A Novel Static Cluster-Based Hierarchical Protocol
A Novel Static Cluster-Based Hierarchical Protocol
net/publication/353089191
CITATIONS READS
0 65
4 authors, including:
Asma Mesmoudi
Hassiba Benbouali University of Chlef
3 PUBLICATIONS 101 CITATIONS
SEE PROFILE
All content following this page was uploaded by Asma Mesmoudi on 06 December 2021.
https://doi.org/10.18280/i2m.200306 ABSTRACT
Received: 16 March 2021 Wireless sensor networks have recently gained a lot of attention from the scientific
Accepted: 31 May 2021 community due to their very wide spectrum of applications. In such networks, the sensor
nodes have limited resources. These constraints impose many challenges to the design of
Keywords: related protocols. Especially, routing protocols should be energy-efficient for the
cluster head node, energy-efficient, prolonged network lifetime. The LEACH protocol is the most popular energy-efficient
hierarchical clustering, LEACH, SCHP hierarchical clustering protocol for WSNs that was proposed for reducing power
wireless sensor network consumption. However, LEACH suffers from several drawbacks such as the non uniform
distribution of Cluster Head nodes, the possibility of choosing a low energy node as
Cluster Head, etc. In this paper, an attempt is made to overcome this shortcoming by
introducing a new hierarchical clustering protocol, called SCHP (Static Cluster-based
Hierarchical Protocol). The SCHP protocol is based on a static cluster creation and an
optimal cluster head selection. Simulation results show that the proposal guarantees better
performance than the LEACH Protocol that is considered as the baseline in the literature.
We used many metrics, as packet loss rate, end-to-end delay, and energy consumption to
evaluate the efficiency of our proposal. We show also that the SCHP protocol can improve
the network lifetime.
161
nodes will broadcast an announcement message to notify clusters, as shown in Figure 1. Thus, the number of desired
others that it is a cluster head. In each round, if a node has been clusters “k” should between 5% and 15% of the total number
elected as a cluster head, its T(n) is set to zero, so that the node of nodes [10].
will not be elected as a cluster head again. The threshold T(n)
is set using the formula:
𝑝
𝑖𝑓 𝑛 ∈ 𝐺
1
𝑇(𝑛) = {1 − 𝑝 × (𝑟 𝑚𝑜𝑑
𝑝
) (1)
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
162
The deployment of sensor nodes is a crucial phase that can (1) Step1: After the completion of the previous three
affect significantly the coverage quality of the network phases, all non CH nodes decide which cluster they belong to
monitoring area. Figure 2 shows that with a uniform according to the strength of the RSSI signal.
distribution deployment strategy a good coverage quality is (2) Step2: Each non CH node must inform the CH that it
ensured. Therefore, our SCHP protocol uses a random will be a member of its cluster. They reply then with the JOIN_
deployment of nodes with a uniform distribution. So, the REQ message, which contains their identifier (ID).
whole network is represented by a set of grid cells and each (3) Step3: After the reception of the JOIN_ REQ
cell of the grid contains an equal number of nodes. message, each CH starts by identifies the set of sensors that is
in the same cluster and assigns then an index for each received
3.2 Protocol description ID. This index is based on the order of receiving messages, as
shown in Figure 4.
The basic assumptions considered during the construction
of our protocol are presented as follows:
(1) Each sensor node has a unique identifier ID.
(2) All sensor nodes monitor the environment at a fixed
interval, and they always have data to send to the final user.
(3) The sink node has an unlimited energy resource and
has high transmission power. As such, all sensor nodes are
within the range of this node.
(4) The nodes can use the power control to regulate the
transmission power according to the transmission distance if
necessary. Thus, a CH can directly perform transmission to the
sink node.
(5) All nodes are considered nomadic or stationary.
Our proposed routing protocol involves the following Figure 4. Illustrating the organization phase
phases:
3.2.5 Scheduling phase
3.2.1 Planification phase When the clusters are formed, each CH will produce a
In this phase, the whole network is represented by a set of TDMA schedule and notify all the member nodes in the cluster.
grid cells. Each cell of the grid (a number K of cells) will be After the reception of the schedule by a member node, it
related to a set of nodes, which will form a cluster. Moreover, transmits data to its correspondent CH node in its time slots
each CH takes as its position the center of gravity (COG: and remains in the sleep state in other slots.
Center Of Gravity) of each cell, as shown in Figure 3.
3.2.6 Sharing phase
In this phase, each CH node broadcasts a message to their
member’s nodes that contains the list 𝐿_𝑀𝑁 of the IDs and their
appropriate index.
where,
163
a new round and all the following rounds (r ≠ 0), this process We evaluated the energy consumption of the sensor nodes
is repeated but the announcement phase and the organization during five rounds. We considered a network with 150 nodes.
phase are ignored. This is because the election of the CHs will As shown in Figure 5, the total energy consumption of the
be automatic. nodes in the SCHP protocol is a little higher than that of the
The elected CH is the node corresponding to the appropriate LEACH protocol in rounds 0 and 1, but after some time, the
ID of the minimal index saved by each member node in the energy consumption of the SCHP protocol decreases
Sharing phase of the previous round. As the information compared to that of the LEACH protocol. This is due to the
(containing the identifiers of the member nodes with its index) elimination of energy-intensive tasks (cluster organization in
saved by the member nodes of each cluster is the same, the rounds ≠ 0) performed by the CH when it is elected in each
nodes know directly their CH for this round. round.
With this process, just after the reception of the initialization
message of new round r, the CHs transmit directly the 4.1.2 Energy consumption of CHs and member nodes
scheduling messages to the nodes of its cluster, then passes Concerning the SCHP protocol, it is easy to see from Figure
directly to the transmission phase and like that for all the 6 that in round 0 the average energy consumption of either
following rounds. member nodes and CH nodes is very high compared to that of
the LEACH protocol. The rate of more than 31.95% is noted
for the CH nodes on one hand and a rate of more than 28.87%
4. SIMULATION AND RESULTS is noted for member nodes on the other hand. This is due to the
tasks dedicated to the sharing of the member nodes' table. We
In this section, we present a performance evaluation of the could notice that the average energy consumption of nodes in
SCHP protocol through a set of experiments. Indeed, we the SCHP protocol decreases for the rest of the rounds. This is
provide extensive simulations to verify performance metrics due to the end of cluster organization tasks. The decrease is
such as energy consumption, network lifetime, and packet loss with an average rate of 24.42% less for CH nodes and 13.82%
rate. In the set of simulations, we compare the SCHP protocol less for member nodes.
with LEACH [6], which is considered as the baseline in the
literature. To that end, we implemented SCHP using the NesC
[13] programming language to be integrated with TinyOS. The
simulations are done using the TOSSIM [14] environment. We
have also used PowerTOSSIM, a dedicated plugin that models
power consumption.
In our simulations, we make use of several networks that
have a size varying from 50 to 200 nodes (of MICA2 type).
Among these nodes, 10% of nodes are CH. The nodes are
distributed uniformly and randomly in an area of 100 ×100 m.
Furthermore, the Lossy propagation model is employed.
The performance of routing protocols is evaluated in terms
of the following metrics: energy consumption, network
lifetime, packet loss rate, and the average end-to-end delay. Figure 6. Average energy consumption of CH node and
member nodes
4.1 Energy consumption
4.1.3 Evaluation of average energy consumption with respect
Sensor nodes have limited power source. Therefore, routing to network size
protocols must be energy efficient to extend the life of the As shown in Figure 7, we notice that the average energy
network. To evaluate the energy consumption, we used consumed in the network is independent of the number of the
PowerTOSSIM plugin with TinyViz to analyze the energy of deployed nodes. This is due to the existence of the hierarchical
the two protocols. topology in both protocols that make them very scalable.
Besides, we observe a rate of 14.62% less dissipated energy
4.1.1 The additional energy consumption for our SCHP protocol compared to the LEACH protocol. This
is due to the decrease in the number of control messages used
in the cluster organization phase.
164
4.2 The network lifetime
5. CONCLUSIONS
Figure 9. Distribution of dead sensor nodes
Because of the limited energy resources of sensors, energy
4.3 Packet loss rate efficiency is one of the main challenges in designing protocols
for WSNs. Clustering is proven to be an effective technique to
The choice of this metric, as a performance criterion, stems attain energy efficiency. Many hierarchical clustering
from the necessity in some applications to exchange critical protocols focus on electing an optimal CH node.
data. In this paper, we have presented a new hierarchical routing
As shown in Figure 10, we can see that the packet loss rates protocol, called "SCHP: Static Clustering Hierarchy Protocol".
exchanged are tolerable for both protocols. We can see that the We make use of a static clustering strategy, with an equal
packet loss rate is higher in LEACH than in the SCHP protocol. number of nodes for each formed cluster. During rounds that
This is because the LEACH protocol has clusters with a large differ from 0 and based on an analysis of received information
number of members, which leads to collusions between the from nodes either CH nodes or members, the cluster head (CH)
nodes, and has a higher number of dead nodes compared to the selection and CH nodes rotation are automatically performed.
SCHP protocol. The simulation results showed that the performance of the
proposed protocol compared to the LEACH routing protocol
165
is better in terms of energy consumption, packet loss rate, end- [9] Lung, C.H., Zhou, C. (2010). Using hierarchical
to-end delay, and even monitoring of efficiency. agglomerative clustering in wireless sensor networks: An
energy-efficient and flexible approach. Ad Hoc
Networks, 8(3): 328-344.
REFERENCES https://doi.org/10.1016/j.adhoc.2009.09.004
[10] Wang, Y., Xiong, M. (2005). Simulation of leach
[1] Mesmoudi, A., Feham, M., Labraoui, N. (2013). protocol for wireless sensor networks. 6th International
Wireless sensor networks localization algorithms: A Conference on Parallel and Distributed Computing
comprehensive survey. International Journal of Applications and Technologies, Dalian, China, pp. 85-88.
Computer Networks & Communications, 5(6): 45-64. http://dx.doi.org/10.1109/PCSPA.2010.113
https://dx.doi.org/10.5121/ijcnc.2013.5603 [11] Pantazis, N., Nikolidakis, S., Vergados, D. (2013).
[2] Romer, K., Mattern, F. (2004). The design space of Energy-efficient routing protocols in wireless sensor
wireless sensor networks. IEEE Wireless networks: A survey. IEEE Communications Surveys &
Communication, 11(6): 54-61. Tutorials, 15(2): 551-591.
https://doi.org/10.1109/MWC.2004.1368897 https://doi.org/10.1109/SURV.2012.062612.00084
[3] Mesmoudi, S., Feham, M. (2011). BSK-WBSN: [12] Patil, M., Biradar, R.C. (2012). A survey on routing
Biometric symmetric keys to secure wireless body protocols in wireless sensor networks. IEEE
sensors networks. International Journal of Network Communications, India.
Security & Its Applications, 3(5): 55-166. http://dx.doi.org/10.1109/ICON.2012.6506539
https://doi.org/10.5121/ijnsa.2011.3512 [13] Gay, D., Levis, P., Behren, R.V., Melsh, M., Brewer, E.,
[4] Syed, M., Dubey, M.K. (2020). Software-fault mitigation Culler, D. (2003). The nesC language: A holistic
for derivation of quality of services (QoS) in wireless approach to networked embedded systems. ACM
sensor networks (WSN). Instrumentation Mesure SIGPLAN International Workshop, San Diego,
Métrologie, 19(5): 327-336. California, USA, pp. 9-11.
https://doi.org/10.18280/i2m.190502 http://dx.doi.org/10.1145/781131.781133
[5] Uppalapati, S. (2020). Energy-efficient heterogeneous [14] Levis, P., Lee, N., Welsh, M., Culler, D. (2003).
optimization routing protocol for wireless sensor TOSSIM: Accurate and scalable simulation of entire
network. Instrumentation Mesure Métrologie, 19(5): tinyosapplications. 1st ACM Conference on Embedded
391-397. https://doi.org/10.18280/i2m.190510 Networked Sensor Systems, Los Angeles, CA, pp. 126-
[6] Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H. 137. https://dx.doi.org/10.1145/958491.958506
(2000). Energy-efficient communication protocol for
wireless microsensor networks. The 33rd Hawaii
International Conference on System Sciences, Maui, NOMENCLATURE
Hawaii, USA, pp. 3005-3014.
http://dx.doi.org/10.1109/HICSS.2000.926982 CH Cluster Head
[7] Lindsey, S., Raghavendra, C.S. (2002). PEGASIS: MN Member Node
Power-efficient gathering in sensor information system. R Communication range
IEEE Aerospace Conference, Big Sky, Montana, pp. Z Area of the network
1125-1130. r Round
https://doi.org/10.1109/AERO.2002.1035242 K Number of CH
[8] Manjeshwar, A., Agrawal, D.P. (2001). TEEN: A List contains the identifiers and their
L_MN
protocol for enhanced efficiency in wireless sensor appropriate index of the member nodes
networks. 1st International Workshop on Parallel and idMNi Identifier of the member node i
Distributed Computing Issues in Wireless Networks and index MNi Index of the Identifier of the member node i
Mobile Computing, San Francisco, CA. The number of member nodes in each
https://doi.org/10.1109/IPDPS.2001.925197 m
cluster
166