Smart Agriculture
Smart Agriculture
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
https://doi.org/10.1016/j.comcom.2022.02.016
Received 19 October 2021; Received in revised form 17 January 2022; Accepted 18 February 2022
Available online 2 March 2022
0140-3664/© 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
the distance between nodes and the base station may be beyond the
(4) The experimental results indicate that HTC-RDC outperforms the
corresponding communication radius in a vast target area. However,
compared methods.
this kind of method is commonly used in dynamic networks and might
This paper is organized as follows.
lack effective means to prolong the lifetime of a static network.
Section 2 briefly surveys the related works on methods for prolong-
The above traditional methods assume that there are redundant
ing the lifetime of networks. Section 3 describes the network model.
sensor nodes and that the data can be aggregated in the collection
Section 4 summarizes and analyzes the principles used to prolong the
process. However, in practical applications WSNs are expected to be
lifetime of networks. Section 5 presents the HTC-RDC protocol. In
deployed without redundancy to control cost and facilitate the process
Section 6, the effectiveness of the HTC-RDC protocol is verified based
of deployment for users, especially when sensor nodes are expensive,
on experiments, and the proposed approach is compared with other
or the cost of deploying nodes is high. For example, when deploying
techniques. Finally, Section 7 concludes the paper.
sensor nodes on the mountain for early warning of landslides, the
monitoring data is expected to be collected by deploying a minimum
number of nodes. That means each sensor node is crucial. In a situation 2. Related works
without redundant sensor nodes, the whole network works only if all
sensors are working. Therefore, the lifetime of the network is defined as Since the energy consumed by data transmission in the wireless
the lifetime of the node that first stops working. In addition, aggregated channel accounts for the highest proportion of the energy consumption
data reduce the energy consumption of the network; however, raw of the entire network, routing protocols are focused on to prolong
data that provide valuable information could yield important benefits the network lifetime. Most routing protocols in the literature can be
for real-world applications. For example, computer vision technologies divided into two categories: cluster-based routing protocols and tree-
require image data as inputs, and if data aggregation is applied in image based routing protocols. Both of these two categories of protocols use
collection with a WSN, the result of data aggregation will be textual or a variety of different strategies for different application scenarios to
numerical data but not image data. prolong the network lifetime.
Based on the above considerations, a new application scenario is
illustrated in Fig. 2, and its specifications are proposed as follows. (1) 2.1. Cluster-based routing protocols
The raw data from a target area must be collected without aggregation.
(2) Each sensor node is crucial in a WSN. (3) Some sensor nodes cannot Cluster-based routing protocols are typically used in static WSNs.
directly communicate with the base station. In this application scenario, With cluster-based routing protocols, sensor nodes are divided into
a new protocol, named the hybrid tree-based and cluster-based routing different clusters, and there is one cluster head in each cluster. The
protocol for raw data collection (HTC-RDC), is proposed to prolong cluster-head node collects the data from all the nodes in the cluster,
the lifetime of WSNs. In the HTC-RDC protocol, a multihop network aggregates the data [16] and sends the aggregated data to the base
is built with a tree structure to establish communication among all station or a cluster head at a higher level in the node hierarchy. The
the sensor nodes and the base station. In addition, a cluster structure main purpose of clustering is to prolong the lifetime of the network,
is incorporated into the tree structure to enhance the network energy and several methods can be employed to achieve this goal. The main
efficiency. The proposed hybrid structure is further reinforced to pro- difference among these methods is related to the selection criteria for
long the lifetime of the network based on the mechanisms exploited cluster-head nodes.
in tree-based or cluster-based protocols, such as load balancing and The low-energy adaptive clustering hierarchy (LEACH) protocol
hot-spot avoidance. The hybrid structure is established to collect raw [17] was the first dynamic cluster-based routing protocol. In the LEACH
data according to the above principle and combinatorial optimization. protocol, each node has a probability 𝑝 of being selected as a cluster-
Experiments are conducted under the proposed scenario. The results head for certain rounds in one period. The probability 𝑝 is also a
indicate that HTC-RDC outperforms the compared methods. reflection of the number of cluster head nodes in the population of
The contributions of this paper are summarized as follows: all nodes. If a node is a cluster head, in the rest of the period, it will
(1) A new scenario without redundant sensor nodes is defined to not be a cluster head again. After certain rounds, some other nodes are
collect raw data in practical situations. selected as new cluster heads. The other nodes join the cluster for which
(2) A mathematical model based on optimization theory is formu- the cluster head is the nearest. Other protocols that are improvements
lated for the proposed scenario. of LEACH, such as the centralized LEACH (LEACH-C) protocol [18], the
(3) A new HTC-RDC protocol is proposed to prolong the lifetime of two-level hierarchy LEACH (TL-LEACH) protocol [19], the threshold-
networks in the proposed scenario. based LEACH (T-LEACH) protocol [20], the density of sensor LEACH
67
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
(DS-LEACH) protocol [21], the LEACH energy-based protocol (LEACH- station. In tree-based routing protocols, the sensor nodes and the base
EP) [22] and the distance-based threshold LEACH (LEACH-DT) pro- station form a tree structure topology with the base station as the root.
tocol [23], were discussed in [24] and deemed classical approaches. A node transmits data to the base station through its parent nodes.
The advantage of these classical approaches is that they are easy to Studies of tree-based networks have also focused on how to prolong
implement because they are distributed methods with low computa- the lifetime of networks.
tional complexity and overhead, but they have some limitations in load If the coordinates of the nodes and the base station are avail-
balancing and coping with personalized node distributions. able based on positioning system (GPS) or other localization methods,
Fuzzy logic is introduced to improve the classical approach to load geographic information can be utilized to help prolong the lifetime
balancing. The main method involves using fuzzy logic to structure of a network. The geographic adaptive fidelity (GAF) protocol [38]
unequal clusters so that hot spots can be avoided as much as possible. builds virtual grids based on geographical information. All nodes in
For example, in the multiobjective fuzzy clustering algorithm (MOFCA) a particular grid square are equivalent with respect to forwarding
protocol [25], residual energy levels, the distance to the base station, packets, and only one equivalent node is active at a time. The node
and the density of parameters are considered fuzzy input parameters shifts among a sleeping state, a discovery state and an active state to
in the calculation of the cluster-head competition radius. Fuzzy logic prolong the lifetime of the network. The dynamic directional routing
schemes with different parameters and rules are employed by the (DDR) protocol [39] uses geographic information to limit the direction
LEACH protocol using fuzzy logic (LEACH-FL) [26], the energy-aware and distance of transmission when a node chooses its parent node. This
fuzzy unequal clustering (EAUCF) protocol [27], the energy conserved method reduces the energy consumption of unnecessary processes to
unequal clustering with fuzzy logic (ECUCF) protocol [28] and other prolong the lifetime of the network. The advantage of this approach is
approaches. that it is easy and requires little energy to discover neighbor nodes and
The optimization of cluster-head selection becomes difficult as the determine the parent nodes, but the disadvantage is that the solution
scale of the network increases. Metaheuristic algorithms have been in- may be the local optimal solution; therefore, the hot-spot problem
troduced to help solve this problem due to their excellent performance is difficult to avoid. This problem can be fatal for a node with no
in solving large-scale problems. Theant colony optimization (ACO) continuous energy source.
algorithm is used in the multipath routing (MPR) protocol [29] for the Another method employed by tree-based routing protocols is load
selection of cluster-heads, a genetic algorithm (GA) is applied in the balancing with a graph-based approach. In a tree structure, it is in-
GP-LEACH protocol [30], the harmony search (HS) algorithm is applied evitable that the nodes closer to the root bear higher loads than nodes
in the HS-LEACH protocol [30], the application-specific low power further from the root and die earlier; therefore, load balancing is the
routing (ASLPR) protocol [31] combines a GA and a simulated anneal- focus of most tree-based routing protocols. The RSTR protocol [40]
ing (SA) algorithm to optimize certain parameters used to determine
introduced the concept of virtual potential energy by considering resid-
the threshold for application-based cluster heads, and the butterfly
ual energy and the local densities of nodes and used virtual potential
optimization algorithm (BOA) and ACO are combined in [32] to re-
energy in the establishment of a minimum spanning tree to balance the
duce overall energy consumption. Some similar approaches, such as
energy consumption of the whole network and prolong the lifetime of
the heuristic algorithm for clustering hierarchy (HACH) protocol [33]
the network. Mao et al. [41] proposed a directed acyclic graph (DAG)
and the GA-based threshold sensitive energy-efficient routing proto-
based method. In this method, a weak node is defined, and a criterion
col (GATERP) [34], use metaheuristic algorithms to obtain optimal
function is designed to evaluate node data transmission to find and
solutions. The advantages of routing protocols based on metaheuristic
protect weak nodes in the network, resulting in improved balance in
algorithms are that they can not only handle large-scale problems but
energy consumption among nodes; consequently, the network lifetime
also provide global optimal solutions; however, the disadvantages are
can be prolonged. The methods used in tree-based routing protocols
high computational complexity and long computing times.
to prolong the lifetime of a network mainly focus on load balancing.
Approaches based on fuzzy logic and metaheuristic algorithms have
However, other mechanisms are rarely employed due to the topology
been combined by some researchers to take advantage of the benefits
of the tree structure, especially because nodes closer to the base station
of both schemes. Some representative methods include the fuzzy and
must play the role of repeaters; therefore, these nodes consume more
ant colony optimization-based combined MAC, routing, and unequal
energy than the other nodes.
clustering cross-layer (FAMACROW) protocol [35], the systems inter-
For the application scenario proposed in this paper, the cluster-
operability framework (SIF) protocol [36], and the LEACH based on
based method and the tree-based method have valuable merits. The
the Sugeno fuzzy inference system (LEACH-SF) protocol [37], but they
tree-based approach can effectively solve the problem that some nodes
are characterized by high implementation complexity.
cannot communicate directly with a base station, which is caused by
Cluster-based approaches have been improved by researchers, and a
number of effective protocols suitable for various application scenarios long transmission distances or obstacles. The cluster-based approach
have been developed. However, these methods are not fit for the pro- provides processes to prolong the lifetime of a network. However, as
posed application scenario in this paper. First, cluster-based approaches shown in Table 1, the existing protocols cannot be directly used in the
are usually used in one-hop networks in which the nodes can commu- application scenario proposed in this paper.
nicate directly with the base station, but in the application scenario Therefore, a hybrid approach that combines a cluster-based method
proposed in this paper, some nodes cannot directly communicate with and a tree-based method is proposed for the new application scenario.
the base station. Second, one of the most important ways to prolong
the lifetime of a network is to reduce the amount of data transmitted 3. Network model
by performing data aggregation; however, data aggregation cannot
be applied in the application scenario proposed in this paper since 3.1. Necessary assumptions
the aggregation process will inevitably lead to information loss, and
without data aggregation, traditional cluster-based routing protocols For the scenario researched in this paper, the network model is
will lose the ability to prolong the network lifetime. based on the following assumptions.
2.2. Tree-based routing protocols (a) The function of the network is to monitor a specific area and
periodically collect raw data from a target area with nodes.
Tree-based routing protocols are mainly used in dynamic networks, (b) The whole network is static. None of the nodes nor the base
and in these schemes, not all sensor nodes can directly contact the base station move after deployment.
68
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Table 1
Comparison with existing protocols for the application scenario proposed in this paper.
Classification Subclassification Protocol Operating with Obstacles allowed Oriented to prolong Effective in raw
redundant nodes in the target area the network lifetime data collection
ClusterL-based Classical approaches LEACH yes no yes no
routing protocols LEACH-C
TL-LEACH
T-LEACH
DS-LEACH
LEACH-EP
LEACH-DT
Fuzzy-based MOFCA yes no yes no
approaches LEACH-FL
EAUCF
ECUCF
Metaheuristic-based MPR yes no yes no
approaches GP-LEACH
HS-LEACH
ASLPR
HACH
GATERP
Hybrid fuzzy-based FAMACROW yes no yes no
and SIF
metaheuristic-based LEACH-SF
approaches
Tree-based – GAF yes no yes yes
routing protocols – DDR – no no yes
– RSTR yes yes no yes
Proposed – HTC-RDC no yes yes yes
(c) All the nodes are homogeneous. Each node has sensing, trans- • FNL (first node loss): The time (or round in an experiment) when
mission and forwarding functionalities that are enabled when the base station cannot receive messages from all of the nodes.
needed according to the routing protocol. For users, the nodes FNL must be caused by the death of the first node, but there may
are identical, and users do not need to determine whether the be more than one node that loses contact with the base station at
nodes are relay nodes. FNL.
(d) The locations where the nodes are deployed are random. Al- • HNL (loss of half of the nodes): The time (or round in an experi-
though the nodes are deployed intentionally, the result of the ment) when the base station can no longer receive messages from
deployment can be considered random. more than half of the nodes.
(e) The nodes are deployed with a relatively high spatial density to
According to the above assumptions, every single node in a WSN
ensure that each node has at least one path to reach the base
in the proposed scenario in this paper is crucial. The death of the
station.
first node is the shortest board of the barrel effect, so FNL is the key
(f) The nodes can only select the same node as the data-receiving
performance indicator of the WSN, and this parameter indicates the
node at a time and cannot distribute the data in their cache to
time when the WSN stops working. HNL is retained as a reference for
different receiving nodes.
evaluating network performance.
(g) Node batteries have limited energy supplies and are not
rechargeable, but the base station has a permanent energy sup-
3.3. The mathematical model of the energy consumption of the network
ply. The energy value of the batteries is defined as the residual
energy that can be accurately measured by the nodes. The energy consumption model of the radio module of a node is as
(h) The data that the nodes collect are raw data that can be com- follows. When a transmitter transmits 𝑙-bit data to a receiver located
pressed before transmission but cannot be aggregated. at distance 𝑑 from the transmitter, the energy consumption of the
(i) The radio wave propagation channel is symmetric, and the dis- transmitter (𝑐𝑡 ) is:
tances between the nodes and the base station can be computed
through the received signal strength indicator (RSSI) value. 𝑐𝑡 (𝑙, 𝑑) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐 + 𝑙 × 𝐸𝑓 𝑠 × 𝑑 2 (1)
(j) The transmission power of each node is continuously adjustable where 𝐸𝑒𝑙𝑒𝑐 represents the energy expenditure required to run the
according to the transmission distance. transmitter or the receiver circuitry per bit and 𝐸𝑓 𝑠 represents the
(k) Each node is not redundant. The death of any node will cause amplifier energy factor for the free-space model.
the whole network to lose its expected functionalities. The energy consumption of the receiver (𝑐𝑟 ) when receiving 𝑙-bit
data is:
3.2. Evaluation criteria
𝑐𝑟 (𝑙) = 𝑙 × 𝐸𝑒𝑙𝑒𝑐 (2)
For static networks, the lifetime of the network can be described by Based on these assumptions and the energy consumption model
the first node dies (FND), half of the nodes die (HND), and last node of the radio module of the above node, if only the radio module is
dies (LND) metrics [26,41–43]. In the scenario proposed in this paper, considered to consume the energy, the mathematical model of the
a node that cannot communicate directly with the base station may lose energy consumption of the network can be established as follows.
contact with the base station, even if it is still alive, due to the death We assume that the network consists of 𝑁 nodes and that there are
of all of its relay nodes. The alive/dead states can no longer accurately 𝑀 feasible schedules by which the data at each node can be transmitted
describe the network lifetime in this application scenario, so two new to the base station directly or through a relay. In the feasible schedule
metrics are introduced. 𝑆𝑖 (𝑖 ∈ 1, 2, … , 𝑀), the energy consumption of node 𝑗(𝑗 ∈ 1, 2, … , 𝑁) in
69
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
70
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Table 2
The energy consumption of the schedules in one round.
Schedule Node A Node B Total energy Lifetime
consumption
Mode Energy consumption Mode Energy consumption
approximate value approximate value
(Exact value) (Exact value)
a
𝑆1 Direct(A=>C) 9𝐸2 (𝐸1 + 9𝐸2 ) Direct(B=>C) 4𝐸2 (𝐸1 + 4𝐸2 ) 13𝐸2 111
a
𝑆2 Direct(A=>C) 18𝐸2 (3𝐸1 + 18𝐸2 ) Indirect(B=>A=>C) 𝐸2 (𝐸1 + 𝐸2 ) 19𝐸2 55
a
𝑆3 Indirect(A=>B=>C) 𝐸2 (𝐸1 + 𝐸2 ) Direct(B=>C) 8𝐸2 (3𝐸1 + 8𝐸2 ) 9𝐸2 125
a
𝑆4 Indirect(A=>B=>C) 10𝐸2 (3𝐸1 + 10𝐸2 ) Indirect(B=>A=>C) 5𝐸2 (3𝐸1 + 5𝐸2 ) 15𝐸2 100
a The term directly related to the lifetime of the network.
In the literature, nodes usually have the same residual energy when
a network is initiated. Therefore, maintaining a load balance will
maintain equality or approximate equality in the residual energy among
nodes. As introduced in Section 2, in cluster-based protocols, fuzzy
logic is used to maintain a load balance. In this paper, fuzzy logic is
not directly used. However, based on the concept of fuzzy logic, some
definitions, such as equivalent nodes, are introduced to achieve load
balancing. In tree-based protocols, some nodes bear heavier loads than
others due to their position in the topology, so it is inevitable for them
to die earlier. A load balance can be maintained by regulating the
selection of the receiving nodes when the farther nodes send data to
the relay nodes. In this paper, the concept of in-degree based on graph
theory is used to help achieve a load balance.
Fig. 4. The optimal solutions under different initial conditions. For a specific schedule, after certain rounds of operation, the cu-
mulative effect of unbalanced energy consumption will deteriorate the
balance of the residual energy. In the example in Fig. 3, no single
4. Analysis of the mechanisms used to prolong the network life- schedule can maintain the residual energy balance under the condition
time that the initial energy of the two nodes is equal.
Therefore, after a certain number of rounds, a new schedule should
Since it is difficult to obtain candidate schedules by solving op- be generated based on the current status of the network and exe-
timization problems at large scales, candidate schedules will be con- cuted instead of the previous schedule. This process is called schedule
structed by the routing protocol instead. The construction of the can- updating. The essence of schedule updating is to implement a combi-
didate schedule set is based on the nature of the candidate schedules. nation of different schedules that can complement each other in energy
The nature of the candidate schedules is discussed first. consumption.
From Table 2, even if only the most energy-efficient schedule (𝑆3 , In addition, there are two important effects of schedule updating
A=>B=>C, B=>C, total energy consumption 9𝐸2 ) is used, the lifetime in practical applications. The first is coping with topological changes
of the network is 125. However, through a combination of schedules, caused by node death and environmental changes. For example, a
the lifetime of the network can be prolonged up to 176, a 40.8% in- relay node may die due to component failure, energy depletion, or
crease. It can be inferred that energy savings are not the most important loss of communication in some direction due to a new obstacle. At
factor that affects the lifetime of the whole network. this time, it is necessary to update the schedule to allow the nodes in
For further analysis, another example is designed. In the example the network to contact the base station again. The second is dealing
in Fig. 3, it is assumed that the residual energy of Node A is fixed at with the uncertainty of energy consumption. The energy consumption
𝐸𝐴 = 1000𝐸2 , the residual energy of Node B varies from 0 to 10000𝐸2 , of the sensor module and the processor module of a sensor node can
and other premises remain unchanged. The optimal solutions of these be considered uncertain, so the energy consumption of all sensor nodes
10000 models are obtained by a CPLEX solver and demonstrated in can be formulated as a Markov process; in this case, the current state of
Fig. 4.
the network is the only factor that needs to be considered in schedule
In Fig. 4, it is worth noting that although 𝑆2 is the least energy-
generation. This approach is one way to address uncertain energy
efficient case, when 𝐸𝐵 is small, 𝑆2 should still be applied because Node
consumption.
B consumes the least energy in 𝑆2 . As the amount of energy used by
Node B increases, the proportion of 𝑆3 that consumes more energy at
Node B than at Node A increases. It can be concluded that the residual 4.3. Relay node insertion for energy savings
energy rather than energy efficiency is one of the most important
factors that influences the combinations of schedules. Additionally, When the network scale is large, that is, the number of nodes
the schedule with the greatest 𝑟∗𝑖 tends to minimize the difference in is large, under the premise of load balancing, there may still be a
residual energy between the two nodes. This result can be interpreted as variety of optional schedules. At this time, choosing an energy-efficient
the global optimum when the residual energy of the nodes is balanced. schedule can provide more choices for subsequent operations.
There have been many mechanisms used in previous protocols that A model is established to analyze the principle of energy savings,
let nodes with higher remaining energy levels bear greater loads than as shown in Fig. 5. It is assumed that Node 0 at coordinates (0, 0) will
other nodes. However, different mechanisms can be improved and transmit 𝑙-bit data to Node 𝑛 at coordinates (0, 𝑑) via (𝑛 − 1) relay nodes
applied to the scenarios proposed in this paper. and that the coordinates of Node 𝑖 are (𝑥𝑖 , 𝑦𝑖 ).
71
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Thus, when the relay nodes are uniformly distributed along the 5.1. The initialization of the network
connection between Node 0 and Node 𝑛, as shown in Fig. 6, the total
energy consumption is minimized. Since some nodes cannot communicate directly with the base sta-
The lowest total energy consumption is tion, they should find a path to the base station first. Although some
𝑑 dynamic routing protocols, such as the optimized link state routing
𝑐𝑡𝑜𝑡𝑎𝑙−𝑚𝑖𝑛 = 2𝑛 ⋅ 𝐸𝑒𝑙𝑒𝑐 ⋅ 𝑙 + 𝑛 ⋅ 𝑙 ⋅ 𝐸𝑓 𝑠 ⋅ ( )2
𝑛 (OLSR) [42] and ad hoc on-demand distance vector (AODV) [43]
(19)
𝐸𝑓 𝑠 ⋅ 𝑑 2 ⋅ 𝑙 protocols, can realize path discovery from a node to the base station,
= 2𝐸𝑒𝑙𝑒𝑐 ⋅ 𝑙 ⋅ 𝑛 +
𝑛 the overhead of energy consumption is large; therefore, these methods
When are only applicable to nodes with a continuous energy supply. A method
√ √ of advertising from the base station to all nodes is employed in the
⎢ 𝐸 𝑑2 ⎥ ⎡ 𝐸𝑓 𝑠 𝑑 2 ⎤
𝑛=⎢ ⎥ 𝑛=⎢ ⎥
𝑓𝑠 proposed protocol for network initialization so that all nodes can find
or (20)
⎢ 2𝐸𝑒𝑙𝑒𝑐 ⎥ ⎢ 2𝐸𝑒𝑙𝑒𝑐 ⎥ a path to the base station. This phase is divided into two subphases.
⎣ ⎦ ⎢ ⎥
72
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Fig. 7. The phases and subphases of the operation of the HTC-RDC protocol.
5.1.1. Advertising
The advertising process is illustrated in Fig. 8. Every node should
have an attribute named Hierarchy. The base station level is Hierar-
chy 0.
Step 1: The base station starts the initialization process. The base
station generates an integer in the current round of advertising and then
advertises a message with the power that is the same as the maximum
power of the radio module of the node. The message includes the round
number, the ID of the advertiser, the hierarchy level and the residual
energy information of the advertiser (the residual energy of the base
station can be set as infinity).
Step 2: The nodes maintain the initialization process, as shown in
Fig. 9. The nodes that receive a message should memorize the message,
compute the distance between the node and the source node based
on the RSSI, record the distance information, and then perform the Fig. 8. The advertising process.
following operations.
73
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
After the initialization of the network, data from every node can
be collected in the same way as described for the feedback process.
Since this approach is not effective in prolonging the lifetime of the
network, an optimized schedule should be created by the base station
based on all the network information. One of the most important tasks
in schedule creation is to set the next-hop node for each node.
74
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
𝑐can
2
𝑑alt_node 2
+ 𝑑alt_next−hop 𝑐𝐶 𝑑2
𝛽= ≈ (25) 𝛽𝐶𝐴 = ≈ 𝐸𝐶 (31)
2 2 𝑐𝐴 2
𝑑𝐸𝐴
𝑐alt 𝑑can_node + 𝑑can_next−hop
It is assumed that 𝛽𝐵𝐴 ≤ 𝛽0 and 𝛽𝐶𝐴 ≤ 𝛽0 ; that is, Node B and Node C
where 𝑑alt_node represents the distance between the node and the alter-
are both equivalent nodes. Because the in-degree of Node A is 1 and the
native node, 𝑑alt_next−hop represents the distance between the alternative
in-degrees of Node B and Node C are both 0, the next-hop node of Node
node and the next-hop node of the alternative node, 𝑑can_node represents
E should be selected between Node B and Node C. Then, comparing 𝛽𝐵𝐴
the distance between the node and the candidate node, and 𝑑can_next−hop 2 < 𝑑 2 ; therefore, Node B is the next-hop node of Node E.
represents the distance between the candidate node and the next-hop and 𝛽𝐶𝐴 , 𝑑𝐸𝐵 𝐶𝑂
node of the candidate node.
(ii) If the residual energy of the candidate node is higher than 5.2.2. Optimization by incorporating a cluster structure
that of the node that selects the next-hop node, energy consumption Based on the analysis in Section 4, if the cluster structure can be
tends to be unbalanced, and the node should be protected in energy integrated into the established tree structure, more mechanisms may
consumption. In this case, Eq. (22) can be specifically expressed as: be used to further prolong the lifetime of the network. The expected
cluster structure should balance the residual energy of nodes, promote
2
𝑑alt_node
𝑐can energy savings or both.
𝛽= ≈ (26)
𝑐alt 2
𝑑can_node It can be inferred that such a cluster structure is formed because
some nodes become cluster heads, while some other nodes choose
The alternative nodes that meet the above two criteria are equiv- indirect paths via the cluster heads; these indirect paths have the
alent nodes. If there are equivalent nodes for the candidate node of a following properties:
given node, the node with the lowest in-degree among the candidate
node and the equivalent nodes should be set as the next-hop node. • These paths will increase the balance of residual energy or pro-
Furthermore, if there is more than one node with the same minimum vide greater energy efficiency as a direct transmission path.
in-degree, the node that minimizes 𝛽 should be selected. • The relay node in an indirect path, that is, the cluster head, should
The establishment process must be performed for every node from a be a sibling node; otherwise, the path will be a direct transmission
lower hierarchy to a higher hierarchy since the direct transmission path path or a path with the wrong direction to an offspring node.
of a parent node may be used as a reference in the process. Compared • If a node is selected as a relay node by another node, it can no
with the tree structure with which a feedback message is collected, this longer choose an indirect transmission path; otherwise, for the
tree structure is optimized by load balancing. node that selects it as a relay node, there will be more than two
To illustrate the establishment process, a simple example is shown relay nodes, which will hinder energy savings.
in Fig. 11.
Nodes A, B, and C are classified as Hierarchy 1, so they all have The approach used to search for the best path involves determining
only one parent node: the base station (denoted as Node O), and their if the indirect path with any sibling node as the relay node is better
direct transmission paths AO, BO and CO are deterministic and are than the relevant direct transmission path. The criteria for selecting the
indicated by normal arrows in Fig. 11. Nodes D and E are classified best path are shown in Fig. 12. Node A and Node B are classified as
as Hierarchy 2 since they may have more than one parent node, so the Hierarchy 𝑖, Node C and Node D are classified as Hierarchy 𝑖 + 1, and
75
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
76
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
6.3. Results
77
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Fig. 15. The schedules created by the MHT, RSTR and HTC-RDC protocols in 𝑟𝑜𝑢𝑛𝑑 0 and 𝑟𝑜𝑢𝑛𝑑 400.
Table 4
The statistics of the Monte Carlo experimental results.
Protocol Average FNL (round) Average HNL (round) HNL-FNL (round)
MHT 122.69 687.36 564.67
RSTR 490.394 600.332 109.938
HTC-RDC 546.544 579.218 32.674
data from all nodes. The statistics of the 500 results are shown in
Table 4. The statistics indicate that the FNL of the network with
the HTC-RDC protocol is enhanced by approximately 11.4% over the
existing protocols.
6.4. Discussion
78
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
Fig. 17. The lifetime of the WSN with the MHT, RSTR, and HTC-RDC protocols under the same experimental conditions.
very close, which means there is little room for further optimization. References
Another fact is that in multihop networks, some nodes with a lower
hierarchy level must be relay nodes and bear a greater load, so re- [1] D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, Internet of things: Vision,
gardless of the applied routing protocol, their energy will dissipate applications and research challenges, Ad Hoc Netw. 10 (7) (2012) 1497–1516.
earlier. Therefore, achieving an 11.4% improvement is an effective [2] R. Manchanda, K. Sharma, Energy efficient compression sensing-based clustering
framework for IoT-based heterogeneous WSN, Telecommun. Syst. 74 (3) (2020)
improvement.
311–330.
In addition, if applied in practical applications, the HTC-RDC pro- [3] C. Zygowski, A. Jaekel, Optimal path planning strategies for monitoring coverage
tocol will have three other merits: (1) The application of the schedule holes in wireless sensor networks, Ad Hoc Netw. 96 (2020) 101990.
will result in considerable energy savings compared with traditional [4] J. Amutha, S. Sharma, J. Nagar, WSN strategies based on sensors, deployment,
protocols. Each node can turn its radio module off when it does not sensing models, coverage and energy efficiency: Review, approaches and open
need to send or receive a signal according to the schedule. For example, issues, Wirel. Pers. Commun. 111 (2) (2020) 1089–1115.
without a schedule, the nodes must remain awake to listen to the [5] M. Younis, K. Akkaya, Strategies and techniques for node placement in wireless
sensor networks: A survey, Ad Hoc Netw. 6 (4) (2008) 621–655.
environment, gather information from other nodes and potentially
[6] M.Y. Aalsalem, W.Z. Khan, W. Gharibi, M.K. Khan, Q. Arshad, Wireless sensor
receive data. (2) The HTC-RDC protocol is a centralized method, so the networks in oil and gas industry: Recent advances, taxonomy, requirements, and
base station can control every node in the network. This will make it open challenges, J. Netw. Comput. Appl. 113 (2018) 87–97.
possible to develop more functions for the network. (3) The network [7] Y. Mekonnen, S. Namuduri, L. Burton, A. Sarwat, S. Bhansali, Review—Machine
using the HTC-RDC protocol does not require redundant nodes, which learning techniques in wireless sensor network based precision agriculture, J.
will reduce the cost of the network and make it easier to use. Electrochem. Soc. 167 (3) (2020) 037522.
[8] A. Shahanaghi, Y. Yang, R.M. Buehrer, Stochastic link modeling of static wireless
sensor networks over the ocean surface, IEEE Trans. Wireless Commun. 19 (6)
7. Conclusion (2020) 4154–4169.
[9] A. Alaiad, L. Zhou, Patients’ adoption of WSN-based smart home healthcare
In this paper, a new application scenario of WSNs is proposed based systems: An integrated model of facilitators and barriers, IEEE Trans. Prof.
on the requirements of practical applications. In this application sce- Commun. 60 (1) (2017) 4–23.
nario, (1) each sensor node is crucial, (2) the data to be collected from [10] S.-K. Yang, Y.-M. Shiue, Z.-Y. Su, C.-G. Liu, A novel authentication scheme
the sensor nodes are raw data instead of aggregated data, and (3) some against node captured attack in WSN for healthcare scene, in: 2019 IEEE Eurasia
Conference on Biomedical Engineering, Healthcare and Sustainability, ECBIOS,
of the sensor nodes cannot directly communicate with the base station. IEEE Press, 2019, pp. 39–42.
For this application scenario, a mathematical model based on optimiza- [11] G.M.E. Rahman, K.A. Wahid, LDAP: Lightweight dynamic auto-reconfigurable
tion theory is formulated. Since the model cannot be accurately solved protocol in an IoT-enabled WSN for wide-area remote monitoring, Remote Sens.
when the scale of the network is large, a new centralized generated 12 (19) (2020) 3131.
protocol with a hybrid tree and cluster structure for raw data collection, [12] S. Al-Sodairi, R. Ouni, Reliable and energy-efficient multi-hop LEACH-based
termed HTC-RDC, is proposed. The experimental results indicate that clustering protocol for wireless sensor networks, Sustain. Comput. Inform. Syst.
20 (2018) 1–13.
the WSN with the proposed protocol can collect raw data from all the
[13] M. Kaur, A. Munjal, Data aggregation algorithms for wireless sensor network: A
nodes and that the lifetime of the WSN can be prolonged by an average review, Ad Hoc Netw. 100 (2020) 102083.
of 11.4% compared with that achieved by the existing approaches. In [14] V. Seedha Devi, T. Ravi, S.B. Priya, Cluster based data aggregation scheme for
typical cases, the protocol can achieve satisfactory performance. latency and packet loss reduction in WSN, Comput. Commun. 149 (2020) 36–43.
[15] C. Thomson, I. Wadhaj, Z. Tan, A. Al-Dubai, Towards an energy balancing
CRediT authorship contribution statement solution for wireless sensor network with mobile sink node, Comput. Commun.
170 (2021) 50–64.
[16] R.R. Rout, S.K. Ghosh, Adaptive data aggregation and energy efficiency using
Yangbin Zhang: Conceptualization, Methodology, Software. Lihua
network coding in a clustered wireless sensor network: An analytical approach,
Liu: Conceptualization, Funding acquisition, Resources, Supervision, Comput. Commun. 40 (2014) 65–75.
Writing – review & editing. Mao Wang: Validation, Writing – review & [17] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communi-
editing. Jibing Wu: Validation, Writing – review & editing. Hongbin cation protocol for wireless microsensor networks, in: Proceedings of the 33rd
Huang: Supervision, Writing – review & editing. Hawaii International Conference on System Sciences, IEEE Press, 2000, pp.
223–233.
Declaration of competing interest [18] W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, An application-specific
protocol architecture for wireless microsensor networks, IEEE Trans. Wireless
Commun. 1 (4) (2002) 660–670.
The authors declare that they have no known competing finan- [19] D. Zhixiang, Q. Bensheng, Three-layered routing protocol for WSN based on
cial interests or personal relationships that could have appeared to LEACH algorithm, in: Wireless, Mobile and Sensor Networks, IET Conference on.
influence the work reported in this paper. IET, Stevenage, 2007, pp. 72–75.
79
Y. Zhang, L. Liu, M. Wang et al. Computer Communications 188 (2022) 66–80
[20] J. Hong, J. Kook, S. Lee, D. Kwon, S. Yi, T-LEACH: The method of threshold- Yangbin Zhang received his B.S. degree in electronic engi-
based cluster head replacement for wireless sensor networks, Inform. Syst. Front. neering from the National University of Defense Technology
11 (5) (2009) 513–521. (NUDT), Changsha, China, in 2009. He is currently pursuing
[21] J. Bagherzadeh, M. Samadzamini, A clustering algorithm for wireless sensor the M.S. degree in management science and engineering
networks based on density of sensors, in: International Conference on Advances with NUDT. His research interests include Internet of things
in Mobile Computing & Multimedia, ACM, 2009, pp. 594–598. and data engineering.
[22] J. Jia, Z. He, J. Kuang, Y. Mu, An energy consumption balanced clustering
algorithm for wireless sensor network, in: 2010 6th International Conference
on Wireless Communications Networking and Mobile Computing, WiCOM, IEEE,
2010, pp. 1–4.
[23] S.H. Kang, T. Nguyen, Distance based thresholds for cluster head selection in
wireless sensor networks, IEEE Commun. Lett. 16 (9) (2012) 1396–1399.
[24] F. Fanian, M. Kuchaki Rafsanjani, Cluster-based routing protocols in wireless
sensor networks: A survey based on methodology, J. Netw. Comput. Appl. 142 Lihua Liu received her B.S. and Ph.D. degrees in infor-
(2019) 111–142. mation and communication engineering from the National
[25] S.A. Sert, H. Bagci, A. Yazici, MOFCA: Multi-objective fuzzy clustering algorithm University of Defense Technology (NUDT), Changsha, China,
for wireless sensor networks, Appl. Soft Comput. 30 (2015) 151–165. in 2004 and 2012, respectively. She is currently an Associate
[26] R. Ge, H. Zhang, S. Gong, Improving on LEACH protocol of wireless sensor Professor in the Science and Technology on Information Sys-
networks using fuzzy logic, J. Inform. Comput. Sci. 7 (3) (2010). tems Engineering Laboratory, NUDT. Her research interests
[27] H. Bagci, A. Yazici, An energy aware fuzzy approach to unequal clustering in include target recognition, data fusion, data engineering,
wireless sensor networks, Appl. Soft Comput. 13 (4) (2013) 1741–1749. and intelligent decision.
[28] K. Sundaran, V. Ganapathy, P. Sudhakara, Fuzzy logic based unequal clustering
in wireless sensor network for minimizing energy consumption, in: 2017 2nd In-
ternational Conference on Computing and Communications Technologies, ICCCT,
IEEE, 2017, pp. 304–309.
[29] J. Yang, M. Xu, W. Zhao, B. Xu, A multipath routing protocol based on clustering
and ant colony optimization for wireless sensor networks, Sensors 10 (5) (2010)
4521–4540. Mao Wang received his B.S. degree in computer science
[30] M. Karimi, H.R. Naji, S. Golestani, Optimizing cluster-head selection in wireless and technology from Beijing Institute of Technology (BIT),
sensor networks using genetic algorithm and harmony search algorithm, in: 20th Beijing, China, in 2011. Then he received his M.S. and
Iranian Conference on Electrical Engineering, IEEE, 2012, pp. 706–710. Ph.D. degrees in computer science and technology from
[31] M. Shokouhifar, A. Jalali, A new evolutionary based application specific routing the National University of Defense Technology (NUDT),
protocol for clustered wireless sensor networks, AEU - Int. J. Electron. Commun. Changsha, China, in 2013 and 2018, respectively. He is
69 (1) (2015) 432–441. currently a Lecturer in the Science and Technology on
[32] P. Maheshwari, A.K. Sharma, K. Verma, Energy efficient cluster based rout- Information Systems Engineering Laboratory, NUDT. His
ing protocol for WSN using butterfly optimization algorithm and ant colony research interests include image retrieval, and evolutionary
optimization, Ad Hoc Netw. 110 (2021) 102317. computation.
[33] M.O. Oladimeji, M. Turkey, S. Dudley, HACH: Heuristic algorithm for clustering
hierarchy protocol in wireless sensor networks, Appl. Soft Comput. 55 (2017)
452–461.
[34] N. Mittal, U. Singh, B.S. Sohi, An energy-aware cluster-based stable protocol for
wireless sensor networks, Neural Comput. Appl. 31 (11) (2019) 7269–7286. Jibing Wu received his B.S. and M.S. degrees in information
[35] S. Gajjar, M. Sarkar, K. Dasgupta, FAMACROW: Fuzzy and ant colony optimiza- system engineering from the National University of Defense
tion based combined mac, routing, and unequal clustering cross-layer protocol Technology (NUDT), Changsha, China, in 2010 and 2012,
for wireless sensor networks, Appl. Soft Comput. 43 (2016) 235–247. respectively, and the Ph.D. degree in management science
[36] Z.M. Zahedi, R. Akbari, M. Shokouhifar, F. Safaei, A. Jalali, Swarm intelligence and engineering from NUDT, in 2017. He is currently
based fuzzy routing protocol for clustered wireless sensor networks, Expert Syst. an Associate Professor in the Science and Technology on
Appl. 55 (2016) 313–328. Information Systems Engineering Laboratory, NUDT. His re-
[37] M. Shokouhifar, A. Jalali, Optimized sugeno fuzzy clustering algorithm for search interests include heterogeneous information network,
wireless sensor networks, Eng. Appl. Artif. Intell. 60 (2017) 16–25. information management, and computational intelligence.
[38] Y. Xu, J. Heidemann, D. Estrin, Geography-informed energy conservation for ad
hoc routing, in: International Conference on Mobile Computing & Networking,
ACM, 2001, pp. 70–84.
[39] R. Almesaeed, A. Jedidi, Dynamic directional routing for mobile wireless sensor
networks, Ad Hoc Netw. 110 (2021) 102301.
[40] Q. He, J. Mou, B. Lin, A robust self-organizing tree-based routing protocol for Hongbin Huang received his B.S. and Ph.D. degrees in
wireless sensor networks, Math. Probl. Eng. 2021 (2021) 1–13. information system engineering from the National Univer-
[41] M. Yuxing, Z. Huiyuan, Y. Dongmei, Weak node protection to maximize the sity of Defense Technology (NUDT), ChangSha, China, in
lifetime of wireless sensor networks, J. Syst. Eng. Electron. 29 (4) (2018) 1996 and 2007, respectively. He is currently a Professor
693–706. in the Science and Technology on Information Systems En-
[42] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot, gineering Laboratory, NUDT. His research interests include
Optimized link state routing protocol for ad hoc networks, in: Proceedings. IEEE cyber–physical system, intelligent decision, computational
International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for intelligence, and information management.
the 21st Century, IEEE, NEW YORK, 2001, pp. 62–68.
[43] C.E. Parkins, Ad hoc on-demand distance vector routing, in: Proc IEEE Wmcsa99
Feb, Vol. 6, no. 3, 1999, pp. 94–95.
80