An Energy-Efficient Dynamic Clustering Protocol For Event Monitoring in Large-Scale WSN
An Energy-Efficient Dynamic Clustering Protocol For Event Monitoring in Large-Scale WSN
1558-1748 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23615
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
23616 IEEE SENSORS JOURNAL, VOL. 21, NO. 20, OCTOBER 15, 2021
II. R ELATED W ORKS structure of the entire network does not have to change,
In this section, we will list several existing network proto- which can save much energy. The selection of CH considers
cols and analyze their performance in event monitoring in a the residual energy and node degree. The simulation result
large-scale network. shows that ADEC has good scalability and can balance energy
consumption.
Although ADEC avoids the vast energy consumption caused
A. LEACH
by global cluster structure adjustment, its clustering process
LEACH [20] is a classic low-power adaptive clustering pro- does not consider monitoring dynamic events. When the event
tocol. In LEACH, each node decides whether it can be a CH spreads across the annulus, ADEC will not be able to organize
by comparing a random number between 0 and 1 with a given an effective topology.
threshold. The following equation estimates the threshold T(n):
⎧ p
⎨ , if n ∈ G, D. Other Related Algorithms
T (n) = 1 − p × (r mod p )
1
(1)
⎩ In [13], an adaptive dynamic clustering scheme for target
0, otherwise, tracking is presented. A model for the prediction of the
where ‘r ’ is the current round, ‘ p’ is the desired probability target location and the formation of an adaptive cluster is
of the nodes to become CH, and ‘G’ is the set of nodes that designed to optimize the power consumption in the network.
have not become CH in the last 1/p rounds. The equation In [23], a time-division election transmission model was
(1) ensures that within 1/p rounds, each of the sensor nodes first proposed to reduce energy consumption caused by data
becomes the CH only once. LEACH balances network energy collision. Based on energy information and tracking quality,
consumption by rotating CHs. The experimental results show the energy-balanced farthest scheduling strategy was proposed,
that LEACH’s network survival time is 15% longer than the effectively reducing energy consumption and improving track-
general plane routing protocol network. ing accuracy. In CAICS [24], a collaborative node selection
However, LEACH assumes that all nodes can directly com- method based on the spatial correlation of sensors is proposed.
municate with sink nodes, which is impractical in large-scale Each CH selects the tracking nodes with the most prominent
networks. In addition, the selection of CHs is completely joint information utility to reduce energy consumption. A
random without considering the state of the event. novel protocol based on the k-nearest neighbours (KNN)
algorithm is proposed in [25]. KNN is utilised to achieve
efficient continuous tracking with coverage holes in the net-
B. EEAOC
work. An energy-efficient incremental clustering algorithm
EEAOC [21] is a clustering algorithm for dynamic event followed by Gaussian adaptive resonance theory is proposed
monitoring. In EEAOC, a 2-logical overlapping clustering in [26]. The cluster can learn, create, update, and retain
scheme is designed so that adjacent sensors in the event area incrementally through online learning to adapt to the dynamic
can be grouped into the same cluster for data fusion. All sensor event. In HCTT [27], a hybrid clustering strategy is proposed,
nodes will exchange information in the initial phase. Each in which a dynamic cluster structure is combined with an
node will save a slave-CH for backup. When the event spreads existing static cluster. Whenever the event spreads to the
out of the current cluster, the boundary node will send data current static cluster boundary, an on-demand dynamic cluster
to its slave-CH. In this way, an overlapping cluster structure is formed and temporarily responsible for monitoring.
can be generated based on the development of the event.
Experimental results show that EEAOC can achieve higher
efficiency in the application of event monitoring.
III. N ETWORK AND E NERGY M ODELS
However, in EEAOC, the cluster structure will not change
once it is formed. When a CH is about to die, the closest A. Network Model
CM will take its role. In this way, some CMs are no longer
In order to present our algorithms, the assumptions about
within the new CH’s communication range and become iso-
the network model are as follows:
lated nodes. The same situation holds true for the slave-CH.
(1) There are ‘N’ sensor nodes randomly distributed in an
After several rounds of transmission, more and more isolated
‘L × L’ monitoring area with high density. The sink is located
nodes will appear in the network. The isolated nodes will
in the centre of the network.
remain active till death, and the data they sensed will be
(2) All the sensor nodes and the sink are stationary after
lost. Therefore, the energy efficiency of the network cannot
deployment.
be guaranteed to the end.
(3) The sensor nodes are all homogeneous, and the sink
has enough energy to support the continuous operation of the
C. ADEC WSN.
In ADEC [22], the monitoring area is divided into annu- (4) The sensor nodes are aware of their location coordinates.
luses, and nodes in the same annulus are at the same level. The clocks of all nodes are synchronized.
Clustering is performed only between nodes of the same level. (5) The wireless channel is completely symmetric, and the
In this way, when any CH dies, the process of re-clustering transmission power can be adjusted according to the distance
will only be carried out in the corresponding annulus. The between two nodes.
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23617
B. Energy Model
The energy dissipation of a sensor node for transmitting and
receiving ‘k’ bits over a distance ‘d’ are (the same as the radio
model in [21], [24]),
k(E elec + ε f s × d 2 ), d < d0
E T x (k, d) = (2)
k(E elec + εmp × d 4 ), d ≥ d0
E Rx = k × E elec (3)
where ‘E elec ’ is the energy spent per bit of the transmitting
circuit, ‘ε f s ’ and ‘εmp
’ are the energy coefficient of power
amplification, ‘d0 = εmp /ε f s ’ is the threshold distance of
the two energy models.
IV. P ROPOSED P ROTOCOL Fig. 3. The occurrence of the event activates the surrounding nodes.
In this section, the details of the proposed dynamic cluster-
ing protocol, namely EEDC, is discussed. Firstly, a broadcast
delay related to the sensing distance and residual energy of
nodes is introduced for initial CH competing. Next, a new
hybrid algorithm RFCM-GA is designed to solve the CCH
selection problem. In the proposed algorithm, the soft clus-
tering method supported by fussy set theory is combined
with robust global search ability to provide a better clustering
solution. After this, a strategy of cluster structure adjustment
is also presented to deal with the dynamic development of the
event.
The proposed EEDC protocol operates in several epochs,
and each epoch includes four steps: 1) network initialization,
2) initial cluster formation, 3) dynamic clustering scheme
based on RFCM-GA and 4) cluster structure adjustment.
A. Network Initialization
In network initialization, sink will flood a “Hello” message
in the network. By receiving and forwarding this message,
Fig. 4. Formation of the initial cluster.
each node can create a neighbour information table containing
nodes’ ID, residual energy and location. Each node takes the
neighbour with the most residual energy as its preferred relay factors, and satisfy ‘a +b = 1’. The first term on the right side
node to sink. Besides, each node can know its node degree by of equation (4) guarantees that the node with more residual
calculating the number of neighbours. energy and closer to the event becomes CH. The second term
Network initialization is run at the beginning of each epoch ‘Trand ’ is a relatively small random value, which is set to
before the event appears. Its function is to gather the necessary prevent nodes from simultaneously declaring as CH.
network information in preparation for the following steps. After ‘TD ’, the first node that broadcasts the “CH competing
message” will announce itself as the initial CH. The broadcast
B. Initial Cluster Formation range is the communication radius ‘RC ’. If a node receives a
“CH competing message” before ‘TD ’ expires, it will give
When an event occurs in the monitoring area, nodes within
up the CH competition and become a cluster member (CM).
‘R S ’ from the event centre will be activated, as shown in
CMs will send node ID, residual energy, node degree and
Fig. 3. To compete to become the initial CH, each node sends
position coordinates to CH. The initial cluster structure is
a delayed broadcast message, which is introduced to avoid
shown in Fig. 4. The small circle of radius ‘R S ’ centred on
collision and reduce message overhead. The delay value of
the event centre represents the range of nodes participating in
node ‘i ’ is given as [21]:
the sensing task. The large circle of radius ‘RC ’ centred on the
a Erein(i) +b dRe (i)
E
TD (i ) = e S + Trand , (4) CH indicates the cluster range.
Moreover, the transmission path from CH to sink is obtained
where ‘Ere (i )’ is the residual energy of node ‘i ’, ‘E in ’ is the after CH is determined. CH will send a “relay awaken mes-
initial energy, ‘de (i )’ is the distance from node ‘i ’ to the event sage” to the preferred relay node saved in network initializa-
centre, ‘R S ’ is the sensing radius, ‘a’ and ‘b’ are the weight tion. The relay node will continue to forward the message to
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
23618 IEEE SENSORS JOURNAL, VOL. 21, NO. 20, OCTOBER 15, 2021
TABLE I
N OTATIONS AND D EFINITIONS IN EEDC
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23619
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
23620 IEEE SENSORS JOURNAL, VOL. 21, NO. 20, OCTOBER 15, 2021
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23621
Fig. 10. The movement and expansion of the event triggers some CCHs
to become new CHs.
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
23622 IEEE SENSORS JOURNAL, VOL. 21, NO. 20, OCTOBER 15, 2021
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23623
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
23624 IEEE SENSORS JOURNAL, VOL. 21, NO. 20, OCTOBER 15, 2021
VI. C ONCLUSION
This paper proposes a new dynamic clustering algorithm—
EEDC, used for event monitoring in large-scale WSN.
In EEDC, an RFCM-GA based CCH selection algorithm is
proposed. In RFCM-GA, the clustering process is divided
into two parts, cluster formation based on RFCM and CCH
selection based on improved GA. We firstly use RFCM to
form the overlapping clusters, and then the improved GA is
used to find the most suitable CCH in each cluster. A group of
Fig. 14. Comparison of HND and LND in the network under different
number of nodes. CCHs are obtained by minimizing the fitness function. Finally,
as the event develops, the cluster structure will be adjusted,
and some CCHs will become new CHs. This mechanism can
make the cluster structure of the network change dynamically
with the state of the event. The simulation results show that
EEDC achieves better energy efficiency than other clustering
protocols under two different event development cases. It is
concluded that EEDC is more suitable for event monitoring
applications in large-scale WSNs compared with existing
protocols.
R EFERENCES
[1] P. Prasad, “Recent trend in wireless sensor network and its applications:
A survey,” Sensor Rev., vol. 35, no. 2, pp. 229–236, Mar. 2015.
[2] L. K. Ketshabetswe, A. M. Zungeru, M. Mangwala, J. M. Chuma,
and B. Sigweni, “Communication protocols for wireless sensor net-
works: A survey and comparison,” Heliyon, vol. 5, no. 5, May 2019,
Art. no. e01591.
[3] R. Elhabyan, W. Shi, and M. St-Hilaire, “Coverage protocols for wireless
Fig. 15. Comparison of fitness values in the clustering process using sensor networks: Review and future directions,” J. Commun. Netw.,
RFCM-GA and classic GA. vol. 21, no. 1, pp. 45–60, Feb. 2019.
[4] H. Yang, Z. Feng, X. Teng, L. Guan, H. Hu, and M. Wu, “Three-
of the algorithm execution, resulting in an unstable cluster dimensional printing of high-mass loading electrodes for energy storage
structure and many isolated nodes. Compared with EEAOC, applications,” InfoMat, vol. 3, no. 6, pp. 631–647, Jun. 2021.
[5] O. Demigha, W. K. Hidouci, and T. Ahmed, “On energy efficiency in
EEDC has a more flexible and straightforward dynamic cluster collaborative target tracking in wireless sensor network: A review,” IEEE
structure, which selects CH according to the current state of Commun. Surveys Tuts., vol. 15, no. 3, pp. 1210–1222, 3rd Quart., 2013.
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.
QU et al.: EEDC PROTOCOL FOR EVENT MONITORING 23625
[6] M. Naderan, M. Dehghan, H. Pedram, and V. Hakami, “Survey of Zhiyi Qu received the B.S. degree from Jilin Uni-
mobile object tracking protocols in wireless sensor networks: A network- versity in 2017. He is currently pursuing the Ph.D.
centric perspective,” Int. J. Ad Hoc Ubiquitous Comput., vol. 11, no. 1, degree with Shanghai Institute of Microsystem
pp. 34–63, Sep. 2012. and Information Technology, Chinese Academy
[7] M. Nighot, A. Ghatol, and V. Thakare, “Distributed energy efficient of Sciences, and also with the School of Elec-
tracking in hybrid wireless sensor network (DEETH),” Int. J. Commun. tronic, Electrical and Communication Engineer-
Syst., vol. 31, no. 5, p. e3498, Mar. 2018. ing, University of Chinese Academy of Sciences.
[8] C. Lersteau, A. Rossi, and M. Sevaux, “Minimum energy target tracking His research interests include topology control
with coverage guarantee in wireless sensor networks,” Eur. J. Oper. Res., and protocol design of wireless sensor networks.
vol. 265, no. 3, pp. 882–894, Mar. 2018.
[9] S. Bhowmik and C. Giri, “Convoy tree based fuzzy target tracking in
wireless sensor network,” Int. J. Sens. Netw., vol. 24, no. 4, pp. 1–9,
Dec. 2017. Huihui Xu received the B.S. degree from
[10] X. Yu and J. Liang, “Genetic fuzzy tree based node moving strategy of Wuhan University in 2019. She is currently pur-
target tracking in multimodal wireless sensor network,” IEEE Access, suing the Ph.D. degree with Shanghai Insti-
vol. 6, pp. 25764–25772, May 2018. tute of Microsystem and Information Technology,
[11] X. Liu, “A survey on clustering routing protocols in wireless sensor Chinese Academy of Sciences, and also with
networks,” Sensors, vol. 12, no. 8, pp. 11113–11153, Aug. 2012. the School of Electronic, Electrical and Com-
[12] P. Nayak and A. Devulapalli, “A fuzzy logic-based clustering algorithm munication Engineering, University of Chinese
for WSN to extend the network lifetime,” IEEE Sensors J., vol. 16, Academy of Sciences. Her research interests
no. 1, pp. 137–144, Jan. 2016. include resource allocation, and algorithm design
[13] T. Ahmad and A. M. Abbas, “EEAC: An energy efficient adaptive cluster in event-driven wireless sensor networks.
based target tracking in wireless sensor networks,” J. Interdiscipl. Math.,
vol. 23, no. 2, pp. 379–392, May 2020.
[14] P. Lalwani, S. Das, H. Banka, and C. Kumar, “CRHS: Clustering and
routing in wireless sensor networks using harmony search algorithm,” Xue Zhao received the B.S. degree from
Neural Comput. Appl., vol. 30, no. 2, pp. 639–659, Jul. 2018. Shandong University in 2019. She is currently
[15] X. Zhao, S. Ren, H. Quan, and Q. Gao, “Routing protocol for het- pursuing the Ph.D. degree with Shanghai Insti-
erogeneous wireless sensor networks based on a modified grey wolf tute of Microsystem and Information Technology,
optimizer,” Sensors, vol. 20, no. 3, p. 820, Feb. 2020. Chinese Academy of Sciences, and also with
[16] S. M. Bozorgi, M. R. Hajiabadi, A. A. R. Hosseinabadi, and the School of Electronic, Electrical and Com-
A. K. Sangaiah, “Clustering based on whale optimization algorithm for munication Engineering, University of Chinese
IoT over wireless nodes,” Soft Comput., vol. 25, no. 7, pp. 5663–5682, Academy of Sciences. Her research interests
Jan. 2021. include wireless sensor networks and network
[17] G. P. Gupta and S. Jha, “Integrated clustering and routing protocol protocols.
for wireless sensor networks using cuckoo and harmony search based
metaheuristic techniques,” Eng. Appl. Artif. Intell., vol. 68, pp. 101–109,
Feb. 2018.
[18] V. K. Chawra and G. P. Gupta, “Hybrid meta-heuristic techniques Hongying Tang received the Ph.D. degree
based efficient charging scheduling scheme for multiple mobile wireless from Shanghai Jiao Tong University (SJTU),
chargers based wireless rechargeable sensor networks,” Peer-Peer Netw. China, in 2015. She is currently an Engineer
Appl., vol. 14, no. 3, pp. 1303–1315, Jan. 2021. with the Science and Technology on Microsystem
[19] G. P. Gupta and B. Saha, “Load balanced clustering scheme using Laboratory, Shanghai Institute of Microsystem
hybrid metaheuristic technique for mobile sink based wireless sensor and Information Technology, Chinese Academy
networks,” J. Ambient Intell. Humanized Comput., early access, of Sciences. Her research interests include
nos. 14–15, Apr. 2020, doi: 10.1007/s12652-020-01909-z. unmanned aerial vehicle (UAV) communications,
[20] M. A. Rahmadhani, L. V. Yovita, and R. Mayasari, “Energy consumption linear transceiver design, and wireless sensor
and packet loss analysis of LEACH routing protocol on WSN over networks.
DTN,” in Proc. 4th Int. Conf. Wireless Telematics (ICWT), Jul. 2018,
pp. 1–5.
[21] Y. Hu, Y. Niu, J. Lam, and Z. Shu, “An energy-efficient adaptive
Jiang Wang received the B.S. and M.S.
overlapping clustering method for dynamic continuous monitoring in
degrees from the University of Electronic Sci-
WSNs,” IEEE Sensors J., vol. 17, no. 3, pp. 834–847, Feb. 2017.
ence and Technology of China, Chengdu, China,
[22] Z. Zhou and Y. Niu, “An energy efficient clustering algorithm based
in 1998 and 2001, respectively, and the Ph.D.
on annulus division applied in wireless sensor networks,” Wireless Pers.
degree from Southeast University, Nanjing,
Commun., vol. 115, no. 3, pp. 2229–2241, Aug. 2020.
China, in 2006. He is currently a Professor
[23] M. Wei, X. He, and L. Xu, “Dynamic clustering target tracking based
and a Master’s Supervisor with Shanghai Insti-
on energy optimization in wireless sensor networks,” J. Comput. Appl.,
tute of Microsystem and Information Technology,
vol. 37, no. 6, pp. 1539–1544, Oct. 2017.
Chinese Academy of Sciences. His research
[24] J. Feng, B. Lian, and H. Zhao, “Coordinated and adaptive information
interests include single frequency networking for
collecting in target tracking wireless sensor networks,” IEEE Sensors J.,
future wireless communication systems, radio
vol. 15, no. 6, pp. 3436–3445, Jun. 2015.
resource management/cross-layer optimization for mobile self-organized
[25] Y. Liu, J.-S. Fu, and Z. Zhang, “K-nearest neighbors tracking in wire-
networks, and wireless sensor networks.
less sensor networks with coverage holes,” Pers. Ubiquitous Comput.,
vol. 20, no. 3, pp. 431–446, Jun. 2016.
[26] M. Akter, M. O. Rahman, M. N. Islam, M. M. Hassan, A. Alsanad, and Baoqing Li received the Ph.D. degree from
A. K. Sangaiah, “Energy-efficient tracking and localization of objects the State Key Laboratory of Transducer Tech-
in wireless sensor networks,” IEEE Access, vol. 6, pp. 17165–17177, nology, Shanghai Institute of Metallurgy, Chi-
Feb. 2018. nese Academy of Sciences, Shanghai, China,
[27] Z. Wang, W. Lou, Z. Wang, J. Ma, and H. Chen, “A hybrid cluster-based in 2000. He is currently a Professor and a Ph.D.
target tracking protocol for wireless sensor networks,” Int. J. Distrib. Supervisor with Shanghai Institute of Microsys-
Sens. Netw., vol. 2013, pp. 245–253, Mar. 2013. tem and Information Technology, Chinese Acad-
[28] Z. Liu, Q. Zheng, L. Xue, and X. Guan, “A distributed energy- emy of Sciences. His research interest includes
efficient clustering algorithm with improved coverage in wireless sensor application of wireless sensor networks.
networks,” Future Generat. Comput. Syst., vol. 28, no. 5, pp. 780–790,
May 2012.
Authorized licensed use limited to: Aditya Engineering College. Downloaded on November 24,2021 at 05:14:04 UTC from IEEE Xplore. Restrictions apply.