) a simultaneous introduction of end-to-end weights and path weights, achieving
the selection of optimal information transmission paths between the CHs. The simulation results
show that, compared with the general node deployment strategies, the deployment strategy of
the proposed protocol has higher information integrity and validity, as well as lower redundancy.
Meanwhile, compared with some classic protocols, this protocol can greatly reduce and balance
network energy consumption and extend the network lifetime.
Keywords: wireless sensor network; network coverage; quality of services; inter-cluster routing
mechanism; Dijkstra algorithm
1. Introduction
The wireless sensor network (WSN), which has exerted a great influence in the 21st century,
combines several advanced technologies, such as wireless communication and sensor technology,
to effectively achieve an interaction between human society and the physical world, resulting in a
profound impact on promoting social progress. WSNs currently have a wide range of applications in
Sensors 2019, 19, 2752; doi:10.3390/s19122752
www.mdpi.com/journal/sensors
Sensors 2019, 19, 2752
2 of 23
military defense, environmental monitoring, and smart homes. As the basic component of a WSN,
the sensor node is generally powered by a dry battery. Once the battery is exhausted, the node
is dead and cannot participate in subsequent data operations. If these nodes are placed in harsh
environments, it becomes impractical to replace the batteries. Therefore, how to effectively reduce the
energy consumption of sensor nodes for long-term operation has become a research hotspot [1].
It was under this context that the WSN clustering routing protocol came into being. The WSN
protocol combines a large number of sensor nodes into clusters to form a hierarchical management
system from cluster members (CMs) to cluster heads (CHs) to base stations (BS), which can effectively
reduce the energy consumption of the network, thus extending the lifetime of the network and
achieving more rounds of data iteration.
In recent years, researchers in various countries have proposed a variety of WSN clustering
routing protocols. The most classic protocol is LEACH (Low-Energy Adaptive Cluster Hierarchical) [2],
which achieves the goal of energy balance by periodically changing the CHs in the area. However,
because it adopts a random number mechanism, the suitability of the CH is full of uncertainties.
Hosen and Cho [3] proposed an energy center-based WSN routing mechanism that mainly grades
all nodes in the area according to the residual energy of the node and the average distance from the
member nodes then selects higher-level nodes to become the CHs. A hierarchical routing protocol
based on a k-d tree algorithm was proposed in [4], which uses a spatial partitioned data structure to
organize the nodes into clusters. A multi-aware query-driven (MAQD) routing protocol based on a
neuro-fuzzy inference system was introduced in [5]. An energy-aware cluster-based CRSN routing
protocol (EACRP) was introduced in [6], which considers several factors such as the energy and the
dynamic spectrum.
A multi-access WSN routing protocol based on the transmission power control applied to
underground coal mines was introduced in [7], which uses the transmission power control algorithm
to find the optimal transmission radius and transmission power, and the non-uniform clustering
idea is used to optimize the CH selection mechanism. An energy chain-based WSN routing protocol
(E-CBCCP) for underwater environments was introduced in [8].
Bozorgi et al. [9] combined static clustering and dynamic clustering, then took the nodes’ residual
energy, the energy required to receive the information, and the number of neighbor nodes into
consideration to select the CHs. The simulation results showed that, compared with other methods,
this method could improve the stability and efficiency of the network. The CH selection mechanism
introduced in [10] was divided into three stages: only the advanced node was selected as the CH in
Stage 1; all the nodes performed CH selection with the same probability in Stage 2; and the planar
topology replaced the clustering topology in Stage 3. The cluster structure optimization problem
was divided into multiple sub-optimization problems and solved by multi-objective evolutionary
algorithms (MOEAs) in [11]. Combining a new network structure model with the original energy
consumption model, a new method to determine the optimal number of clusters was proposed in [12],
and through the AGglomerative NESting (AGNES) algorithm, including: (1) introduction of distance
variance, (2) the dual-cluster heads (D-CHs) division of the energy balance strategy, and (3) the node
dormancy mechanism, it can achieve a reduction in the network energy consumption decay rate and
prolong the network lifetime.
In the process of cluster construction, we can also consider the use of principal component
analysis [13], fuzzy logic [1], K-means [14], Markov models [15], the introduction of mobile nodes [16,17],
etc., to construct a reliable and secure sensor network [18–20].
Meanwhile, it is necessary to consider the optimization problem of the information transmission
path between the CHs in the clustering process, which must involve the concept of multi-hops [21].
Common path optimization algorithms include the Dijkstra algorithm [22–24], the ant colony
optimization (ACO) algorithm [25], etc. Through the proper path optimization, the phenomenon of
premature death of the CHs and information congestion [26] could be alleviated effectively.
Sensors 2019, 19, 2752
3 of 23
In addition, a large amount of data is generated during the WSN’s environmental monitoring [27].
How to obtain the most complete and effective information possible while minimizing the amount of
redundant information is related to the WSN’s quality of service (QoS) [28]. How to build a compliant
WSN through a reasonable node deployment [17], [29,30] has also become one of the factors to consider
in the protocol. In [31], a clustering technique is proposed that uses the fuzzy c-means clustering
method for the formation of clusters and a cluster head is selected based on four parameters: sensor’s
location within cluster, location with respect to the fusion center (FC), its signal-to-noise (SNR), and its
residual energy.
In real life, a WSN often faces two problems: (1) There are often some monitoring targets in the
monitoring area that have key roles. Compared with other points, these targets often have higher
coverage requirements. Therefore, for these points we need to arrange more sensor nodes around
them to meet their coverage requirements. (2) With the continuous operation of the WSN, the CH
far from the BS tends to die prematurely due to the long transmission distance. Therefore, how to
build an energy-efficient and reliable information transmission path between the CHs is also worthy
of our attention. It is worth noting that the above two problems are still in [12]. The random node
deployment strategy in [12] does not guarantee the obtained information’s QoS and thus must not
meet the requirement of the QoS for the actual application. In addition, it does not consider the
inter-cluster routing mechanism, which will cause some CHs to deplete energy prematurely because of
the long transmission distances from the BS. From the perspective of the two aspects above, this paper
proposes an energy-efficient clustering routing protocol based on a high-QoS node deployment with an
inter-cluster routing mechanism (EECRP-HQSND-ICRM). The basic premise is as follows: For all the
monitoring target points with a coverage requirement of two, this paper proposes a series of definition
formulas for information integrity, validity, and redundancy and a node deployment strategy based
on twofold coverage. Subsequently, in order to satisfy the uniformity of the CH distribution, the BS
is divided into four small cells, and the CHs are selected in the respective cells. Finally, combined
with the practical application of the WSN, this paper optimizes the Dijkstra algorithm, including:
(1) nonessential path neglecting considerations, and (2) a simultaneous introduction of end-to-end
weights and path weights, achieving the selection of optimal information transmission paths between
the CHs.
The main contributions of this paper include the following:
•
•
•
•
A proposal for calculating the information integrity, validity, and redundancy based on coverage.
The determination of a node deployment strategy based on twofold coverage.
The construction of the CH selection mechanism through partition based on the uniformity of the
CH distribution, the residual energy of the nodes, and the distances from the nodes to the BS.
The optimization of Dijkstra to achieve Dijkstra’s computational complexity reduction.
The remainder of this paper is organized as follows: Section 2 introduces a node deployment
strategy based on twofold coverage. Section 3 describes the details of the protocol in the paper. The
simulation study is conducted in Section 4. Finally, Section 5 summarizes the research and prospects
for the future.
2. The Node Deployment Strategy Based on 2-Fold Coverage
In this section, we propose a series of calculation formulas for the coverage-based QoS metrics,
including information integrity, validity, and redundancy, according to the phenomenon of the different
coverage requirements of the monitoring target points in the real area. At the same time, we also
determine the node deployment strategy based on 2-fold coverage.
2.1. Coverage
As a key factor of the WSN’s QoS, coverage is defined as the proportion of target points that
all sensor nodes can monitor to the number of all target points in the area under the 0-1 perception
Sensors 2019, 19, 2752
4 of 23
Sensors
Sensors2019
2019
44 ofof 24
24
model in this paper, where the 0-1 perception model is a typical idealized model. The target within
perceived
radius
of
sensor
node
can
be
perceived
by
node,
but
the
target
outside
the
perceived
radius
ofthe
the
sensor
node
cancan
be100%
100%
perceived
bythe
thethe
node,
butbut
thethe
target
outside
the
the
perceived
radius
of the
sensor
node
be 100%
perceived
by
node,
target
outside
perceived
radius
cannot
be
perceived
by
the
sensor
node.
Figure
1
shows
a
typical
0-1
perception
perceived
radius
cannot
be
perceived
by
the
sensor
node.
Figure
1
shows
a
typical
0-1
perception
the perceived radius cannot be perceived by the sensor node. Figure 1 shows a typical 0-1 perception
model
diagram.
modeldiagram.
diagram.
model
0%
0%
100%
100%
Figure
Figure1.1.AAtypical
typical0-1
0-1perception
perceptionmodel
modeldiagram.
diagram.
The
coverage
isisas
as
follows:
Thecalculation
calculationformula
formulafor
forthe
thenetwork
networkcoverage
coverageis
asfollows:
follows:
P
(Ts)∆s
TT
ss ΔΔss

 (( ))
Coverage === P
.
Coverage
Coverage
∆sΔ s
Δ
 s
s∈S 
s∈S
s∈
sarea
∈SS
area
area
..
(1)
(1)
(1)
area
s∈
s ∈SSarea
area
In the above formula, s represents the monitoring target point, ∆S represents the area occupied
ΔΔSS representsthe
In
the
ssrepresents
the
target
Inmonitoring
theabove
aboveformula,
formula,
represents
themonitoring
monitoring
targetpoint,
point,
thearea
area
occupied
by the
target point,
Sarea represents
the monitoring
area, andrepresents
T(s) represents
the occupied
coverage
by
the
monitoring
target
point,
S
area
represents
the
monitoring
area,
and
T(s)
represents
the
coverage
by the monitoring
target point,
Sarea
represents
the monitoring
area, and T(s)
represents
the coverage
condition
of the monitoring
target
point
in the area.
If it can be monitored
by the
surrounding
sensor
condition
of
the
monitoring
target
point
in
the
area.
If
it
can
be
monitored
by
the
surrounding
sensor
condition
of
the
monitoring
target
point
in
the
area.
If
it
can
be
monitored
by
the
surrounding
sensor
nodes, then T(s) = 1; otherwise, T(s) = 0.
nodes,
nodes,then
thenT(s)
T(s)==1;1;otherwise,
otherwise,T(s)
T(s)==0.0.
2.2. The Difference in Coverage Requirements
2.2.
2.2.The
TheDifference
Differencein
inCoverage
CoverageRequirements
Requirements
In real-world applications, some key monitoring targets in the area often require more sensor
In
real-world
monitoring
in
area
often
more
sensor
nodes
monitor, applications,
that
is, their some
coverage
are higher
Figure
2 shows
a
Into
real-world
applications,
somekey
keyrequirements
monitoringtargets
targets
inthe
thethan
areaothers.
oftenrequire
require
more
sensor
nodes
that
is,
coverage
requirements
others.
Figure
shows
3-coverage
example.
If the
coverage
requirement
of the are
monitoring
target
is 2, then
the22information
nodesto
tomonitor,
monitor,
that
is,their
their
coverage
requirements
arehigher
higherthan
than
others.
Figure
showsaa33coverage
example.
IfIfthe
the
coverage
requirement
of
the
monitoring
target
then
the
information
will
will
be redundant.
number
coverage
example.If
thecoverage
coveragerequirement
requirementof
ofthe
themonitoring
monitoringtarget
targetisisis3,2,2,then
thenthe
thecoverage
information
will
be
redundant.
IfIfthe
coverage
requirement
of
the
monitoring
target
then
coverage
of
target point
meets
its requirement.
requirement
thethe
monitoring
target
is of
4,
bethe
redundant.
the
coverage
requirementIf
ofthe
thecoverage
monitoring
targetisis3,3,of
then
the
coveragenumber
number
of
the
point
meets
its
thetarget
target
point
meets
itsrequirement.
requirement.
Ifthe
thecoverage
coveragerequirement
requirementof
ofthe
themonitoring
monitoringtarget
targetisis4,4,then
then
then
a partial
loss
of valid
information If
occurs.
aapartial
partialloss
lossof
ofvalid
validinformation
informationoccurs.
occurs.
Monitoring
Monitoring
Target
Target
Monitoring
Monitoring
Range
Range
Sensor
Sensor
Nodes
Nodes
Figure
2.2.Threefold
Figure2.
Threefoldcoverage.
coverage.
Figure
Threefold
coverage.
2.3.
2.3.Coverage-Based
Coverage-BasedQoS
QoSMetrics
Metrics
In
Inthe
theprocess
processof
ofdefining
definingthe
thecoverage-based
coverage-basedQoS
QoSmetrics,
metrics,this
thispaper
paperisisbased
basedon
onthe
thefollowing
following
three
assumptions:
three assumptions:

•

•

During
each
iteration
round,
the
data
each
sensor
node
perceives
from
During
iteration
round,
the amount
of dataof
each
sensor
node
perceives
the environment
Duringeach
each
iteration
round,
the amount
amount
of
data
each
sensor
nodefrom
perceives
from the
the
environment
is
the same. isisthe
environment
thesame.
same.
the
0-1
perception
model.
Thesensory
sensorymodel
modelofofthe
thesensor
sensornode
nodeadopts
adoptsthe
the0-1
0-1perception
perceptionmodel.
model.
The
The
area
contains
a
large
number
of
monitoring
target
points,
and
The area contains a large number of monitoring target points, andthe
theoccupied
occupiedareas
areasof
ofthese
these
points
pointsare
areequal
equalin
insize.
size.
Sensors 2019, 19, 2752
•
5 of 23
The area contains a large number of monitoring target points, and the occupied areas of these
points are equal in size.
(1) Information Integrity: Information integrity is the percentage of the active ingredient in the
obtained information required for the entire monitoring area. The effective component, EIG, of the
information refers to information that is not greater than the target’s coverage requirement in the
obtained information, and the calculation formula is as follows:
X
EIG =
min(M(s), J (s))∆s,
(2)
s∈Sarea
In the above formula, M(s) and J(s) represent the coverage requirement and the actual coverage
number of the monitoring target point in the area, respectively.
The information required for the entire monitoring area, RIF, refers to the information that satisfies
all the coverage requirements, and its calculation formula is as follows:
X
RIF =
M(s)∆s,
(3)
s∈Sarea
The calculation formula for information integrity is as follows:
P
Integrity =
min(M(s), J (s))∆s
s∈Sarea
P
,
M(s)∆s
(4)
s∈Sarea
If the coverage requirement of all target points is 2, then the above formula can be modified to
min(2, J (s))∆s
P
Integrity =
s∈Sarea
P
2∆s
,
(5)
s∈Sarea
(2) Information Validity: Information validity is the percentage of the active ingredients in the
obtained information. The calculation formula is as follows:
P
min(M(s), J (s))∆s
Validity =
s∈Sarea
P
,
J (s)∆s
(6)
s∈Sarea
If the coverage requirement of all target points is 2, then the above formula can be modified to
min(2, J (s))∆s
P
Validity =
s∈Sarea
P
J (s)∆s
,
(7)
s∈Sarea
(3) Information Redundancy: Redundancy is the percentage of the redundant ingredients in the
obtained information. The calculation formula is as follows:
P
[ J (s) − min(M(s), J (s))]∆s
Redundancy =
s∈Sarea
P
s∈Sarea
J (s)∆s
= 1 − Validity,
(8)
Sensors 2019, 19, 2752
6 of 23
Sensors
2019Deployment
2.4. Node
6 of 24
Sensors 2019
6 of 24
From the
the three
three coverage-based
coverage-based QoS
QoS metrics
metrics proposed
proposed above,
above, aa node
node deployment
deployment strategy
strategy needs
needs
From
to
improve
information
integrity
and
validity,
as
well
as
reduce
information
redundancy
as
much
From the
three coverage-based
metrics
above,
a node deployment
strategy
needs
to improve
information
integrity andQoS
validity,
as proposed
well as reduce
information
redundancy
as much
as
as
possible. information integrity and validity, as well as reduce information redundancy as much as
to improve
possible.
According to
a 1-fold
coverage-based
node
deployment,
if the
possible.
According
to existing
existingresearch,
research,when
whenconducting
conducting
a 1-fold
coverage-based
node
deployment,
if
full
coverage
condition
is
satisfied
and
the
number
of
nodes
in
the
area
is
minimized,
it
is
necessary
According
to condition
existing research,
when
conducting
a 1-fold
coverage-based
deployment,
if
the full
coverage
is satisfied
and
the number
of nodes
in the areanode
is minimized,
it is
to
full
ofcondition
the use
coverage
disk
of each
node;
that node;
is,of
thenodes
overlapping
area is
between
nodes
themake
full coverage
satisfied
and
theofnumber
theoverlapping
area
minimized,
it is
necessary
to use
make
full
ofisthe
coverage
disk
each
that
is,inthe
areathe
between
should
be as
as
possible.
This
study This
found
that
the effect
constructing
a hexagonal
necessary
to small
makebe
full
use ofasthe
coverage
disk
of each
node;
is, theofoverlapping
area
between
the
nodes
should
as
small
possible.
study
found
thatofthat
the
effect
constructing
ahoneycomb
hexagonal
grid
is
optimal.
Based
on
this,
we
propose
a
2-fold
coverage-based
node
deployment
strategy
in a
the nodes should
beoptimal.
as small as
possible.
Thiswe
study
founda that
thecoverage-based
effect of constructing
a hexagonal
honeycomb
grid is
Based
on this,
propose
2-fold
node deployment
cellular
network
for
the
case Based
where
the
coverage
requirement
of
all monitoring
nodes
in the
honeycomb
is optimal.
on
this,
we propose
a 2-fold
coverage-based
node
deployment
strategy
in a grid
cellular
network
for the
case
where
the
coverage
requirement
of alltarget
monitoring
target
region
is
2,
as
shown
in
Figure
3.
strategy
cellularisnetwork
for the
case where
the coverage requirement of all monitoring target
nodes
in in
thea region
2, as shown
in Figure
3.
nodes in the region is 2, as shown in Figure 3.
Figure 3.
schematic
diagram
of a of
2-fold
coverage-based
node deployment
strategystrategy
in a cellular
3. A A
schematic
diagram
a 2-fold
coverage-based
node deployment
in a
Figure 3.
A schematic diagram of a 2-fold coverage-based node deployment strategy in a cellular
network.
cellular
network.
network.
node deployment
deployment strategy
strategy in
in this
this paper
paper is
is based
based on
on aacellular
cellularnetwork.
network.
As shown in Figure 4, the node
steps in
areFigure
as follows:
As shown
4, the node deployment strategy in this paper is based on a cellular network.
The main
The main steps are as follows:
(1) A
A cellular
cellular network
network is
is built
built in
in the
the monitoring
monitoring area.
area.
(1)
A
cellular
network
is
built
in
the
monitoring
area.
(2) The
The sensor
sensor nodes
nodes are
are arranged
arranged at
at the
the upper
upper left,
left, upper
upper right,
right, and lower middle vertices of the
(2) grid.
The
at the upper left,
upper
right, and
lower middle vertices of the
At
point,
the
1-fold
node
deployment
is
grid.sensor
Atthis
thisnodes
point,are
thearranged
1-foldcoverage-based
coverage-based
node
deployment
is completed.
completed.
grid.
At
this
point,
the
1-fold
coverage-based
node
deployment
is
completed.
(3)
(3) The
Thesensor
sensor nodes
nodes are
are arranged
arranged at the
the vertices
vertices of the center of the grid. At
At this
this point,
point, the
the 2-covered
2-covered
(3) node
The
sensor
nodes are arranged at the vertices of the center of the grid. At this point, the 2-covered
is
node
is deployed.
deployed.
node is deployed.
Figure 4. A schematic diagram of the node deployment for a single cellular grid.
Figure 4. A schematic diagram of the node deployment for a single cellular grid.
3. The Clustering Protocol
3.
The Clustering
Clustering Protocol
Protocol
3. The
The main steps of the clustering protocol in this paper are as follows:
The
The main
main steps
steps of
of the
the clustering
clustering protocol
protocol in
in this
this paper
paper are
are as
as follows:
follows:
(1) The sensor nodes in the area are deployed according to the 2-fold coverage-based node
(1) deployment
The sensor strategy
nodes inintroduced
the area are
deployed
in Section
2. according to the 2-fold coverage-based node
deployment strategy introduced in Section 2.
Sensors 2019, 19, 2752
(1)
7 of 23
The sensor nodes in the area are deployed according to the 2-fold coverage-based node deployment
7 of 24
introduced in Section 2.
Centering on the BS, the monitoring area is divided into four small cells, and a certain number of
Centering on the BS, the monitoring area is divided into four small cells, and a certain number
CHs in each cell are selected to meet the uniformity of the CHs distribution.
of CHs in each cell are selected to meet the uniformity of the CHs distribution.
All CHs send broadcasts to the surrounding ordinary nodes, and the latter sequentially add the
All CHs send broadcasts to the surrounding ordinary nodes, and the latter sequentially add the
clusters to which the strongest signals belong according to the strength of the signals received,
clusters to which the strongest signals belong according to the strength of the signals received,
notifying the corresponding CHs to complete the cluster construction.
notifying the corresponding CHs to complete the cluster construction.
Combined with practical applications, this paper optimizes the Dijkstra algorithm to achieve the
Combined with practical applications, this paper optimizes the Dijkstra algorithm to achieve the
selection of optimal information transmission paths among the CHs.
selection of optimal information transmission paths among the CHs.
Data
Dataare
aretransmitted
transmittedand
andenergy
energyisisupdated.
updated.
Sensors
2019
strategy
(2)
(2)
(3)
(3)
(4)
(4)
(5)
(5)
To
the energy
energy consumption
consumptionof
ofthe
thenodes
nodesin
Tominimize
minimizethe
thetotal
totalenergy
energyconsumption
consumption and
and balance
balance the
inthe
thenetwork,
network,we
we
reselect
the
CHs
in
the
area
after
each
round
of
data
transmission.
Additionally,
reselect the CHs in the area after each round of data transmission. Additionally, Step
Step
is called
the node
deployment
phase
the protocol,
3 are collectively
the
1 is 1called
the node
deployment
phase
of theofprotocol,
StepsSteps
2 and23and
are collectively
calledcalled
the cluster
cluster
of protocol,
the protocol,
Step
4 iscalled
calledthe
the inter-cluster
inter-cluster routing
setup setup
phasephase
of the
andand
Step
4 is
routing mechanism
mechanism(ICRM)
(ICRM)
establishment
phase
of
the
protocol.
Steps
2,
3,
and
4
are
collectively
called
the
preparation
phase
establishment phase of the protocol. Steps 2, 3, and 4 are collectively called the preparation phaseofof
the
theprotocol.
protocol.Finally,
Finally,Step
Step5 5isiscalled
calledthe
thestabilization
stabilizationphase
phaseofofthe
theprotocol.
protocol.
Before
Beforeentering
enteringthe
thestabilization
stabilizationphase,
phase,the
theCH
CHofofeach
eachcluster
clusterneeds
needstotocreate
createa acorresponding
corresponding
time
division
multiple
access
(TDMA)
schedule
and
send
a
control
message
named
Schedule_Msg
time division multiple access (TDMA) schedule and send a control message named Schedule_Msgtoto
itsitsmember
membernodes
nodesininthe
theform
formofof(Node
(NodeNO.1,
NO.1,Time
TimeSlot
Slot1;1;Node
NodeNO.2,
NO.2,Time
TimeSlot
Slot2;......).
2;......).The
Thetime
timeslot
slot
allocation
of
the
clustering
routing
protocol
in
this
paper
is
provided
in
Figure
5.
A
flowchart
of
the
allocation of the clustering routing protocol in this paper is provided in Figure 5. A flowchart of the
clustering
6.6.
clusteringrouting
routingprotocol
protocolininthis
thispaper
paperisispresented
presentedininFigure
Figure
Node Deployment Preparation
Phase
Phase
Slot for CH1
Slot for Member
Node1 of CH1
Slot for Member
Slot for CH2
Nodec1 of CH1
Clusters Setup
Time
Inter-Cluster Routing Mechanism Setup
Figure5.5.The
Thetime
timeslot
slotallocation
allocationofofthe
theclustering
clusteringprotocol.
protocol.CH—cluster
CH—clusterhead.
head.
Figure
3.1. CH Selection
In the traditional protocols, while selecting the CHs, the residual energy and position of the node
are often neglected, resulting in an uneven final distribution of the selected CHs, among which the
CHs with lower residual energy tend to die prematurely.
In Figure 7, the green dot is the CH, and the red dot is the BS. It can be determined that in the
process of CH selection, the LEACH protocol will generate a serious phenomenon of an uneven CH
distribution, resulting in a relatively large distance between the CH and its member node, which
inevitably has an unfavorable effect on the extension of the
Sensors 2019
8 of 24
Start
Sensors 2019, 19, 2752
Sensors 2019
8 of 23
8 of 24
Node deployment based
on 2-fold coverage
Start
Division of
monitoring area
Node deployment based
on 2-fold coverage
CHs
CH Selection
selection
of
inDivision
each area
monitoring area
Cluster Setup Phase
i=1
Cluster Setup Phase
CHs
CH Selection
selection
in each area
Yes
Node i is a CH?
i=1
Data Transmission
Phase
Inter-Cluster Routing
Data Transmission
Mechanism Setup
Phase
Phase
No
Yes
Inter-Cluster
i<n? Routing
Mechanism Setup
Phase
No
Broadcast CH message
to the nodes nearby
Yes
Receive the message
broadcast
CHs
Node i isby
a CH?
Receive clustering request
from member
nodes
Broadcast
CH message
to the nodes nearby
Join the clusterNowith the
strongest
Receive
the signal
message
broadcast by CHs
Create a TDMA schedule and
Receive
clustering
send
it to the
memberrequest
nodes
from member nodes
Receive the Schedule_Msg
Join the cluster
the
message
sent bywith
the CH
strongest signal
No
Yes
i<n?
i++
i++
Create a TDMA schedule and
Receive the Schedule_Msg
send it to the member nodes
message sent by the CH
Figure 6. Flowchart of the clustering protocol, including node deployment, CHs selection, cluster
setup, and data transmission.
3.1. CH Selection
In
the traditional
protocols,
while selecting
CHs, the
residual
energyCHs
and selection,
position
the node
Figure
6.
of the
protocol,
including
node
deployment,
cluster
Figure
6. Flowchart
the clustering
clustering
protocol,the
including
node
deployment,
CHs
selection, of
cluster
are often
neglected,
resulting
in
an
uneven
final
distribution
of
the
selected
CHs,
among
which
the
setup,
setup, and
and data
data transmission.
transmission.
CHs with lower residual energy tend to die prematurely.
network
lifetime.
3.1. CH
Selection
In the traditional protocols, while selecting the CHs, the residual energy and position of the node
are often neglected, resulting in an uneven final distribution of the selected CHs, among which the
CHs with lower residual energy tend to die prematurely.
Figure 7. The three rounds of uneven CH distributions generated by the LEACH (Low-Energy Adaptive
Cluster Hierarchical) protocol.
distribution, resulting in a relatively large distance between the CH and its member node, which
inevitably has an unfavorable effect on the extension of the network lifetime.
Based on this phenomenon, this paper uses the BS as the center and divides the area into four
small cells. Then, based on the idea of CH selection in [31], combining the residual energy of a node
Sensors
19, 2752 from the node to the BS, we can construct a CH selection factor and select the
9 of top
23
with2019,
the distance
25% of the CH selection factors as the CHs in each of the small cells. The formula for the CH selection
factor is as follows:
Based on this phenomenon, this paper uses the BS as the center and divides the area into four
small cells. Then, based on the idea of CH
i selection in [31], combining the
i residual energy of a node
,
SCH E (i ),dtoBS
= α ⋅ Nor(E (i )) + β ⋅ Nor dtoBS
(9)
with the distance from the node to the BS, we can construct a CH selection factor and select the top
25% of the CH selection factors as the CHs in each of the small cells. The formula for the CH selection
In the above formula, α and β represent weight factors, where α + β = 1 ; E (i ) represents
factor is as follows:
i
i
i
represents
the
distance
from
node i to the BS. Nor(9)
()
the residual energy of node
(
(
))
SCH Ei;(i),ddtoBS
=
α
·
Nor
E
i
+
β
·
Nor
d
toBS
toBS ,
represents the normalization. The larger the value of SCH of node i, the more likely it is to be
In the above formula, α and β represent weight factors, where α + β = 1;E(i) represents the
selectedenergy
as the CH.
residual
of node i; ditoBS represents the distance from node i to the BS. Nor() represents the
Through The
the larger
mechanism,
an of
appropriate
of nodes
residual
energy
normalization.
the value
SCH of nodeamount
i, the more
likely with
it is tolarger
be selected
as the
CH. and
shorter
distances
from
the
BS
are
selected
as
CHs
in
each
small
area,
which
can
better
ensure
that
Through the mechanism, an appropriate amount of nodes with larger residual energy and shorter
there is afrom
closethe
transmission
distance
between
each
CM area,
and the
CH of
joined
cluster.
It there
avoidsisthe
distances
BS are selected
as CHs
in each
small
which
canthe
better
ensure
that
a
loss
of
too
much
residual
energy
of
some
nodes
due
to
its
large
transmission
distance.
Figure
8
shows
close transmission distance between each CM and the CH of the joined cluster. It avoids the loss of
a CH
distribution
diagram
of thenodes
protocol
It can be determined
the8distribution
too
much
residual energy
of some
dueintothis
its paper.
large transmission
distance. that
Figure
shows a CHof
the CHs is diagram
relativelyofuniform
and can
meet
the low
power
consumption
network. of the CHs
distribution
the protocol
in this
paper.
It can
be determined
that of
thethe
distribution
is relatively uniform and can meet the low power consumption of the network.
(
)
(
)
Figure
Figure8.8.AACH
CHdistribution
distributiondiagram
diagramofofthe
theprotocol
protocolininthis
thispaper.
paper.
3.2. Energy Consumption Model
3.2. Energy Consumption Model
This paper adopts the energy consumption model proposed in [32]. In the process of information
This paper adopts the energy consumption model proposed in [32]. In the process of information
transmission, the model contains two additional models based on the transmission distance: the free
transmission, the model contains two additional models based on the transmission distance: the free
space model and the multipath fading channel model.
space model and the multipath fading channel model.
ET (l, d) represents the energy consumed by wirelessly transmitting an l-bit message. The expression
ET (l , d ) represents the energy consumed by wirelessly transmitting an l-bit message. The
is as follows:
(
expression is as follows:
l · Eelec + l · ε f s · d2 , d < d0
ET (l, d) =
,
(10)
l · Eelec + l · εmp · d4 , d ≥ d0
In the above formula, Eelec represents the energy consumed per bit by the transmitter or receiver
circuit, d represents the transmission distance between the transmitter and the receiver, ε f s and εmp
represent the energy factor per bit in the free space model and the multipath fading channel model,
respectively, l represents the size of the information, and d0 represents the transmission distance
threshold, which is calculated as follows:
s
d0 =
εfs
εmp
(11)
Sensors 2019, 19, 2752
10 of 23
ER (l) represents the energy consumed by receiving an l-bit message. The expression is as follows:
s
d0 =
εfs
εmp
ER (l) = l · Eelec ,
(12)
Next we can calculate the energy consumed by the CH and the energy consumed by the CM
in a cluster according to the energy consumption model. During the operation of the WSN, the CM
is responsible for transmitting the information sensed from the environment to the corresponding
CH. In general, the transmission distance dtoCH is less than d0 . Therefore, the corresponding energy
consumption EMem is calculated as follows:
EMem = l · Eelec + l · ε f s · d2toCH ,
(13)
On the other hand, the CH is also responsible for receiving and fusing the information of the CMs
of the cluster and finally transmitting the information after completing the fusion to the BS for decision
making. The energy ECH consumed by the CH is divided into three parts: the energy ECH_R consumed
by receiving, the energy ECH_FU consumed by fusing, and the energy ECH_T consumed by transmitting.
The formulas of the above three are shown as 14, 15, and 16.
ECH_R = k · l · Eelec ,
(14)
In the above formula, k represents the number of CMs in the cluster.
ECH_FU = (k + 1) · l · EDA ,
(15)
In the above formula, EDA represents the energy consumption of each bit of data processed by the
CH. Since the CH itself can also sense the surrounding environment information, plus the information
of the k · l size received from the CMs, the total information of the (k + 1) · l size needs to be processed.
(
ECH_T = l · Eelec +
l · ε f s · d2toBS ,
l · εmp · d4toBS ,
dtoBS < d0
,
dtoBS ≥ d0
(16)
In the above formula, dtoBS represents the distance between the CH and the BS. After information
fusion, the original information of the (k + 1) · l size is compressed into the size of l.
Therefore, the energy ECH consumed by the CH is as follows:
(
ECH = ECH_R + ECH_FU + ECH_T = k · l · Eelec + (k + 1) · l · EDA + l · Eelec +
l · ε f s · d2toBS ,
l · εmp · d4toBS ,
dtoBS < d0
,
dtoBS ≥ d0
(17)
3.3. The Dijkstra Algorithm
The Dijkstra algorithm is a routing algorithm proposed by the Dutch computer scientist Dijkstra
in 1959 to solve the shortest path optimization problem between the source point and the remaining
points in the directed graph. The algorithm takes a greedy strategy, and its main steps are as follows:
(1)
(2)
Construction of an initial weight matrix
Updating the weight
Suppose there are n vertices in the region, and the set of vertices is T = {1,2,...,n}. In Step 1, we have
n2 initial weights, and a two-dimensional matrix W is used to store the n2 initial weights, where W(i,j)
represents the weight of point i to point j. It is only if point i and point j can directly convey information
to one another that W(i,j) = W(j,i). Otherwise, only point i can transmit information directly to point j,
and point j cannot directly transmit information to point i, so W(i,j) is a finite positive number, and
W(j,i) has a value of positive infinity. For i = 1,2, . . . ,n, W(i,i) = 0.
Suppose there are n vertices in the region, and the set of vertices is T={1,2,...,n}. In Step 1, we have
n2 initial weights, and a two-dimensional matrix W is used to store the n2 initial weights, where W(i,j)
represents the weight of point i to point j. It is only if point i and point j can directly convey
information to one another that W(i,j)=W(j,i). Otherwise, only point i can transmit information
Sensors 2019, 19, 2752
11 of 23
directly to point j, and point j cannot directly transmit information to point i, so W(i,j) is a finite
positive number, and W(j,i) has a value of positive infinity. For i = 1,2,…,n, W(i,i) = 0.
InInStep
Step2,2,we
wefirst
firstdetermine
determinethe
thesource
sourcepoint
points, s,then
thenestablish
establishthe
thevertex
vertexsetsetP Pofofthe
theknown
known
shortest
paths
and
thethe
vertex
setset
Q of
unknown
shortest
paths.
NowNow
P={s},Pand
Q=T-P.
Here,
shortest
paths
and
vertex
Q the
of the
unknown
shortest
paths.
= {s},
and Q
= Twe
− P.
declare
an declare
array disantoarray
storedisthe
weight
the source
s to
thesremaining
points.points.
The
Here, we
to initial
store the
initialofweight
of thepoint
source
point
to the remaining
representation
of dis is
in Figure
9.
The representation
of shown
dis is shown
in Figure
9.
dis
1
2
n
W(s,1)
W(s,1)
W(s,n)
Figure
9. 9.
The
representation
ofof
dis.
Figure
The
representation
dis.
Then,
from
itself
totos from
Then,we
wecan
canfind
findthe
thevertex
vertexx xwith
withthe
thesmallest
smallestweight
weight
from
itself
s fromQ,Q,then
thenremove
removex x
from
it it
toto
P,P,and
the
fromQ,Q,add
add
andcompare
comparewhether
whetherthe
thesum
sumofofthe
theweights
weightsfrom
frompoint
points to
s topoint
pointx xtotoone
oneofof
the
other
points
i isi smaller
than
thethe
weight
of point
s to spoint
i directly.
If yes,Ifthen
other
points
is smaller
than
weight
of point
to point
i directly.
yes, W(s,i)=W(s,x)+W(x,i),
then W(s,i) = W(s,x) +
and
we replace
corresponding
value W(s,i)
in dis.
Then,
we can
find
vertex
y with
the ysmallest
W(x,i),
and wethe
replace
the corresponding
value
W(s,i)
in dis.
Then,
wethe
can
find the
vertex
with the
weight
from
itselffrom
to s from
y from
Q, yand
add
to P,
repeating
the previous
steps until
P
smallest
weight
itselfQ,
to remove
s from Q,
remove
from
Q,itand
add
it to P, repeating
the previous
steps
contains
all the vertexes
in the graph.
until P contains
all the vertexes
in the graph.
The
Thedetail
detailprocedure
procedureofofthe
theDijkstra
Dijkstraalgorithm
algorithmisisgiven
givenby
bythe
thepseudocode
pseudocodeininAlgorithm
Algorithm1.1.
Algorithm 1. Dijkstra Algorithm
Algorithm 1. Dijkstra Algorithm
Inputs: (1) n2 weights
Inputs:(2) (1)
n2 weights
vertex
set, T
(2)
vertex
set, T
Result: an array of weights
from source point to remaining points, dis
Result:
an
array
of
weights
from source point to remaining points, dis
1: for i = 1 → n
for i = 1 → n
2: 1:for
j=1→n
2: for j = 1 → n
3: W(i, j) = weight from Point i to Point j;
3:
W(i, j) = weight from Point i to Point j;
4: end for
4: end for
5: end
for
5: end for
6: determine
the
theregion,
region,s;s;
6: determine
thesource
sourcepoint
point in
in the
7: P7:=P{s},
Q
=
T
P;
= {s}, Q = T − P;
8: dis
= [W(s,
1),1),
W(s,
2),2),…,
8: dis
= [W(s,
W(s,
. . .W(s,
, W(s,n)];
n)];
9: while
(Q(Q
~=~=
Ø)Ø)
9: while
vertex
x withthe
thesmallest
smallest weight
vertex
s from
Q; Q;
10: 10:findfind
thethe
vertex
x with
weightfrom
fromthe
the
vertex
s from
+ {x},
- {x};
11: 11:P = PP =+ P{x},
Q =QQ=-Q{x};
12: 12:for for
i = 1i =→1 n→ n
13:
if i is in Q
14:
if W(s, i) > W(s, x) + W(x, i)
15:
W(s, i) = W(s, x) + W(x, i);
16:
update the corresponding value, W(s, i) in dis;
17:
end if
18:
end if
19: end for
20: end while
3.4. Inter-Cluster Routing Mechanism
In this section, we optimize the Dijkstra algorithm: when defining the weights, we ignore the
consideration of the nonessential paths, thus reducing the computational complexity and achieving
the selection of optimal information transmission paths among the CHs.
(1) The Definition of Weights: First, based on the energy consumption of the nodes in the network
during data transmission, we propose formulas for calculating the weight between the end-to-end and
the path weight.
Sensors 2019, 19, 2752
12 of 23
The calculation formula for the weight between the end-to-end is as shown in (18):

2


 l · Eelec + l · ε f s · d(i, j) ,
W (i, j) = ET (l, d(i, j)) = 

 l · Eelec + l · εmp · d(i, j)4 ,
d(i, j) < d0
d(i, j) ≥ d0
(18)
In the above formula, d(i,j) represents the distance between node i and node j, and the weight
between the two is directly represented by the required energy consumption for transmitting information
between the two.
The calculation formula for the path weight is as shown in (19):
n
1 X
W (Mi , Mi+1 ),
W (Path(M1 , Mn+1 )) = ·
n
(19)
i=1
In the above formula, we can obtain the weight of the path W (Path(M1 , Mn+1 )), in which the
information starting point is node M1 , which passes through M2 , M3 ... in order and finally reaches
node Mn + 1 .
Because in the WSN applications information ultimately needs to be transmitted to the BS, the
path is the information transmission path from a CH to the BS in the area. Thus, (19) can be modified to:
1
W (Path(M1 , BS)) =
n
 n−1

X


· 
W (Mi , Mi+1 ) + W (Mn , BS),
(20)
i=1
(2) The Neglect Consideration of Non-Essential Paths: As described in Section 3.4, the Dijkstra
algorithm mainly selects the optimal path by focusing on the starting point and expanding the outer
layer. However, when the optimal path traverses the set Q, it often generates some unnecessary weight
calculations. As an example of a WSN, as shown in Figure 10, it is obvious that the distance d(i,x) from
node i to node x is larger than the distance d(i,BS) from node i to the BS. If node x acts as the relay node
of node i, unnecessary energy consumption will be generated. When the path of node i to the BS is
selected by the Dijkstra algorithm, the BS serves as the source point s. When the BS selects the node
with the smallest weight from itself, once x is selected, the values of W(BS,i) and W(BS,x) + W(x,i) are
inevitably compared. As mentioned above, x must not act as the relay node between node i and the BS,
Sensors 2019
13 of 24
which inevitably causes redundant calculations.
x
d(x,BS)
BS
d(i,x)
d(i,BS)
i
Figure
Figure10.
10.Schematic
Schematicdiagram
diagramofofinformation
informationtransmission
transmissionbetween
betweennodes.
nodes.BS—base
BS—basestation.
station.
Basedon
onthis,
this,we
wecould
couldignore
ignorethis
thissituation
situationin
inthe
theprocess
processofofoptimizing
optimizingDijkstra,
Dijkstra,thus
thusreducing
reducing
Based
the
computational
complexity.
In
addition,
the
Dijkstra
algorithm
selects
the
node
x
closest
tothe
the
the computational complexity. In addition, the Dijkstra algorithm selects the node x closest to
source
point
s
from
the
set
Q
as
a
multi-hops
relay
node,
and
then
whether
other
nodes
in
the
set
source point s from the set Q as a multi-hops relay node, and then whether other nodes in the set QQ
haveaabetter
bettermulti-hops
multi-hopseffect
effectthrough
throughthe
thenode
nodexxisisdetermined,
determined,thereby
therebycontinuously
continuouslyupdating
updatingthe
the
have
weights and selecting the optimal information transmission paths. From another point of view, in the
process of optimizing Dijkstra, we order all the CHs according to distance from the BS to form an
ordered set of CHs, then we traverse the CHs, and each CH is respectively judged with the previous
CHs by the path weights until all the CHs in the area find the optimal information transmission paths
to the BS.
Sensors 2019, 19, 2752
13 of 23
weights and selecting the optimal information transmission paths. From another point of view, in the
process of optimizing Dijkstra, we order all the CHs according to distance from the BS to form an
ordered set of CHs, then we traverse the CHs, and each CH is respectively judged with the previous
CHs by the path weights until all the CHs in the area find the optimal information transmission paths
to the BS.
The detailed procedure of the Optimized Dijkstra algorithm in the WSN is given by the pseudocode
in Algorithm 2.
Algorithm 2. Optimized Dijkstra Algorithm in WSN
Inputs: (1) CHs set, T
(2) the coordinate of BS, (BS.x, BS.y)
Result: (1) the set of the next hop CH of each CH, NH
(2) path set from each CH to BS, PA
(3) an array of path weights from remaining nodes to BS, dis
1: for i = 1 → n
2: for j = 1 → n
3:
W(i,j) = weight from Node i to Node j according to (14);
4: end for
5: end for
6: dis = [W(1, BS), W(2, BS), . . . , W(n, BS)]T , NH(1) = BS, PA(1) = {BS};
7: sort all CHs in T in order of the distances from the BS to form an ordered set, CHs;
8: initialize an array of the hop number for each CH, HP = [1,1, . . . ,1]n ;
9: for i = 2 → length(CHs)
10: for j = 1 → i − 1
11:
if d(i, j) < d(i, BS)
12:
if W(Path(j, BS))*HP(j) + W(i, j) < W(i, BS)*(HP(j)+1)
13:
W(i, BS) = [W(Path(j, BS))*HP(j) + W(i, j)]/(HP(j)+1);
14:
HP(i) = HP(j) + 1, NH(i) = CHs(j), PA(i) = PA(j) + {CHs(i)};
15:
update the corresponding value, W(i,BS) in dis;
16:
end if
17:
end if
18: end for
19: end for
4. Simulation Results
In this section, we evaluate the proposed protocol by simulation using Spyder (Python 3.6) on a
desktop PC (Lenovo, made in Beijing, China) with Intel(R) Core (TM) i3-4170 CPU @ 3.70 GHz, 8GB
RAM. The BS of this paper is located at coordinates (50, 45), and the area is a square of 100 m × 90 m.
The specific simulation parameters are shown in Table 1. (Note that J in this paper stands for Joule,
which is a unit of energy.)
We mainly compare the node deployment strategy proposed in this paper with the random node
deployment strategy, the uniform node deployment strategy, and the 1-fold coverage-based node
deployment strategy in a cellular network in terms of coverage, information integrity, information
validity, and information redundancy. At the same time, this paper selects three classic protocols,
including LEACH, Distribute Energy-Efficient Clustering (DEEC), and Group-Based Sensor Network
(GSEN). Then, the protocol of this paper (EECRP-HQSND-ICRM) is compared with the three protocols
and the protocol without the inter-cluster routing mechanism (ICRM) of this paper (EECRP-HQSND) to
compare the network lifetime, network coverage, information integrity, network energy consumption,
the iteration round at which the WSN starts to decline, and the network throughput to reflect the
advantages of the protocol in this paper, and especially the feasibility of the ICRM.
Sensors 2019, 19, 2752
14 of 23
Table 1. Simulation parameters.
Parameter
Value
Eelec
EDA
εfs
εmp
The size of monitoring area
The coordinate of BS
Initial number of nodes, N
Size of message, l
Initial energy
Perceptual radius, R
50 nJ/bit
5 nJ/bit/message
10 pJ/bit/m2
0.0013 pJ/bit/m4
100 m*90 m
(50, 45)
91
4000 bits
0.5 J
10 m
4.1. Comparison of the QoS of the Node Deployment Strategies
In this section, we mainly compare the node deployment strategy proposed in this paper
with the random node deployment strategy, the uniform node deployment strategy, and the 1-fold
coverage-based node deployment in a cellular network in terms of coverage, information integrity,
information validity, and information redundancy to reflect the advantages of the node deployment
strategy proposed in this paper.
4.1.1. Node Distribution of the Node Deployment Strategies
Figures 11–14 show the node distribution diagrams of the random node deployment strategy, the
uniform node deployment strategy, the 1-fold coverage-based node deployment strategy in the cellular
network,
and the node deployment strategy of this paper. The blue point represents the sensor
Sensors 2019
15 ofnode,
24
the red point represents the BS, each black circle represents the sensing range of each sensor node, and
the redSensors
square
2019is the monitoring area. It can be determined that in order to satisfy the coverage
15 of of
24 the
WSN, some of the nodes in Figures 13 and 14 are located outside of the area.
Figure 11. The node distribution diagram of the random node deployment strategy.
Figure
11. The
node
distribution
diagramofofthe
therandom
random node
strategy.
Figure
11. The
node
distribution
diagram
nodedeployment
deployment
strategy.
Figure
12.12.The
the uniform
uniformnode
nodedeployment
deploymentstrategy.
strategy.
Figure
Thenode
nodedistribution
distribution diagram
diagram of the
Figure 12. The node distribution diagram of the uniform node deployment strategy.
Figure 12. The node distribution diagram of the uniform node deployment strategy.
Sensors 2019, 19,Figure
2752 12. The node distribution diagram of the uniform node deployment strategy.
15 of 23
Figure 13. The node distribution diagram of the 1-fold coverage-based node deployment strategy in
a cellular
network.
Figure
deployment
strategy
in in
a
Figure13.
13. The
Thenode
nodedistribution
distributiondiagram
diagramofofthe
the1-fold
1-foldcoverage-based
coverage-basednode
node
deployment
strategy
cellular
network.
a cellular
network.
Figure 14. The node distribution diagram of the node deployment strategy proposed in this paper.
4.1.2. QoS of the Node Deployment Strategies
According to the calculation formulas of the coverage-based QoS metrics introduced in Section 2.3,
we compare the coverage, the information integrity, the information validity, the information
redundancy, and the number of sensor nodes of the four node deployment strategies above. The specific
results are shown in Table 2.
Table 2. Comparison of the quality of service (QoS) of the four node deployment strategies.
Strategy
Coverage
Integrity
Validity
Redundancy
Amount
Random
Uniform
1-Coverage
Cellular Grid
Our Strategy
94.233%
100%
86.689%
100%
58.854%
63.134%
41.146%
36.866%
91
110
100%
59.833%
99.889%
0.111%
46
100%
100%
83.480%
16.520%
91
As can be seen from Table 2, in terms of coverage, the random node deployment strategy only
reaches 94.233%, while the other three deterministic node deployment strategies reach 100%. In terms
of information validity and redundancy, we find that the 1-fold coverage-based node deployment
strategy in a cellular network achieves the best effect; that is, this strategy can make the obtained
information have a high validity and a low redundancy, which is the main reason why it is widely
used in the case of 1-fold coverage requirements. However, the strategy’s information integrity under
the 2-coverage requirement is only 59.833%, which obviously cannot meet the basic requirements of
the project. In terms of information integrity, the uniform node deployment strategy and the node
deployment strategy of this paper both reach 100%. However, compared with the 63.134% information
validity, 36.866% information redundancy, and the 110 nodes required by the uniform node deployment
strategy, the node deployment strategy in this paper can achieve 83.480% information validity and
16.520% information redundancy and only requires 91 sensor nodes. Obviously, the node deployment
strategy in this paper is more advantageous than the uniform node deployment strategy.
Sensors 2019, 19, 2752
16 of 23
In summary, in the four node deployment strategies, the node deployment strategy proposed in
this paper has a superior QoS and can meet the basic requirements of the project.
4.2. Comparison of the Network Lifetime
As a visual evaluation standard reflecting the performance of clustering routing protocols, the
network lifetime refers to the live nodes in the network with the iteration rounds. The steady lifetime
refers to the number of rounds until the first node death. In a steady lifetime, the nodes in the network
are full of energy and can perform large-scale data communication. This lifetime is the most vigorous
moment of the WSN’s vitality. As shown in Figure 15, the steady lifetimes of the LEACH, DEEC, and
GSEN are 1061, 1135, and 1163 rounds, respectively, and the steady lifetime of the EECRP-HQSND is
1331, which further exceeds LEACH, DEEC, and GSEN by 25.45%, 17.27%, and 14.45%, respectively. In
addition, through a reasonable ICRM, the EECRP-HQSND-ICRM extends the steady lifetime by 33
rounds compared to the EECRP-HQSND. With the iteration rounds, there are few nodes in LEACH
Sensors 2019
17 of 24
and DEEC around the 1300th round. At this time, there is no node death in EECRP-HQSND or
EECRP-HQSND-ICRM. After around the 1356th round, the number of nodes in EECRP-HQSND is
HQSND is almost 0, but EECRP-HQSND-ICRM still maintains 91. So, we find that ICRM can reduce
almost 0, but EECRP-HQSND-ICRM still maintains 91. So, we find that ICRM can reduce the network
the network energy consumption well. In addition, in terms of the downward trend of the curves of
energy consumption well. In addition, in terms of the downward trend of the curves of the live nodes,
the live nodes, it is obvious that compared with LEACH, DEEC, and GSEN, after the death of the first
it is obvious that compared with LEACH, DEEC, and GSEN, after the death of the first node, the slopes
node, the slopes of EECRP-HQSND and EECRP-HQSND-ICRM change the fastest, and the slopes
of EECRP-HQSND and EECRP-HQSND-ICRM change the fastest, and the slopes can almost reach
can almost reach negative infinity. Thus we find that compared with the traditional CH selection
negative infinity. Thus we find that compared with the traditional CH selection mechanisms, CH
mechanisms, CH selection through partition based on the uniformity of the CH distribution in this
selection through partition based on the uniformity of the CH distribution in this paper can balance
paper can balance the network energy consumption well.
the network energy consumption well.
Figure 15. The number of live nodes varies with the iteration round. DEEC— Distribute Energy-Efficient
Figure 15. The number of live nodes varies with the iteration round. DEEC— Distribute EnergyClustering; EECRP-HQSND—energy-efficient clustering routing protocol based on a high-QoS node
Efficient Clustering; EECRP-HQSND—energy-efficient clustering routing protocol based on a highdeployment; EECRP-HQSND-ICRM—energy-efficient clustering routing protocol based on a high-QoS
QoS node deployment; EECRP-HQSND-ICRM—energy-efficient clustering routing protocol based
node deployment with an inter-cluster routing mechanism; GSEN— and Group-Based Sensor Network;
on a high-QoS node deployment with an inter-cluster routing mechanism; GSEN— and GroupLEACH—Low-Energy Adaptive Cluster Hierarchical.
Based Sensor Network; LEACH—Low-Energy Adaptive Cluster Hierarchical.
4.3. Comparison of the Network Coverage
4.3. Comparison of the Network Coverage
The network coverage reflects the proportion of monitored targets covered in the area out of
Thenumber,
networkreflecting
coveragethe
reflects
the proportion
of monitored
covered
the area coverage
out of the
the total
network’s
monitoring
capability. targets
A decline
in theinnetwork
total
number,
reflecting
the
network's
monitoring
capability.
A
decline
in
the
network
means that the monitoring capability of the network begins to decline. As shown in Figure 16,coverage
among
means
the monitoring
capability
of the network
beginscapability
to decline.under
As shown
in Figure
among
the
five that
protocols,
the decline
of the network
monitoring
LEACH
is the16,earliest,
the five protocols,
the GSEN,
decline while
of theEECRP-HQSND
network monitoring
capability
undera LEACH
is monitoring
the earliest,
followed
by DEEC and
begins
to experience
decline in
followed by DEEC and GSEN, while EECRP-HQSND begins to experience a decline in monitoring
capacity in the 1333rd round. Through an effective ICRM, the EECRP-HQSND-ICRM delays the
monitoring capability decline to the 1367th round, thus ensuring that the network can perform more
rounds of monitoring during this period to achieve higher monitoring requirements. Meantime, with
a reasonable CH selection mechanism through partition based on the uniformity of the CH
distribution, compared with LEACH, DEEC, and GSEN, the round when the network coverage of
Sensors 2019, 19, 2752
17 of 23
capacity in the 1333rd round. Through an effective ICRM, the EECRP-HQSND-ICRM delays the
monitoring capability decline to the 1367th round, thus ensuring that the network can perform more
rounds of monitoring during this period to achieve higher monitoring requirements. Meantime, with a
Sensors 2019 CH selection mechanism through partition based on the uniformity of the CH distribution,
18 of 24
reasonable
compared
with
LEACH,
DEEC,
and
GSEN,
the
round
when
the
network
coverage
of
EECRP-HQSND
Sensors 2019
18 of 24
and EECRP-HQSND-ICRM begins to decline can be greatly delayed.
Figure 16. The network coverage varies with the iteration round.
Figure
Figure16.
16.The
Thenetwork
networkcoverage
coveragevaries
varieswith
withthe
theiteration
iterationround.
round.
4.4. Comparison of the Information Integrity
4.4. Comparison of the Information Integrity
4.4. Comparison
of integrity
the Information
Information
reflectsIntegrity
the proportion of information required to meet the monitored area
Information
integrity
reflects
the
proportion
of information
required
to meet the
monitored
as
as a percentage of the total required
information.
The decline
in information
integrity,
to aarea
certain
Information
integrity
reflects
the proportion
of information
required
to meet to
thea monitored
area
a extent,
percentage
of
the
total
required
information.
The
decline
in
information
integrity,
certain
extent,
means that the obtained information has become less desirable. As shown in Figure 17, similar
as a percentage
of the total
required
information.
declineAs
in shown
information
integrity,
to a to
certain
means
that
the obtained
information
has
lessThe
desirable.
Figure
similar
the
to the network
lifetime and
coverage,
thebecome
information
integrity of
LEACH in
is the
first17,
to decline
among
extent,
means
that
the
obtained
information
has
become
less
desirable.
As
shown
in
Figure
17,
similar
network
andfollowed
coverage,bythe
of LEACH
the first to declineonly
among
the five
the fivelifetime
protocols,
theinformation
DEEC and integrity
the GSEN,
while theisEECRP-HQSND
experienced
to the network
lifetime
and
coverage,
theGSEN,
information
integrity
of LEACH only
is theexperienced
first to decline
among
protocols,
followed
by
the
DEEC
and
the
while
the
EECRP-HQSND
a
a decline in information integrity in the 1332nd round. Finally, the ICRM in this paper candecline
greatly
five protocols,
followed
the DEEC
and the GSEN,
while
only
experienced
inthe
information
integrity
inload,
the by
1332nd
round.
ICRM
in the
thisEECRP-HQSND
paper
can greatly
reduce
CHs’
reduce
the CHs’
energy
especially
for Finally,
the CHsthe
that
are remotely
located,
resulting
in thethe
EECRPa
decline
in
information
integrity
in
the
1332nd
round.
Finally,
the
ICRM
in
this
paper
can greatly
energy
load,
especially
for
the
CHs
that
are
remotely
located,
resulting
in
the
EECRP-HQSND-ICRM
HQSND-ICRM postponing the decline of information integrity to the 1365th round, thus ensuring
reduce the the
CHs’
energyofload,
especially
for the CHs
that
are remotely
located, resulting in the EECRPpostponing
decline
information
integrity
toduring
the
1365th
that the network
can obtain
more complete
data
this round,
period. thus ensuring that the network
HQSND-ICRM
postponing
the
decline
information integrity to the 1365th round, thus ensuring
can
obtain more complete
data
during
thisofperiod.
that the network can obtain more complete data during this period.
Figure
Figure17.
17.The
Theinformation
informationintegrity
integrityvaries
varieswith
withthe
theiteration
iterationround.
round.
Figure 17. The information integrity varies with the iteration round.
4.5. Comparison of the Round at Which the WSN Begins to Decline
4.5. Comparison
of thewe
Round
Which the
the WSN
Begins
to Decline
In this section,
will at
analyze
network's
decline
from three aspects: the number of rounds
until the death of the first node, the number of rounds leading to the decline in network coverage,
In this section, we will analyze the network's decline from three aspects: the number of rounds
Sensors 2019, 19, 2752
18 of 23
4.5. Comparison of the Round at Which the WSN Begins to Decline
Sensors
19 of 24
In 2019
this section, we will analyze the network’s decline from three aspects: the number of rounds
until the death of the first node, the number of rounds leading to the decline in network coverage, and
of number
Sectionsof4.2,
4.3, and
4.4, to
our
in Table
3 andCombined
Figure 18.with
It can
seen that
the
rounds
leading
theresults
declineare
in shown
information
integrity.
the be
contents
of
compared
with
the
traditional
protocols,
including
LEACH,
DEEC,
and
GSEN,
the
CH
selection
Sections 4.2–4.4, our results are shown in Table 3 and Figure 18. It can be seen that compared with
the
mechanism
of partition
based LEACH,
on the uniformity
ofGSEN,
the CHthe
distribution
proposed
in this
can
traditional
protocols,
including
DEEC, and
CH selection
mechanism
of paper
partition
balance
the
network
energy
consumption
well,
thus
greatly
delaying
the
number
rounds
until
the
based on the uniformity of the CH distribution proposed in this paper can balance the network energy
death
of
the
first
node,
the
number
of
rounds
leading
to
the
decline
in
network
coverage,
and
the
consumption well, thus greatly delaying the number rounds until the death of the first node, the
numberofofrounds
rounds
leading
decline
in information
integrity.
by constructing
the optimal
number
leading
to to
thethe
decline
in network
coverage,
and theThen,
number
of rounds leading
to the
path
from
each
CH
to
the
BS,
the
ICRM
proposed
in
this
paper
can
further
reduce
the
network
energy
decline in information integrity. Then, by constructing the optimal path from each CH to the BS, the
consumption,
optimizing
above
threethe
aspects.
ICRM
proposedthus
in this
paper canthe
further
reduce
network energy consumption, thus optimizing the
above three aspects.
Table 3. Comparison of the number of rounds leading to decline in the network for each protocol.
Table 3. Comparison of the number of rounds leading to decline in the network for each protocol.
Protocol
LEACH
Protocol
DEEC
LEACH
GSEN
DEEC
GSEN
EECRP-HQSND
EECRP-HQSND
EECRP-HQSND-ICRM
EECRP-HQSND-ICRM
First Node Death
1061Death
First Node
1135
1061
1163
1135
1163
1331
1331
1364
1364
Coverage Degradation Integrity Degradation
1093
1072
Coverage Degradation
Integrity Degradation
10931175
1072 1149
1227
1175
1149 1172
12271333
1172 1332
13331367
1332 1365
1367
1365
Figure
Figure18.
18.Comparison
Comparisonofofthe
thenumber
numberofofrounds
roundsleading
leadingtotodecline
declineininthe
thenetwork
networkfor
foreach
eachprotocol.
protocol.
4.6. Comparison of the Network Energy Consumption
4.6. Comparison of the Network Energy Consumption
In the analysis of network energy consumption, this paper mainly considers two aspects: the
In the analysis of network energy consumption, this paper mainly considers two aspects: the
network energy consumption size and the network energy consumption uniformity. The index of the
network energy consumption size and the network energy consumption uniformity. The index of the
network energy consumption uniformity is mainly the range and variance of the residual energy of the
network energy consumption uniformity is mainly the range and variance of the residual energy of
nodes in the network.
the nodes in the network.
4.6.1. Comparison of Network Energy Consumption
4.6.1. Comparison of Network Energy Consumption
In this paper, the BS is centered, and the area is divided into 4 cells. Then, we select the top 25%
In this
paper,
BS is cell
centered,
and the the
areaestablishment
is divided into
cells.
Then,
we select
top 25%
of nodes
as the
CHsthe
in each
and perform
of4an
ICRM
through
the the
optimized
of
nodes
as
the
CHs
in
each
cell
and
perform
the
establishment
of
an
ICRM
through
the
optimized
Dijkstra algorithm to reduce network energy consumption and balance the energy consumption of
Dijkstra algorithm to reduce network energy consumption and balance the energy consumption of
the network nodes. As shown in Figure 19, compared with LEACH and DEEC, the GSEN has an
advantage in reducing energy consumption. Compared to these three, the EECRP-HQSND
effectively reduces the energy consumption of the network, which proves the effectiveness of the CH
Sensors 2019, 19, 2752
19 of 23
the network nodes. As shown in Figure 19, compared with LEACH and DEEC, the GSEN has an
Sensors 2019
20 of 24
advantage
in reducing energy consumption. Compared to these three, the EECRP-HQSND effectively
Sensors 2019
20 of 24
reduces
the energy consumption of the network, which proves the effectiveness of the CH selection
selection mechanism in this paper. In addition, EECRP-HQSND-ICRM further reduces the network
mechanism in this paper. In addition, EECRP-HQSND-ICRM further reduces the network energy
energy
consumption
to EECRP-HQSND,
reflecting the feasibility
of the
ICRM.the network
selection
mechanism compared
in this paper.
In addition, EECRP-HQSND-ICRM
further
reduces
consumption compared to EECRP-HQSND, reflecting the feasibility of the ICRM.
energy consumption compared to EECRP-HQSND, reflecting the feasibility of the ICRM.
Figure
Figure19.
19.The
Thenetwork
networkresidual
residualenergy
energyvaries
varieswith
withthe
theiteration
iterationround.
round.
Figure
19. The
network
residual energy
varies with the iteration round.
4.6.2. Comparison of
Network
Energy
Consumption
Uniformity
4.6.2. Comparison of Network Energy Consumption Uniformity
It Comparison
can be seen of
from
Figures
20 and
21 that theUniformity
protocol can effectively balance the energy
4.6.2.
Network
Energy
Consumption
consumption of nodes in the network compared to LEACH, DEEC, and GSEN.
Figure 20. The range of the residual energy of the nodes in the network.
Figure
Figure20.
20.The
Therange
rangeofofthe
theresidual
residualenergy
energyofofthe
thenodes
nodesininthe
thenetwork.
network.
Sensors
2019
Sensors
2019,
19, 2752
2021ofof
23 24
Figure 21. The variance of the residual energy of the nodes in the network.
Figure 21. The variance of the residual energy of the nodes in the network.
In the network iteration, the maximum energy range of LEACH reaches approximately 0.13 J, that
It can be seen from Figures 20 and 21 that the protocol can effectively balance the energy
of DEEC and GSEN both reach approximately 0.10 J, that of EECRP-HQSND reaches approximately
consumption of nodes in the network compared to LEACH, DEEC, and GSEN.
0.028 J, and that of EECRP-HQSND-ICRM reaches a maximum of 0.01564 J.
In the network iteration, the maximum energy range of LEACH reaches approximately 0.13 J,
As for the energy variance, EECRP-HQSND EECRP-HQSND-ICRM achieve variances of
that of DEEC and GSEN both reach approximately 0.10 J, that of EECRP-HQSND reaches
0–0.000036. The maximum variance of LEACH reaches 0.0010, that of DEEC reaches 0.0003, and that of
approximately 0.028 J, and that of EECRP-HQSND-ICRM reaches a maximum of 0.01564 J.
GSEN reaches 0.0004.
As for the energy variance, EECRP-HQSND EECRP-HQSND-ICRM achieve variances of 0–
Based on the comprehensive energy range and variance, it can be determined that the protocol in
0.000036. The maximum variance of LEACH reaches 0.0010, that of DEEC reaches 0.0003, and that of
this paper can achieve a good balance of energy consumption among the nodes in the network.
GSEN reaches 0.0004.
Based onofthe
energy range and variance, it can be determined that the protocol
4.7. Comparison
thecomprehensive
Network Throughput
in this paper can achieve a good balance of energy consumption among the nodes in the network.
The network throughput is an important indicator that fundamentally reflects the performance of
a protocol.
The network
throughput
refers to the number of packets in the network that are ultimately
4.7. Comparison
of the Network
Throughput
sent to the BS. The CMs transmit the sensed information to the CH in the form of packets, and the
The network throughput is an important indicator that fundamentally reflects the performance
CH fuses this information with that sensed by itself and finally sends the information to the BS in the
of a protocol. The network throughput refers to the number of packets in the network that are
form of packets. As the nodes in the network die continuously, the number of CHs in the network
ultimately sent to the BS. The CMs transmit the sensed information to the CH in the form of packets,
decreases, and the success rate of transmitting packets to the BS also decreases. Therefore, the number
and the CH fuses this information with that sensed by itself and finally sends the information to the
of data packets transmitted in each round will gradually decrease. Until the last node dies, the network
BS in the form of packets. As the nodes in the network die continuously, the number of CHs in the
throughput reaches a maximum value, which is just the final network throughput.
network decreases, and the success rate of transmitting packets to the BS also decreases. Therefore,
As seen from Figure 22, the final network throughput of LEACH is 11005, that of DEEC is 13901,
the number of data packets transmitted in each round will gradually decrease. Until the last node
and that of GSEN is 16239. Compared with these three, the EECRP-HQSND increases the final
dies, the network throughput reaches a maximum value, which is just the final network throughput.
network throughput by 167.53%, 111.80%, and 81.30%, respectively. With an effective ICRM, the
As seen from Figure 22, the final network throughput of LEACH is 11005, that of DEEC is 13901,
EECRP-HQSND-ICRM increases the final network throughput by 856 compared to EECRP-HQSND.
and that of GSEN is 16239. Compared with these three, the EECRP-HQSND increases the final
network throughput by 167.53%, 111.80%, and 81.30%, respectively. With an effective ICRM, the
EECRP-HQSND-ICRM increases the final network throughput by 856 compared to EECRP-HQSND.
Sensors
Sensors2019,
201919, 2752
21
22 of
of2324
Figure
Figure22.
22.The
Thecomparison
comparisonof
ofthe
thefinal
finalthroughput
throughputininthe
thefive
fiveprotocols.
protocols.
5. Conclusions
5. Conclusions
Aimed at the different coverage requirements of regional monitoring target points in real-world
Aimed at
thepaper
different
coverage
requirements
of regional
monitoring
points
in real-world
applications,
this
proposes
a node
deployment
strategy
based on target
twofold
coverage
for all
applications,
this
paper
proposes
a
node
deployment
strategy
based
on
twofold
coverage
for all
coverage requirements of two in the region. Then, from the network coverage, this paper proposes
a
coverage
requirements
of
two
in
the
region.
Then,
from
the
network
coverage,
this
paper
proposes
series of definition formulas for information integrity, validity, and redundancy. In the CH selection,a
series
of definition
formulas
information
integrity,
validity, and
In the CH
selection,
this
paper
fully considers
the for
uniformity
of the
CH distribution
andredundancy.
proposes a strategy
of dividing
thismonitoring
paper fullyarea
considers
thesmall
uniformity
of the
distribution
a strategy
of dividing
the
into four
cells with
theCH
BS as
the center and
and proposes
then selecting
the CHs
in their
the
monitoring
area
into
four
small
cells
with
the
BS
as
the
center
and
then
selecting
the
CHs
in their
respective cells. Finally, combined with the actual requirements of the WSN, this paper optimizes
the
respective
cells.
Finally,
combined
with
the
actual
requirements
of
the
WSN,
this
paper
optimizes
the
Dijkstra algorithm, including (1) nonessential paths neglecting considerations and (2) a simultaneous
Dijkstra algorithm,
including
(1) nonessential
neglecting
(2) a simultaneous
introduction
of end-to-end
weights
and path paths
weights.
Then, considerations
the optimized and
Dijkstra
algorithm is
introduction
of
end-to-end
weights
and
path
weights.
Then,
the
optimized
Dijkstra
algorithm is
applied to the establishment of the ICRM.
applied
the establishment
of thethat,
ICRM.
The to
simulation
results show
compared with the random node distribution strategy, the
The
simulation
results
show
that,
with
the random node
uniform node distribution strategy, and compared
the onefold
coverage-based
node distribution
deploymentstrategy,
strategy the
in
uniform
node
distribution
strategy,
and
the
onefold
coverage-based
node
deployment
strategy
in a
a cellular network, the node deployment strategy in this paper achieves relatively high coverage,
cellular network,
the
node
deployment
in low
this information
paper achieves
relatively
coverage,
information
integrity,
and
validity,
as well asstrategy
a relatively
redundancy.
Athigh
the same
time,
information
integrity,
and
validity,
as
well
as
a
relatively
low
information
redundancy.
At
the same
compared with LEACH, DEEC, and GSEN, EECRP-HQSND-ICRM can reduce and balance network
time, compared
with
LEACH,
DEEC,
and GSEN,
EECRP-HQSND-ICRM
can reduce
and balance
energy
consumption,
thus
extending
the network
lifetime
and improving the network
throughput.
It is
network
thus extending
network
andofimproving
the network
noted
that energy
the CH consumption,
selection mechanism
of partitionthe
based
on thelifetime
uniformity
the CH distribution
in
throughput.
It is noted
that thefor
CH
selection
mechanism
partition
basedand
on uniform
the uniformity
of the
this
paper is mainly
responsible
selecting
CHs
with largeofresidual
energy
distribution,
CH distribution
this papernetwork
is mainly
responsible
for selecting
CHs with
residual
energy
and
thereby
effectivelyinbalancing
energy
consumption
and delaying
thelarge
number
of rounds
until
uniform
distribution,
thereby
effectively
balancing
network
energy
consumption
and
delaying
the
the network performance begins to decline. The ICRM is mainly responsible for finding the optimal
number
of
rounds
until
the
network
performance
begins
to
decline.
The
ICRM
is
mainly
responsible
transmission path from each CH to the BS in the network and preventing some CHs from dying early
for finding
thelong
optimal
transmission
path from
CHthereby
to the BS
in the
networknetwork
and preventing
because
of the
transmission
distances
from each
the BS,
further
reducing
energy
some
CHs
from
dying
early
because
of
the
long
transmission
distances
from
the
BS,
thereby further
consumption and realizing more rounds of network data iterations, which has great significance
for
reducing
network
energy
consumption
and
realizing
more
rounds
of
network
data
iterations,
which
engineering. However, there are some shortcomings in our protocol:
has First,
great significance
engineering.
some shortcomings
our protocol:
we used thefor
0-1
perception However,
model forthere
nodeare
deployment
and QoSinformula
derivation.
First,
we
used
the
0-1
perception
model
for
node
deployment
and
QoS
formula
In
In actual situations, the perception of nodes is very complicated, and it is much less idealderivation.
than the 0-1
actual situations,
perception
of nodes
very complicated,
and it is much
less
ideal
than
the 0-1
perception
model. the
Therefore,
we may
laterisconsider
a node deployment
scheme
and
QoS
formulas
perception
model.
Therefore,
we
may
later
consider
a
node
deployment
scheme
and
QoS
formulas
based on a more complex perceptual model.
based
on a more
complex
perceptualonly
model.
Finally,
the protocol
is applicable
to 2D scenarios. Typical 3D scenarios, such as underground
Finally,
the
protocol
is
applicable
only to 2D scenarios. Typical 3D scenarios, such as
coal mines, underground pipe corridors, and indoor homes require the WSN to be arranged in three
underground coal mines, underground pipe corridors, and indoor homes require the WSN to be
Sensors 2019, 19, 2752
22 of 23
dimensions. Therefore, in the future, we will consider proposing a clustering routing protocol suitable
for 3D scenarios based on this protocol.
Author Contributions: Z.Z. and K.X. conducted the research and performed the simulations. Z.Z. led the research.
Y.L., G.H. and L.H. supervised the work and suggested revisions. All authors participated in the writing of
the article.
Funding: This research was supported by National Natural Science Foundation of China (Grant No. U1709212),
the Zhejiang Province Public Welfare Technology Application Research Project (Grant No. GF18F030010), and the
Smart City Collaborative Innovation Center of Zhejiang Province. This work was also supported by the Zhejiang
Provincial Key Lab of Equipment Electronics.
Conflicts of Interest: The authors declare no conflict of interest.
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Jan, B.; Farman, H.; Javed, H.; Montrucchio, B.; Khan, M.; Ali, S. Energy Efficient Hierarchical Clustering
Approaches in Wireless Sensor Networks: A Survey. Wirel. Commun. Mob. Comput. 2017, 2017, 1–4.
[CrossRef]
Amodu, O.A.; Raja Mahmood, R.A. Impact of the energy-based and location-based LEACH secondary
cluster aggregation on WSN lifetime. Wirel. Netw. 2018, 24, 1379–1402. [CrossRef]
Hosen, A.; Cho, G. An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks. Sensors
2018, 18, 1520. [CrossRef] [PubMed]
Anzola, J.; Pascual, J.; Tarazona, G.; González, R. A Clustering WSN Routing Protocol Based on k-d Tree
Algorithm. Sensors 2018, 18, 2899. [CrossRef] [PubMed]
Saleh, A.I.; Abo-Al-Ez, K.M.; Abdullah, A.A. A Multi-Aware Query Driven (MAQD) routing protocol for
mobile wireless sensor networks based on neuro-fuzzy inference. J. Net. Comput. Appl. 2017, 88, 72–98.
[CrossRef]
Yadav, R.N.; Misra, R.; Saini, D. Energy aware cluster based routing protocol over distributed cognitive radio
sensor network. Comput. Commun. 2018, 129, 54–66. [CrossRef]
Xia, X.; Chen, Z.; Liu, H.; Wang, H.; Zeng, F. A Routing Protocol for Multisink Wireless Sensor Networks in
Underground Coalmine Tunnels. Sensors 2016, 16, 2032. [CrossRef]
Rani, S.; Ahmed, S.H.; Malhotra, J.; Talwar, R. Energy efficient chain based routing protocol for underwater
wireless sensor networks. J. Net. Comput. Appl. 2017, 92, 42–50. [CrossRef]
Bozorgi, S.M.; Shokouhi Rostami, A.; Hosseinabadi, A.A.R.; Balas, V.E. A new clustering protocol for energy
harvesting-wireless sensor networks. Comput.Electr. Eng. 2017, 64, 233–247. [CrossRef]
Sharma, S.; Bansal, R.K.; Bansal, S. Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for
WSNs. KSII Trans. Int. Inf. Syst. 2017, 11, 1866–1888.
Xu, Y.; Ding, O.; Qu, R.; Li, K. Hybrid multi-objective evolutionary algorithms based on decomposition for
wireless sensor network coverage optimization. Appl. Soft Comput. 2018, 68, 268–282. [CrossRef]
Zhao, Z.; Xu, K.; Hui, G.; Hu, L. An Energy-Efficient Clustering Routing Protocol for Wireless Sensor
Networks Based on AGNES with Balanced Energy Consumption Optimization. Sensors 2018, 18, 3938.
[CrossRef] [PubMed]
Chidean, M.I.; Morgado, E.; Del Arco, E.; Ramiro-Bargueno, J.; Caamano, A.J. Scalable Data-Coupled
Clustering for Large Scale WSN. IEEE Trans. Wirel. Commun. 2015, 14, 4681–4694. [CrossRef]
Wang, Q.; Guo, S.; Hu, J.; Yang, Y. Spectral partitioning and fuzzy C-means based clustering algorithm for
big data wireless sensor networks. EURASIP J. Wirel. Commun. Net. 2018, 54, 1–11. [CrossRef]
Palma, J.; Duran-Faundez, C.; de P Carvalho, L.; Morais, C.F.; Oliveira, R.; Rubio, E.; Herman, K. Protocol
for Energy-Efficiency in Networked Control Systems Based on WSN. Sensors 2018, 18, 2590. [CrossRef]
[PubMed]
Gharaei, N.; Abu Bakar, K.; Mohd Hashim, S.; Hosseingholi Pourasl, A.; Siraj, M.; Darwish, T. An
Energy-Efficient Mobile Sink-Based Unequal Clustering Mechanism for WSNs. Sensors 2017, 17, 1858.
[CrossRef] [PubMed]
Fan, F.; Ji, Q.; Wu, G.; Wang, M.; Ye, X.; Mei, Q. Dynamic Barrier Coverage in a Wireless Sensor Network for
Smart Grid. Sensors 2019, 19, 41. [CrossRef]
Sensors 2019, 19, 2752
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
23 of 23
Almalkawi, I.T.; Guerrero Zapata, M.; Al-Karaki, J.N. A Secure Cluster-Based Multipath Routing Protocol for
WMSNs. Sensors 2011, 11, 4401–4424. [CrossRef]
Guermazi, A.; Belghith, A.; Abid, M.; Gannouni, S. KMMR: An Efficient and scalable Key Management
Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks. KSII Trans. Int.
Inf. Syst. 2017, 11, 901–923.
Md Zin, S.; Badrul Anuar, N.; Laiha Mat Kiah, M.; Khan Pathan, A. Routing protocol design for secure WSN:
Review and open research issues. J. Net. Comput. Appl. 2014, 41, 517–530. [CrossRef]
Xu, L.; O’Hare, G.M.P.; Collier, R. A Smart and Balanced Energy-Efficient Multihop Clustering Algorithm
(Smart-BEEM) for MIMO IoT Systems in Future Networks. Sensors 2017, 17, 1574. [CrossRef] [PubMed]
Musznicki, B.; Tomczak, M.; Zwierzykowski, P. Dijkstra-based Localized Multicast Routing in Wireless Sensor
Netw. In Proceedings of the 2012 8th International Symposium on Communication Systems, Networks &
Digital Signal processing, Poznan, Poland, 18–20 July 2012; pp. 1–6.
Razzaq, M.; Kwon, G.; Shin, S. Energy Efficient Dijkstra-Based Weighted Sum Minimization Routing Protocol
for WSN. In Proceedings of the 2018 Third International Conference on Fog and Mobile Edge Computing
(FMEC), Barcelona, Spain, 23–26 April 2018; pp. 246–251.
Thomas, S.; Gayathri, I.K.; Raj, A. In Joint design of Dijkstra’s shortest path routing and sleep-wake scheduling
in wireless sensor networks. In Proceedings of the 2017 International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 981–986.
Xie, W.; Zhang, Q.; Sun, Z.; Zhang, F. A Clustering Routing Protocol for WSN Based on Type-2 Fuzzy Logic
and Ant Colony Optimization. Wirel. Pers. Commun. 2015, 84, 1165–1196. [CrossRef]
Kandris, D.; Tselikis, G.; Anastasiadis, E.; Panaousis, E.; Dagiuklas, T. COALA: A Protocol for the Avoidance
and Alleviation of Congestion in Wireless Sensor Networks. Sensors 2017, 17, 2502. [CrossRef] [PubMed]
Mohamed, R.E.; Ghanem, W.R.; Khalil, A.T.; Elhoseny, M.; Sajjad, M.; Mohamed, M.A. Energy efficient
collaborative proactive routing protocol for Wireless Sensor Network. Comput. Net. 2018, 142, 154–167.
[CrossRef]
Leyva-Mayorga, I.; Rivero-Angeles, M.E.; Carreto-Arellano, C.; Pla, V. QoS Analysis for a Nonpreemptive
Continuous Monitoring and Event-Driven WSN Protocol in Mobile Environments. Int. J. Distrib. Sens. Net.
2015, 11, 471307–471322. [CrossRef]
Muhammad, Z.; Roy, A.; Ahn, C.W.; Sachan, R.; Saxena, N. A Novel Random Scheduling Algorithm based
on Subregions Coverage for SET K-Cover Problem in Wireless Sensor Network. KSII Trans. Int. Inf. Syst.
2018, 12, 2658–2679.
Boukerche, A.; Sun, P. Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Netw.
2018, 80, 54–69. [CrossRef]
Bhatti, D.M.S.; Saeed, N.; Nam, H. Fuzzy C-Means Clustering and Energy Efficient Cluster Head Selection
for Cooperative Sensor Network. Sensors 2016, 16, 1459. [CrossRef]
Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for
wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Download