1. Introduction
Wireless Sensor Networks (WSN) have exploded in popularity in the last few years. Part of this growth is due to the popularization of the Internet of Things (IoT), where connectivity, sensitivity, interaction, and energy are elements of the systems in a WSN. In a WSN, a node is defined as the minimal functional unit of a network and is comprised of a sensor/actuator, a central processing unit (CPU), a memory bank, a wireless transceiver, and a power source. As a unit, the node suffers energy depletion of its internal battery as a result of sensing, processing, data transmission and reception.
Interaction through wireless transmission in a WSN includes issues such as link viability, time to establish communication, data loss due to competition overuse of a wireless channel, data loss due to simultaneous transmission attempts, data loss due to repeated network flooding, and data loss due to transmission range.
Network scalability problems are caused by the birth, reboot, and death of one or several nodes in the network. Link problems in WSNs include neighbor discovery, message, loss, latency, and congestion. WSNs also have routing problems such as communication path and loop discovery [1]. In general lines, WSNs have a wide range of problems, although most of them have been addressed through communication protocols.
The aforementioned problems have been approached through flat and hierarchical routing structures. In a flat routing structure, all the nodes in the network play the same role in end-to-end routing protocols. In hierarchical routing structures, nodes are classified by functionality and the network is divided into groups or clusters, each of which chooses a leading node that is called Cluster Head node (CH). The CH node coordinates activities inside and outside the cluster with non-CH nodes.
The main feature of flat routing structures is the ability to establish communication between any two nodes in the network without the participation of a central node. These networks, also called ad hoc networks, can operate in isolation, without connection to network infrastructure such as the Internet.
A hierarchical routing structure organizes large-scale ad hoc networks into groups or clusters, with the objective of improving network efficiency beyond the attainable level of flat routing structures. Although hierarchical routing can increase control traffic, its topology allows for data traffic to be confined within each cluster. Nodes inside each cluster can organize to optimize communications and reduce interference caused by simultaneous data transmission.
Cluster-based hierarchical routing presents some advantages in scalability and communication efficiency. Protocols based on this schema have been used to achieve routing efficiency in connection to node energy levels. That is, nodes with higher energy reserves are candidates to becoming CH nodes, and those with lower energy levels are used to monitor the environment. In this type of routing, CH nodes have specific functions to improve the scalability, lifetime, and energy efficiency of the network.
Cluster-based routing structures represent a simpler approach to the issues of WSNs, lowering the complexity of flat routing structures [2]. However, cluster-based routing schemes are, in general, comprised of a cluster-formation and a CH-node selection mechanism. The behavior of the latter has an impact on the WSN’s general performance since a high degree of variability in this mechanism creates a proportional variability of the network’s response regarding delay, jitter, and throughput, and an inversely proportional response in energy levels.
The cluster formation mechanism creates clusters of varying sizes and, as a consequence, of varying density. This cluster formation method has an impact on the behavior of the network, which responds according to its cluster formation type. For example, a heterogeneous cluster formation causes data traffic within the clusters to become heterogeneous, that is, having varying dataflow responses in the majority of network nodes. This flow variability causes the network to show different delay and jitter values, limiting the usefulness of resource-intensive applications.
Given the problems found in the cluster formation and CH node selection mechanisms, our goal is to propose a WSN communications protocol that uses a hierarchical routing schema called H-kdtree. Its routing algorithm is based on the k-d tree algorithm, which allows creating partitions in an area with the mean of the data of one of its dimensions. Additionally, the H-kdtree protocol proposes a low-variability CH node generation mechanism, with a positive impact on delay, jitter, and throughput, compared with the low-energy adaptive clustering hierarchy protocol (LEACH) and low-energy adaptive clustering hierarchy-centralized (LEACH-C).
As a comparison, we have selected the LEACH and LEACH-C protocols, on account of being the most widely used hierarchical clustering protocol and also the most discussed in the literature. Clustering protocols work through one or several metrics that provide the necessary ability to manage network traffic efficiently and to improve the experience of a user or machine in different network environments. These improvements are usually in one or several network metrics such as load balancing, energy consumption, scalability, latency reduction, data traffic maximization, errors and data loss minimization. Quality of Service (QoS) is the improvement in one or several of these network metrics.
This article analyzes the performance of the LEACH, LEACH-C and the proposed H-kdtree protocol, by measuring the following metrics: delay, jitter, throughput, packet drop rate (PDR), and average network energy.
This article is structured as follows: Section 2 includes a review of literature related to cluster formation and CH node selection. The fundamental basis for LEACH, LEACH-C and k-d tree is described in Section 3. Protocol considerations and a description of the configuration and data transmission phases are discussed in Section 4. Section 5 includes parameters, metrics, and results of the simulation of the proposed protocol. Finally, Section 6 presents the conclusions.
2. Related Work
This section presents some of the most relevant works about techniques and mechanisms for cluster formation and CH node selection.
2.1. Cluster Formation
In WSNs, cluster formation is a technique that allows the classification of nodes in groups or clusters so that every node in a cluster shares a certain degree of homogeneity regarding the techniques, rules or heuristics on which the selection is based.
In the majority of distance-based cluster formation algorithms for WSNs, it is assumed that the nodes of the network know their a priori location in the plane. However, the literature includes proposals where nodes transmit their distance to a Base Station node (BS) via either Received Signal Strength Indicator (RSSI) [3] or geo-positioning by using the Global Positioning System (GPS) [4].
The main objective of partition clustering algorithms in WSNs is to divide the nodes into k partitions, according to their position. Each partition is considered a cluster. The partitioning technique will depend on an objective function. The most representative clustering mechanisms employed in WSNs are k-means [5,6,7], fuzzy c-means [8], k-medoids [4,9].
The hierarchical grouping method in a WSN tries to build a tree-based network topology mainly derived from the position of each node. This grouping process is represented by topologies with two or more jumps to a BS node. Some of the most representative algorithms are LEACH [10], LEACH variations [11,12,13].
Density-based cluster formation methods assume that nodes in each group are extracted from a probability distribution in relation to the total number of nodes in the network. Some works in this area are: to maximize the network lifetime [14,15], adaptive clustering [16], and density-based fuzzy imperialist competitive clustering algorithm [17]. The approaches of cluster formation based on cooperation have provided solutions to the problem of energy management using the information of the energy spectrum detected [18].
2.2. Cluster Head Selection
Cluster-head capabilities depend on the clustering objectives or focus used in their formation, and taking into account the capabilities of the nodes and their effective range. Most of the work on CH node selection has focused on the energy capacity of network nodes [19,20]. The following node attributes have been differentiating factors among the various clustering and CH node selection schemes.
Regarding the mobility or stationarity of nodes and CH nodes in WSN hierarchical routing, some proposals adhere to mobile nodes where membership to each node changes dynamically and clusters are required to auto-configure and keep an updated members list with incoming and outgoing nodes [21,22]. Other proposals favor a stationary approach, in which all nodes tend to group into stable clusters, which allows for simpler network administration and intra/inter-cluster communications [23].
The literature includes types of nodes of extended hardware capability [24]. Some algorithms include references to advanced nodes, defined as those nodes with more energy [25]. Other approaches focus on network interoperability, with nodes for different types of connectivity [26], and interoperability between nodes of fixed and wireless networks [27].
The types of roles of a node in a hierarchical protocol can be either a data transmission node or a CH node, and each node can change roles between rounds. Some proposals include auxiliary nodes that can take the role of the CH node in cases where the CH node fails [28]. Other approaches use a fuzzy inference system to improve the adaptability of the selection of CH nodes, finding that the stochastic selection methods can not guarantee the availability of CH nodes [29].
This article takes into account several aspects that are not approached completely in the cited literature. In particular, this article proposes a hierarchical routing protocol based on the k-d tree algorithm and on a reactive mechanism for the formation of CH nodes, validating its QoS through an experimental approach through simulation. Complementary information can be consulted in [4,30], also aspects related to the location of nodes in WSN [31], design problems [32] and the extension of possible applications in other areas of knowledge such as robotics [33,34], social networks [35] and applications that can support QoS [36,37].
3. Background and Preliminaries
The following subsections present the working principles of the LEACH and H-kdtree algorithms, as their key concepts are used in the proposed protocol.
3.1. The LEACH Protocol
The Low-Energy Adaptive Clustering Hierarchy protocol (LEACH) uses a cluster-based routing scheme to minimize total network energy consumption. In LEACH, nodes deployed in an area are organized into clusters, with each cluster having a CH node, as shown in Figure 1. The communication process is divided into two phases: the configuration phase and the stable state phase [10].
During the configuration phase, the CH nodes and member nodes of each cluster are selected. During the stable state phase, nodes are added to the CH node and remain in waiting to initiate data transmission to the Base Station (BS) node, using the sequence shown in Figure 2. In the literature, many authors refer to the base node as Sink node [38], which we refer to from this point on as Sink/BS node. The duration of the stable state phase is longer than the configuration phase, due to the processing work performed in it. Consequently, energy consumption during the stable state phase is higher.
During the configuration phase, the nodes that will become CH nodes for the current round are selected independently and randomly, with the requirement that their energy is greater than zero and a lower threshold. The capacity to become a CH node is determined by the generation of a random number (Rn) (Rn) where Rn∈0,1 Rn∈0,1 . The CH node is selected if Rn≤T(n) Rn≤T(n) , where T(n) T(n) is a threshold value obtained from Equation (1). The CH node will transmit its nomination to the nodes in the cluster. The nodes in the cluster are selected by their distance to the CH node and, in some cases, this is measured through the received signal strength indicator (RSSI) [39]:
t(n)=p1−p·(r·mod·1p)),ifn∈G,0,anothercase.
where p is the probability for a node to become CH node over all the nodes in the network, r is the current number of selection rounds, and G is the set of nodes that were not selected as CH nodes before 1p 1prounds.
The CH nodes selected for each cluster will reserve a free slot for data transmission of the member nodes by using a distribution of a TDMA programming table that will indicate each CH node the data transmission sequence, giving CH nodes the possibility of staying in repose for the longest possible time.
Using TDMA for data transmission prevents collisions within each cluster [40]. In the steady state phase, CH nodes compile data from the nodes in each cluster and send them to the Sink/BS node. Data redundancy may occur during this phase. The redundant packets being processed and transmitted to the Sink/BS node result in an increase in unnecessary network traffic and overall network bandwidth, which directly affects energy consumption. The more redundant data is processed, the more energy will be wasted. Data transmission to CH nodes saves energy in comparison to direct data transmission from the nodes to the Sink/BS node. Therefore, to avoid the early death of CH nodes, all the nodes in the network will elect other CH nodes, repeating both phases for every round during the lifetime of the network.
For every node, we used the energy model described in [41], which is shown in Figure 3. This assumes that the wireless channel is completely symmetrical, so the energy used in transmitting a message through the round-trip route between a network node and the Sink/BS node through the CH node, vi vi and vj vj is equal. The free space channel model used is d2(vi,vj) d2(vi,vj) , as the nodes are located in a plane and remain static and we assume that there is a direct line of sight between the network nodes and the Sink/BS node. If the communication distance d(vi,vj) d(vi,vj) from vi vi to vj vj is greater than the threshold distance d0 d0 , that is, d(vi,vj)≥d0 d(vi,vj)≥d0 , the model chosen is the multipath fading model d4(vi,vj) d4(vi,vj) . This is the case for both the LEACH protocol and the H-kdtree protocol presented in this article. Energy consumption (ETl,d(vi,vj)) (ETl,d(vi,vj))is calculated as:
ET=l·Eelec+l·ϵfs·d2(vi,vj),d(vi,vj)<d0,l·Eelec+l·ϵamp·d4(vi,vj),d(vi,vj)≥d0,
where l is a message of lbits lbits to be transmitted over d(vi,vj) d(vi,vj) , given by ER(l)=l·Eelec ER(l)=l·Eelec , where Eelec Eelec represents the loss of the transmission circuit as a function of digital encoding, the type of modulation used, filtering processes and signal dispersion, based on energy coefficients ϵfs·d2(vi,vj) ϵfs·d2(vi,vj) and ϵamp·d4(vi,vj) ϵamp·d4(vi,vj)for power amplifiers in two channel models.
One of the characteristics of LEACH and its different variations is that it maintains the configuration phase, transmission and a hierarchical topology of two jumps. Under these characteristics, the algorithm LEACH runs in O(n·log·m) O(n·log·m) time for n sensor nodes and m CHs [42].
3.2. LEACH-C Protocol
The LEACH-C protocol is a centralized version of the LEACH protocol, and, therefore, it uses the same phases of the LEACH protocol, which are configuration and transmission phase forming rounds. During the LEACH-C configuration phase, each node in the network sends a packet to the Sink/BS node that contains the location and power level. The Sink/BS node calculates the average energy value of all the nodes, selected as possible node CH, only the nodes with more energy than the average value of the energy of all the nodes in the network.
The Sink/BS node uses an annealing algorithm for the formation of clusters [43,44]. The other LEACH-C operations are the same as those of LEACH and the results show that LEACH-C has energy improvements on LEACH [45], for the following reasons:
1. The Sink/BS node is static and is the one that organizes. the roles of each node in the network, centralizing information and cluster formation.
2. When clusters are formed, they do not communicate between nodes to save energy.
3. The Sink/BS node in the configuration phase establishes the CH nodes beforehand; therefore, the network can use energy more effectively.
3.3. k-d Tree Algorithm
Given the problem of two-dimensional rectangular range queries, a rectangle is divided into a smaller rectangle, which in turn is divided into another rectangle, and the process is repeated n times (depth), obtaining successive smaller areas. Within these areas (rectangles), we can locate a set of points that can be referenced as a unit, accessible via a route originated in a binary tree. Figure 4 shows the basic working idea of the k-d algorithm [46].
Given P as the set of n points in the plane, we can assume as a principle that no two points share the same (x,y) (x,y)coordinates. There are no cases where two or more points are superimposed.
Definition 1.
In a two-dimensional rectangular range query in P, we ask for the points in P inside the query rectangle [x:x′]∗[y,y′] [x:x′]∗[y,y′] . A point p:=(px,py) p:=(px,py) is inside that rectangle if and only if:
px∈[x:x′]andpy∈[y,y′].
Definition 2.
Recursive binary search tree for a set of points in one dimension is divided into two subsets of approximately the same size, based on the median of the set of points. In this way, the root contains two subsets distributed in two subtrees, where each subset of the subsets already created become subtrees that will be processed recursively.
The procedure to build the k-d tree has two parameters: one set of points P and an integer value that represents the depth of the subtree root, as shown in Algorithm 1.
Algorithm 1 k-d tree algorithm.
Require: A set of points (x,y) (x,y)named P and the tree depth value
Ensure: The root of the k-d tree
1: function: build_k-d_tree (P,depth) (P,depth)
2: if (P contains only one point) then
3: return the root with that point
4: else if ( depth depthis an even number) then
5: divide the values of P into two subsets by using the median of the x coordinates of the P set.
It generates two subsets:
6: if (Pxi <median(x)) (Pxi <median(x))then
7: Pxi1:=subsetleft Pxi1:=subsetleft
8: else
9: Pxi2:=subsetright Pxi2:=subsetright
10: end if
11: else
12: divide the values of P into two subsets by using the median of the y coordinates of the P set.
It generates two subsets:
13: end if
14: depth=depth+1 depth=depth+1
15: end function
For the function of the Algorithm 1:
1. Creates a root node with two subsets P(∗)i1 P(∗)i1 for the left side of the tree and P(∗)i2 P(∗)i2for the right side of the tree.
2. (∗) (∗)is the subset of initial data where the partitioning of points will begin. In this algorithm, x is used for even depth values and y is used for odd values.
3. Repeat steps 1 to 14 to create the branches of the tree, where the input parameter with the input data set is the subset P(∗)i1,2 P(∗)i1,2.
The time used in k groups of the kd-tree algorithm is O(k) O(k) for the depth of the tree and because P is a finite set each partition has a length in time of O(log(n)) O(log(n)) , so the time total used in the algorithm is O(log(n)+k) O(log(n)+k) [46].
4. Proposed Protocol
This section describes in detail the hierarchical k-dimensional tree algorithm (H-kdtree). Unlike conventional WSN routing protocols like LEACH, HEED, TEEN, etc. [47,48], which used a few variations on Equation (1) to form clusters and select CH nodes according to nodes’ residual energy and their distance to the Sink/BS node, H-kdtree uses the one-dimensional clustering principle taken from the k-d tree algorithm. This algorithm generates a hierarchical two-hop network topology similar to LEACH’s.
Next, we will explain the clustering mechanism of the k-d tree algorithm intuitively, using the data from Table 1.
[ Table omitted. See PDF. ]
The data in Table 1 are divided into two clusters, starting data partition with data from the x dimension, implementing the median value ( vm vm ), where vm=(vmax+vmin)/2 vm=(vmax+vmin)/2 . For the data in Table 1, we have a median value of 53.5 for the x dimension, as shown in Figure 5.
In Figure 5, the algorithm shows the formation of two clusters. Each of the clusters found contains three variables:
1. Dimension used for the division (x or y),
2. Median value ( vm vm),
3. Limits of the nodes in each cluster.
The limits on the y dimension for cluster1 cluster1 and cluster2 cluster2 are, respectively, 29≤y(cluster1)≤75 29≤y(cluster1)≤75 y 29≤y(cluster2)≤93 29≤y(cluster2)≤93 . The structure in Figure 5 is divided in the same way but alternating the dimension, which in this case would be y, obtaining a new structure with four clusters, as shown in Figure 6.
Based on the structure obtained so far, as shown in Figure 6, we change dimension and begin to create new partitions, as shown in Figure 7. The process shown so far is repeated iteratively until the stop condition is met, being the number of clusters or the minimum group condition.
Algorithm 2 has the k variable as the input parameter. The k variable represents the number of clusters desired (this is a parameter similar to the Algorithm 2 has the k variable as the input parameter. The k variable represents the number of clusters desired (this is a parameter similar to the k-means algorithm). If k=3 k=3 , the first iteration obtains the data in Figure 5. Up to this point, we have two clusters. In the next iteration, we would obtain four clusters, but since the goal is to obtain three clusters, we take the clusters obtained so far and we select the cluster with the highest node count and partition only this cluster. In this way, we obtain the desired three clusters. In case the two clusters obtained in the first iteration have an equal number of nodes, one of them is chosen randomly.
4.1. Protocol Considerations
The maximum number of clusters that can be obtained is the total number of nodes divided by four. The minimum cluster condition regarding the number of nodes is three nodes and a CH node. In case we have a remainder smaller than four, the remaining nodes are added to the nearest cluster. In other words, the last partition of the current dimension in the algorithm is not performed.
The working principle of the H-kdtree protocol determines the following condition and consideration for the management of the complete network: Every action in the network is centralized and managed by the Sink/BS node, and all nodes in the network are within the range of the Sink/BS node.
Every node has a minimum energy threshold. This threshold is a function of the power supply voltage of each node. Every node will send the Sink/BS node a “Death” message when their power reserves reach 3% of the minimum operational threshold, informing the Sink/BS node that it is dead.
4.2. Configuration Phase
The Sink/BS node begins flooding the network with a broadcasted “Hello” message, to which every node in the network will reply with an acknowledgment message informing their nd energy level.
With the information obtained in the flooding process, H-kdtree begins the cluster formation process, based on the k-d tree algorithm. Once the clusters are formed, the following step is to select the CH nodes, based on the energy levels obtained during the flooding process. The node with the highest energy is selected as CH node. If two or more nodes have the same energy level, one of them is randomly selected to become a CH node.
At this point, the Sink/BS node already has information of every cluster, with their respective CH node and member nodes. The next step is configuring static routes. The Sink/BS node sends the CH nodes the static routes information, which is then forwarded to the rest of the nodes in each cluster. The result is the typical LEACH hierarchical routing, using a two-hop topology.
4.3. Transmission Phase
The data transmission phase is divided into rounds. Every round has a time slot of N-nodes, where N-nodes is the number of non-CH nodes in the network. During this period, the Sink/BS node sends a “Request” packet to the first CH node. Once the CH node receives this “Request” packet, it organizes a programmed transmission with the nodes in its cluster by using TDMA as access method. This process is repeated for all the clusters in the network.
The “Death” packet informs the Sink/BS node that a node has just died. Nodes in a cluster transmit the “Death” packet to the Sink/BS node using their respective time slot. If a CH node dies, it transmits its “Death” packet to the Sink/BS node when queried by the Sink/BS node. At the end of each round, the Sink/BS node reviews which nodes sent a “Death” packet. In case a “Death” packet arrives at the end of a round, the Sink/BS node begins the configuration phase, as shown in Figure 8.
Figure 9 below shows the H-kdtree protocol’s algorithm. Algorithm 2 shows the cluster formation process as a complement to the processes described in this section.
Algorithm 2 Cluster formation based on the k-d tree algorithm.
Require: Matrix obtained in the flooding process, with the following fields: idnode idnode , xcor xcor , ycor ycor , energy energy.
The dim dimvariable is the value of the column to that corresponds to the dimension to be selected,
where xcor=2 xcor=2 , ycor=3 ycor=3.
Ensure: List with the vectors of the positions selected in each cluster
1: function: cluster_formation (mat,dim) (mat,dim)
#Variable vec1 vec1 , stores the positional values of cluster1 cluster1
2: vec1=rep(NA,length(mat[,1])) vec1=rep(NA,length(mat[,1]))
#Variable vec2 vec2 , stores the positional values of cluster2 cluster2
3: vec2=rep(NA,length(mat[,1])) vec2=rep(NA,length(mat[,1]))
#Calculate the median of the selected partition
4: vm=median(mat[,dim]) vm=median(mat[,dim])
#Traverse the data in the selected dimension
5: for (i in 1:length(mat[,1])) do
6: #Subdivide the dimension into two clusters, depending on the median value
7: if (mat[i,dim]>vm) (mat[i,dim]>vm)then
7: vec1[i]=i vec1[i]=i
9: else
10: vec2[i]=i vec2[i]=i
11: end if
12: end for
13: refturn (list(vec1,vec2,vm)) (list(vec1,vec2,vm))
5. Simulation and Results Analysis
For the simulation, we used NS-2 version 2.35, simulating LEACH, LEACH-C and H-kdtree in the same network environment to make a comparison and obtain metrics in the same simulator. The LEACH, LEACH-C and H-kdtree algorithms were implemented using R version 3.4.3. Implementing the algorithms using R allowed us to generate scripts in “.tcl”, which were embedded in the main script to configure position and initial energy of the nodes, static routing between nodes, CH nodes and Sink/BS node, along with traffic generated in each time slot, and planned information transmission in TDMA.
5.1. Simulation Parameters
There were two simulation scenarios for LEACH, LEACH-C and H-kdtree. Scenario 1 consisted of a random deployment of sensors. Scenario 2 was a sensor deployment with higher density in the central zone of a deterministic scenario, as shown in Figure 10.
The use of random and deterministic node deployment scenarios aimed at abstracting network traffic behavior to evaluate QoS. Node deployment was done in a 100 m × 100 m area, maintaining the same density in both scenarios. The deterministic scenario aimed to evaluate network traffic in a scenario with higher density in its central area, with the objective of analyzing the influence of clustering in both types of scenarios.
Table 2 shows the simulation parameters used. These parameters are used in literature mainly to evaluate the performance of LEACH and LEACH-C [49,50,51,52].
[ Table omitted. See PDF. ]
Hierarchical protocols present two types of networks, according to their energy: homogeneous and heterogeneous networks. In homogeneous networks, the initial energy level is the same for all the nodes in the network. In heterogeneous networks, the nodes in the network have different initial energy values.
In the scenarios shown in Figure 10, the network is divided into two energy levels. This energy division is represented by the parameter m, which is used to calculate cluster energy (Ecls) (Ecls) [53]. (Ecls) (Ecls)can be calculated as follows:
Ecls=Ncls·E0·(1−m)+Ncls·m·E0·(1+α),
where E0 E0 is the initial energy of a regular node, Ncls Ncls is the number of clusters, and m is the percentage of nodes in the network with an advanced energy level. The quantity of advanced energy is represented by α α. H-kdtree uses the simulation parameter k to obtain the depth with which the nodes in the network will be partitioned. This partition is similar to LEACH’s p parameter, which is used to estimate the expected number of CH nodes.
5.2. Simulation Metrics
To assess data traffic performance and QoS in the proposed scenarios, we used the following performance metrics.
5.2.1. End-to-End Delay (EED)
It is the time elapsed since a packet is sent by a node and until the packet is received by the Sink/BS node, taking into account the latencies experienced in all its path, including the latency of the CH node [54]. It is calculated as follows:
EED=Trec−Tsent,
where Trec Trec is the time when the Sink/BS node receives a data packet, and Tsent Tsentis the time when a non-CH node sends that data packet.
5.2.2. Throughput
This is the number of bits that can be transmitted by each node to the Sink/BS node in a period of time [55]. The sum of the throughput of each node in the network is known as network throughput. The throughput is obtained by dividing the total number of packets received (by the Sink/BS node) by the total time for each round
Throughput=packetsreceived×packetsizetotal_timetransmitted.
5.2.3. Packet Delivery Ratio (PDR)
This is the ratio between the number of data packets received by the Sink/BS node and the number of data packets sent by the network nodes [56]. The PDR value can be obtained by the following equation:
PDR(%)=∑No_packetreceived∑No_packetsent×100.
5.2.4. Jitter
Jitter can estimate the instability of a communication link. It is the variability in the time needed by a packet to reach the previously transmitted packet [57]. It is calculated by:
Jitter=∑i=01Delayi−Delay¯N.
5.2.5. Auxiliary Metrics
Other performance metrics used in hierarchical routing protocols are summarized below. These metrics are the synthesis of the results in terms of node extinction per round. The metrics evaluated in both protocols are:
1. First node died (FND): It is the number of rounds in the network until the first node has depleted its energy and died.
2. Half of nodes died (HND):It is the number of rounds in the network until half of the nodes in the network have depleted their energy and died.
3. Last node died (LND): It is the number of rounds in the network until all nodes in the network have depleted their energy and died.
5.3. Results and Discussion
In the results obtained, one of the most stable parameters found in the proposed H-kdtree protocol is related to the formation of CH nodes, as shown in Figure 11. In this section, we analyze the impact of low variability in CH node formation, in relation to the following performance metrics: delay, throughput, and jitter, and their results are interpreted as QoS.
Regarding CH node formation in each round, we observed that LEACH and LEACH-C reduces the formation of CH nodes as nodes die. On the contrary, H-kdtree increases CH node formation in the network because of the minimum nodes per cluster value: as the number of nodes goes down, H-kdtree tends to maintain its k value by iterating more times, which tends to comply with the minimum nodes per cluster condition. This behavior can be seen in Figure 11 and Figure 12 after round 80.
Regarding energy levels, we did not find a significant variation or tendency in H-kdtree compared to LEACH and LEACH-C, as shown in Figure 13. The reason is that the energy that LEACH and LEACH-C used in node formation is offset by the energy used in selecting CH nodes in H-kdtree, being that the latter is more stable in terms of variations and allows for a more stable behavior in the data transmission phase. Figure 12 shows node death compared to energy. H-kdtree resulted in a lower number of dead nodes in both scenarios, compared to LEACH and LEACH-C.
The scenarios allow us to assess QoS features from a hierarchical point of view for LEACH, LEACH-C and H-kdtree, as the protocols share a clustering topology with a two-hop distance to the Sink/BS node.
Regarding delay, the scenario with random node deployment shows more delay than the deterministic scenario with more density in its central area. H-kdtree maintains a stable number of CH nodes for the maximum possible number of rounds. This simplifies the work of the Sink/BS node, as each node has an identifiable death threshold that, when reached, triggers the transmission of a “Death” packet to the Sink/BS node to inform its death. This feature enables H-kdtree to maintain a network topology for the maximum possible number of rounds. This is not possible for LEACH and LEACH-C, per changes in the network topology in each round.
In the rounds we evaluated in the random scenario, H-kdtree changes the topology of the network five times, and nine times in the deterministic scenario, as shown in Figure 12. LEACH and LEACH-C changed its topology 100 times in both scenarios (in each round, the topology changes).
CH nodes do not transmit sensory data. CH nodes compile packets from each cluster and retransmit them to the Sink/BS node. For this reason, if the network topology remains constant, delay, jitter, and throughput metrics will not vary, as these three metrics are a function of time. On the other hand, TDMA divides the network nodes into tie slots and ensures no packet loss due to simultaneous transmission.
In both scenarios, H-kdtree shows the lowest values for Delay and Jitter, due to H-kdtree’s low variability of topology, compared to LEACH and LEACH-C. This is shown in Figure 14 and Figure 15.
The stability of H-kdtree allows data traffic to remain constant, with very low variability in the rounds we evaluated as compared to LEACH and LEACH-C, in both scenarios. The results shown in Figure 14, Figure 15 and Figure 16 support our recommendation for multimedia applications, due to its stability in delay, jitter, and throughput metrics.
5.4. Results Summary
Figure 17 shows a general overview of the distribution symmetry of metrics, showing that (a) LEACH and LEACH-C shows a tendency to a symmetrical distribution of CH nodes in both the random and deterministic scenarios (This is due to the random function used in its algorithm). This result does not occur with H-kdtree. The four anomalous values shown in LEACH and LEACH-C are the minimum and maximum values in the observed rounds, outside the first and third quartile.
The anomalous values for H-kdtree in the deterministic scenario are in the last rounds. Regarding CH node formation, H-kdtree shows low variability, with most of the data in the first and second quartile. Our interpretation is that at least 75% of CH nodes formed showed low variability along the observed rounds.
Figure 17a and Table 3 show the low variability in the number of CH nodes. H-kdtree kept the number of CH nodes below the number of CH nodes generated by LEACH for the first 75 rounds (Q3). H-kdtree showed a reduction of 14.21% for the random scenario and of 30.14% for the deterministic scenario, as compared to LEACH.
[ Table omitted. See PDF. ]
Regarding average energy consumption for all nodes as shown in Figure 17b and Table 4, the energy behavior was similar in both H-kdtree and LEACH during the observed rounds. LEACH-C presents an energy efficiency above 40%, in relation to LEACH and H-kdtree. Figure 17c and Table 5 shows a proportional relationship between CH node formation and the number of dead nodes along the observed rounds.
[ Table omitted. See PDF. ]
[ Table omitted. See PDF. ]
To compare the results and quantify them as percentages, we used normalized averages. This will allow us to estimate the performance improvement for the metrics in the protocols, taking as a reference point the results for LEACH in the random scenario.
Figure 17c and Table 5 shows that between quartiles Q1 and Q3, which correspond to the 25% and 7% of the number of observed rounds, H-kdtree presented the lowest number of dead nodes. In its final stage, H-kdtree shows the highest number of dead nodes due to the on-demand CH node generation mechanism, compensated with energy expenditure after the Q3 quartile. Although H-kdtree does not provide an optimal node energy distribution, the on-demand CH node selection mechanism provides a significant improvement in QoS, as measured in delay, jitter, and throughput.
The variability in delay, jitter, and throughput of the proposed H-kdtree protocol as compared to LEACH and LEACH-C is very low in the random and deterministic scenarios, as shown in Figure 18. This is because the level of dispersion of values from the central trend in LEACH and LEACH-C is quite noticeable. These observations allow us to estimate QoS both quantitatively and qualitatively, supporting applications with higher demands.
With the level of delay variability shown in Figure 18a and Table 6, H-kdtree is able to provide QoS in networks with hierarchical topologies. In both the random and deterministic scenarios, H-kdtree showed a reduction in delay of 87.72% in the random scenario and of 95.39% in the deterministic scenario, compared to LEACH. With respect to LEACH-C, H-kdtree presented a reduction of 82.095% for the random scenario and 93.1% for the deterministic scenario.
[ Table omitted. See PDF. ]
Jitter response shown in Figure 18b and Table 7, interpreted as temporal variability in packet transmission, is also due to using TDMA for medium access. The level of jitter reduction found in the random scenario was of 76.52%, and 74.4% for the deterministic scenario. The values for delay, jitter, and variance were so low during the observed rounds that we can estimate that H-kdtree can guarantee the requirements for multimedia applications. The reason for this is that H-kdtree’s on-demand CH node selection mechanism is able to manage WSN resources efficiently.
[ Table omitted. See PDF. ]
The results obtained show that H-kdtree is able to provide QoS in applications with high restrictions in bandwidth and delay, at the expense of energy consumption. On the other hand, LEACH and LEACH-C are able to adapt to energy fluctuations in the network but is not capable of supporting multimedia applications or time restrictions, on account of its high variability.
Regarding bandwidth and the amount of data that it can transport per round, H-kdtree showed an increase of 48.96% in the random scenario and of 39.37% in the deterministic scenario, which compensates and justifies the energy requirements for transmitting data packets to the Sink/BS node as shown in Figure 18c and Table 8.
[ Table omitted. See PDF. ]
Among the metrics for hierarchical protocols, we took into account the metrics related to node death, included in Table 9.
[ Table omitted. See PDF. ]
5.5. Other Tests Performed
As a complement to the results obtained, we performed tests with 100, 300, and 400 nodes on areas of proportional size, maintaining the same node density of the 200-nodes tests. These tests were performed in a scenario with random node deployment. Energy assignment for 100, 300, and 400 nodes was also proportional to the 200-nodes tests. For these tests, we only took into account the average values of metrics, using the same metrics of the 200-nodes tests.
In the evaluation of a random scenario with 100, 200, 300, and 400 nodes, the average of CH nodes in the scenario is not relevant. However, the lower variability shown in the variance confirms H-kdtree’s characteristic on-demand CH node selection mechanism, maintaining its variance 83% below LEACH and LEACH-C as shown in the Table 10.
[ Table omitted. See PDF. ]
Regarding energy value, results show that H-kdtree maintains energy levels that are very close to those of LEACH, and therefore does not show an improvement in this area. However, H-kdtree shows a significant improvement in QoS as compared to LEACH and LEACH-C as shown in the Table 11.
[ Table omitted. See PDF. ]
Table 12 shows the use of an on-demand mechanism implies that the protocol only reacts to a change requested by the network. In the case of H-kdtree’s CH node selection mechanism, this means that it will only be used as a response to receiving a “Death” packet. Note that the number of nodes close to death is the number of CH nodes. Death node in H-kdtree is stepped, and in LEACH and LEACH-C it is incremental.
[ Table omitted. See PDF. ]
H-kdtree shows an improvement in delay reduction, with values over 60% as compared to LEACH y LEACH-C, as shown in Table 13.
[ Table omitted. See PDF. ]
H-kdtree shows a 95% jitter reduction as compared to LEACH and LEACH-C, as shown in Table 14.
[ Table omitted. See PDF. ]
H-kdtree shows a 50% throughput increase as compared to LEACH and LEACH-C, as shown in Table 15.
[ Table omitted. See PDF. ]
In the observed metrics in Table 16, show that the stability periods in the half-life of network nodes for the proposed H-kdtree protocol is longer than in LEACH and more short that in LEACH-C. After 50% of the rounds, in H-kdtree, we have found node death to be stepped and maintaining low variability in delay and jitter. This was not only due to its reactive mechanism but also because of its stability derived from using TDMA for medium access. The WSN we studied did not present node mobility: all nodes maintained their positions. This characteristic was used by H-kdtree and its cluster formation mechanism, which is based on the k-d tree algorithm and adds more stability by keeping the majority of nodes in the same clusters after each configuration phase.
[ Table omitted. See PDF. ]
The results on PDR showed that TDMA-based packet transmission planning did not show packet loss in LEACH, LEACH-C and H-kdtree, in all scenarios with 100, 200, 300, and 400 nodes.
6. Conclusions and Future Work
The H-kdtree protocol has main contributions. First, the clustering formation method based on the k-d tree algorithm partitions the sensor node deployment area in a two-hop hierarchical topology. Second, it is a WSN protocol that provides QoS in support of services with stricter resource demands while keeping energy usage at a level similar to the LEACH protocol.
The proposed H-kdtree protocol was based on the k-d tree algorithm in evaluating the spatial partitioning to organize nodes in a dimensional space (x and y). The average energy results obtained with LEACH-C, exceed LEACH and H-kdtree on 42%. The partitions found become clusters, creating a network topology that is able to provide QoS for the longest possible time with energy requirements similar to those of LEACH. H-kdtree is characterized by keeping the number of CH nodes stable for the longest number of rounds, maintaining a constant network topology and, as a consequence, low variability in delay, jitter, and throughput metrics. Although these metrics are a function of time, they depend on the variability of the number of CH nodes.
The H-kdtree protocol has three main processes. First, the protocol uses a two-hop network topology that was not altered in each round. Then, during the data transmission phase, the “Death” packet allows H-kdtree to implement a reactive mechanism that only returns to the configuration phase when a node requires it by sending the “Death” packet. This means that the configuration phase is only repeated on-demand. Finally, the minimum group condition allows network traffic to be more homogeneous, which is reflected in delay, jitter, and throughput and, as a consequence, in improved QoS.
The set of experiments performed in random scenarios with 100, 200, 300, and 400 nodes, and a deterministic scenario with 200 nodes, helped us compare LEACH and LEACH-C with the proposed H-kdtree protocol. The conclusion is that the H-kdtree protocol fulfilled the objective by addressing existing problems in cluster generation mechanisms by reducing the variability in CH node formation: with the same resources used in LEACH and LEACH-C, H-kdtree improved delay and jitter by 60% and 95% percent, throughput improved by over 50%, while keeping energy usage at the same levels of LEACH.
Additional experiments will be required to measure H-kdtree’s performance in additional scenarios, incrementing the number of rounds, varying density in environments with heterogeneous node-energy levels, and proposing optimization mechanisms for CH node selection to maximize energy levels in the network. Additionally, with the QoS results obtained, it will be necessary to perform traffic analysis with multimedia data.
Author Contributions
J.A. and J.P.E. designed and executed the experiments of the protocol based on k-d tree algorithm; G.T. performed the experiments in R; R.R.G. analyzed the data; all the authors wrote the paper.
Acknowledgments
This work has been partly supported by the program of mobility of researchers in doctoral programs (DIE-UD-engineering) of the Distrital Francisco José de Caldas University, and under the support by the resolution 0124 of 26 November 2009 of the Fundación Universitaria los Libertadores.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
CH Cluster Head
WSN Wireless Sensor Networks
IoT Internet of Things
CPU Central Processing Unit
LEACH Low Energy Adaptive Clustering Hierarchy
LEACH-C Low Energy Adaptive Clustering Hierarchy-centralized
QoS Quality of Service
PDR Packet Drop Rate
BS Base Station
GPS Global Positioning System
RSSI Received Signal Strength Indicator
TDMA Time Division Multiple Access
HEED Hybrid. Energy-Efficient Distributed
TEEN Threshold sensitive Energy Efficient sensor Network
NS-2 Network Simulator
EED End-to-End Delay
FND First Node Died
HND Half of Nodes Died
LND Last Node Died
H-kdtree Hierarchy protocol based on the k-d tree algorithm
1. Ringwald, M.; Romer, K. Deployment of Sensor Networks: Problems and Passive Inspection. In Proceedings of the 2007 Fifth Workshop on Intelligent Solutions in Embedded Systems, Leganes, Spain, 21–22 June 2007.
2. Anzola, J.; Bolaños, S.; Tarazona, G. Design Methodology for Self-organized Mobile Networks Based. Int. J. Interact. Multimed. Artif. Intell. 2016, 3, 46–53.
3. Wu, X.; Tang, D.; Qian, X. A Centralize Location Algorithm based on RSSI in Large-Scale Wireless Sensor Network. Procedia Eng. CEIS 2011, 15, 2004–2009.
4. Nighot, M.; Ghatol, A. GPS Based Distributed Communication Protocol for Static Sensor Network (GDCP). Procedia Comput. Sci. 2016, 78, 530–536.
5. Elhoseny, M.; Tharwat, A.; Yuan, X.; Hassanien, A.E. Optimizing K-coverage of mobile WSNs. Expert Syst. Appl. 2018, 92, 142–153.
6. Gupta, A.; Shekokar, N. A novel K-means L-layer algorithm for uneven clustering in WSN. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017.
7. Raval, D.; Raval, G.; Valiveti, S. Optimization of clustering process for WSN with hybrid harmony search and K-means algorithm. In Proceedings of the 2016 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, 8–9 April 2016.
8. Wang, Q.; Guo, S.; Hu, J.; Yang, Y. Spectral partitioning and fuzzy C-means based clustering algorithm for big data wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018, 54.
9. Wang, J.; Wang, K.; Niu, J.; Liu, W. A K-medoids based clustering algorithm for wireless sensor networks. In Proceedings of the 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, Thailand, 7–9 January 2018.
10. Gupta, V.; Doja, M. H-LEACH: Modified and Efficient LEACH Protocol for Hybrid Clustering Scenario in Wireless Sensor Networks. In Next-Generation Networks; Lobiyal, D.K., Mansotra, V., Singh, U., Eds.; Springer: Singapore, 2018; pp. 399–408.
11. Haque, M.; Ahmad, T.; Imran, M. Review of Hierarchical Routing Protocols for Wireless Sensor Networks. In Intelligent Communication and Computational Technologies; Springer: Singapore, 2018; pp. 237–246.
12. Rostami, A.S.; Badkoobe, M.; Mohanna, F.; Keshavarz, H.; Hosseinabadi, A.A.R.; Sangaiah, A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2018, 74, 277–323.
13. Yahiaoui, S.; Omar, M.; Bouabdallah, A.; Natalizio, E.; Challal, Y. An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks. AEU Int. J. Electron. Commun. 2018, 83, 193–203.
14. Marappan, P.; Rodrigues, P. An energy efficient routing protocol for correlated data using CL-LEACH in WSN. Wirel. Netw. 2016, 22, 1415–1423.
15. Usha, M.; Sreenithi, S.; Sujitha, M.; Swarnalatha, S. Node density based clustering to maximize the network lifetime of WSN using multiple mobile elements. In Proceedings of the 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 20–22 April 2017.
16. Grover, J.; Rani, R. Probabilistic Density Based Adaptive Clustering scheme to improve network survivability in WSN. In Proceedings of the Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Hefei, China, 11–13 July 2014.
17. Shamshirband, S.; Amini, A.; Badrul, N.; Mat, L.; Wah, Y.; Furnell, S. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 2014, 55, 212–226.
18. Bhatti, D.M.S.; Saeed, N.; Nam, H. Fuzzy C-Means Clustering and Energy Efficient Cluster Head Selection for Cooperative Sensor Network. Sensors 2016, 16, 1459.
19. Wang, Z.x.; Zhang, M.; Gao, X.; Wang, W.; Li, X. A clustering WSN routing protocol based on node energy and multipath. Cluster Comput. 2017.
20. Amodu, O.A.; Raja Mahmood, R.A. Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime. Wirel. Netw. 2018, 24, 1379–1402.
21. Sabor, N.; Ahmed, S.M.; Abo-Zahhad, M.; Sasaki, S. ARBIC: An Adjustable Range Based Immune hierarchy Clustering protocol supporting mobility of Wireless Sensor Networks. Pervasive Mob. Comput. 2018, 43, 27–48.
22. Wang, T.; Peng, Z.; Wen, S.; Lai, Y.; Jia, W.; Cai, Y.; Tian, H.; Chen, Y. Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 2017, 379, 160–176.
23. Goyal, N.; Dave, M.; Verma, A. Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 2016, 89, 687–707.
24. Nair, K.; Kulkarni, J.; Warde, M.; Dave, Z.; Rawalgaonkar, V.; Gore, G.; Joshi, J. Optimizing power consumption in iot based wireless sensor networks using Bluetooth Low Energy. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India, 8–10 October 2015.
25. Bozorgi, S.M.; Rostami, A.S.; Hosseinabadi, A.A.R.; Balas, V.E. A new clustering protocol for energy harvesting-wireless sensor networks. Comput. Electr. Eng. 2017, 64, 233–247.
26. Zuhra, F.T.; Bakar, K.A.; Ahmed, A.; Tunio, M.A. Routing protocols in wireless body sensor networks: A comprehensive survey. J. Netw. Comput. Appl. 2017, 99, 73–97.
27. Halder, S.; Das, S. Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes. J. Netw. Comput. Appl. 2014, 38, 106–124.
28. Madhja, A.; Nikoletseas, S.; Raptis, T. Hierarchical, collaborative wireless energy transfer in sensor networks with multiple Mobile Chargers. Comput. Netw. 2016, 97, 98–112.
29. Jung, K.; Lee, J.Y.; Jeong, H.Y. Improving adaptive cluster head selection of teen protocol using fuzzy logic for WMSN. Multimedia Tools Appl. 2017, 76, 18175–18190.
30. Arjunan, S.; Pothula, S. A survey on unequal clustering protocols in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 2017.
31. Kaur, R.; Arora, S. Nature Inspired Range Based Wireless Sensor Node Localization Algorithms. Int. J. Interact. Multimedia Artif. Intell. 2017, 4, 7–17.
32. Bahuguna, Y.; Punetha, D.; Verma, P. An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network. Int. J. Interact. Multimedia Artif. Intell. 2017, 4, 11–15.
33. Pereira, A.A.; Espada, J.P.; Crespo, R.G.; Aguilar, S.R. Platform for controlling and getting data from network connected drones in indoor environments. Future Gener. Comput. Syst. 2018.
34. Jiménez, A.; Bolaños, S.; Anzola, J. Decentralized model for autonomous robotic systems based on Wireless Sensor Network. J. Eng. Appl. Sci. 2016, 11, 11378–11382.
35. Molano, J.I.R.; Lovelle, J.M.C.; Montenegro, C.E.; Granados, J.J.R.; Crespo, R.G. Metamodel for integration of Internet of Things, Social Networks, the Cloud and Industry 4.0. J. Ambient Intell. Hum. Comput. 2018, 9, 709–723.
36. Jiménez, A.; García-Díaz, V.; Anzola, J. Design of a System for Vehicle Traffic Estimation for Applications on IoT. In Proceedings of the the 4th Multidisciplinary International Social Networks Conference, Bangkok, Thailand, 17–19 July 2017.
37. Anzola, J.P.; Cuellar, J.C. Evaluation of QoS in the Transmission of Video H.264/SVC for Ad Hoc Networks of Two Jumps. Int. J. Comput. Appl. 2014, 108, 1–8.
38. Mottaghi, S.; Reza, M. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes. AEU Int. J. Electron. Commun. 2015, 69, 507–514.
39. Manzoor, B.; Javaid, N.; Rehman, O.; Akbar, M.; Nadeem, Q.; Iqbal, A.; Ishfaq, M. Q-LEACH: A New Routing Protocol for WSNs. arXiv, 2013; arXiv:1303.5240.
40. Karim, L.; Nasser, N. Reliable location-aware routing protocol for mobile wireless sensor network. IET Commun. 2012, 6, 2149–2158.
41. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670.
42. Du, D.; Hu, X. Steiner Tree Problems in Computer Communication Networks; World Scientific Publishing Co., Inc.: River Edge, NJ, USA, 2008.
43. Shi, S.; Liu, X.; Gu, X. An energy-efficiency Optimized LEACH-C for wireless sensor networks. In Proceedings of the 7th International Conference on Communications and Networking in China, Kun Ming, China, 8–10 Auguest 2012.
44. Sivakumar, P.; Radhika, M. Performance Analysis of LEACH-GA over LEACH and LEACH-C in WSN. Procedia Comput. Sci. 2018, 125, 248–256.
45. Ma, Z.; Li, G.; Gong, Q. Improvement on LEACH-C protocol of wireless sensor network. Int. J. Future Gener. Commun. Netw. 2016, 9, 183–192.
46. Kakde, H.M. Range Searching using KD tree. 25 August 2005. Available online: http://151.100.17.32/pub/Estrinfo/Materiale/kdtree.pdf (accessed on 29 August 2018).
47. Ahmed, G.; Zou, J.; Fareed, M.M.S.; Zeeshan, M. Sleep-awake energy efficient distributed clustering algorithm for wireless sensor networks. Comput. Electr. Eng. 2016, 56, 385–398.
48. Scholar), V.K.A.R.; Sharma, V.; Sachdeva, M. A survey on LEACH and other’s routing protocols in wireless sensor network. Opt. Int. J. Light Electron Opt. 2016, 127, 6590–6600.
49. Alharthi, S.A.; Johnson, P.A. Threshold sensitive heterogeneous LEACH protocol for wireless sensor networks. In Proceedings of the 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–23 November 2016.
50. Lung, C.H.; Zhou, C. Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach. Ad Hoc Netw. 2010, 8, 328–344.
51. Syarif, A.; Abouaissa, A.; Lorenz, P. Operator calculus approach for route optimizing and enhancing wireless sensor network. J. Netw. Comput. Appl. 2017, 97.
52. Taheri, H.; Neamatollahi, P.; Younis, O.M.; Naghibzadeh, S.; Yaghmaee, M.H. An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Ad Hoc Netw. 2012, 10, 1469–1481.
53. Iqbal, A.; Akbar, M.; Javaid, N.; Bouk, S.H.; Ilahi, M.; Khan, R.D. Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs. J. Basic. Appl. Sci. Res. 2013, 3, 864–872.
54. Singal, G.; Laxmi, V.; Gaur, M.; Todi, S.; Rao, V.; Tripathi, M.; Kushwaha, R. Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Netw. 2017, 63, 115–128.
55. Tyagi, P.; Dembla, D. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egypt. Inf. J. 2017, 18, 133–139.
56. AL-Dhief, F.T.; Sabri, N.; Fouad, S.; Latiff, N.A.; Albader, M.A.A. A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective. J. King Saud Univ. Comput. Inf. Sci. 2017.
57. Mandhare, V.; Thool, V.; Manthalkar, R. QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. Comput. Netw. 2016, 110, 180–191.
1Department of Electronic Engineering, Fundación Universitaria Los Libertadores, Cr. 16 # 63A-68 Bogotá, Colombia
2Department of Engineering, Distrital University Francisco José de Caldas, Cr. 7 # 40B-53 Bogotá, Colombia
3Department of Computer Sciences, University of Oviedo, Street San Francisco, 33003 Oviedo, Spain
4Technology and Engineering Department of UNIR, Universidad International de la Rioja (UNIR), C/Almansa 101, 28040 Madrid, Spain
*Author to whom correspondence should be addressed.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2018. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Clustering in wireless sensor networks has been widely discussed in the literature as a strategy to reduce power consumption. However, aspects such as cluster formation and cluster head (CH) node assignment strategies have a significant impact on quality of service, as energy savings imply restrictions in application usage and data traffic within the network. Regarding the first aspect, this article proposes a hierarchical routing protocol based on the k-d tree algorithm, taking a partition data structure of the space to organize nodes into clusters. For the second aspect, we propose a reactive mechanism for the formation of CH nodes, with the purpose of improving delay, jitter, and throughput, in contrast with the low-energy adaptive clustering hierarchy/hierarchy-centralized protocol and validating the results through simulation.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer




