Next Article in Journal
High Sensitivity pH Sensor Based on Porous Silicon (PSi) Extended Gate Field-Effect Transistor
Next Article in Special Issue
An Efficient Interactive Model for On-Demand Sensing-As-A-Servicesof Sensor-Cloud
Previous Article in Journal
Realistic Image Rendition Using a Variable Exponent Functional Model for Retinex
Previous Article in Special Issue
Data-Driven Design of Intelligent Wireless Networks: An Overview and Tutorial
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Power-Efficient Clustering Protocol for Coal Mine Face Monitoring with Wireless Sensor Networks Under Channel Fading Conditions

School of Information & Electrical Engineering, China University of Mining and Technology, Xuzhou 221116, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(6), 835; https://doi.org/10.3390/s16060835
Submission received: 12 February 2016 / Revised: 24 May 2016 / Accepted: 31 May 2016 / Published: 7 June 2016
(This article belongs to the Special Issue Intelligent Internet of Things (IoT) Networks)

Abstract

:
This study proposes a novel power-efficient and anti-fading clustering based on a cross-layer that is specific to the time-varying fading characteristics of channels in the monitoring of coal mine faces with wireless sensor networks. The number of active sensor nodes and a sliding window are set up such that the optimal number of cluster heads (CHs) is selected in each round. Based on a stable expected number of CHs, we explore the channel efficiency between nodes and the base station by using a probe frame and the joint surplus energy in assessing the CH selection. Moreover, the sending power of a node in different periods is regulated by the signal fade margin method. The simulation results demonstrate that compared with several common algorithms, the power-efficient and fading-aware clustering with a cross-layer (PEAFC-CL) protocol features a stable network topology and adaptability under signal time-varying fading, which effectively prolongs the lifetime of the network and reduces network packet loss, thus making it more applicable to the complex and variable environment characteristic of a coal mine face.

1. Introduction

As a dynamic and intricate operation, coal mining requires a multifaceted continuous stream of information from the surface to underground and vice versa. Due to the severe environment and changing circumstances of underground coal mining, on-site production must be guided and managed by transmitting and sharing various aspects of real-time information both underground and above ground, and various aspects of information must be analyzed to ensure safe and successful mining. Communication is critical during mining because it is the data transmission platform for transmitting various aspects of information to demanders and signaling and forecasting possible dangers. An effective and reliable communication system can avoid or mitigate the occurrence of various dangerous situations during underground coal mining. Since the end of the 20th century, when coal mine accidents were reported frequently [1,2,3,4], national governments and enterprises have increased the construction of underground automation and informatization for coal mines. As a result, coal mine safety levels have been improved, and accident rates have decreased by more than 70% [5,6,7]. Underground coal mining operations can be tied up with communication, as ocurrs in other industrial enterprises. Adequate communication within a mine and between surface and underground working areas is a vital part of the proper operation of any underground facility [8,9,10]. This communication capability is an important factor in the concept of safety, production, and productivity and also facilitates day-to-day operations and the extraction and movement of products to the surface. With the development of technologies, underground mining communication has developed from wire communication to wireless communication, and wireless sensor networks (WSNs) have been widely used as applied networks in many industries [11,12].
Unlike other aboveground application scenarios, the coal mine face is a unique area with complex and variable environmental characteristics. The face is crowded with mining equipment and relevant electrical equipment; it has a high temperature, moist air and large amounts of dust; and is a place with a high risk of coal disasters and unsuitable for working staff. The development of coal mine face monitoring with WSNs (CMFM-WSN) offers technical support for the detection and control of a coal mine face. The wireless communication systems used on the surface cannot be directly applied in underground mines due to the high attenuation of radio waves in underground strata, in addition to the presence of inflammable gases and a hazardous environment. Various factors, such as the non-symmetric mine topology, uneven mine structure, complex geological structures, and extensive labyrinths, further hinder communication and may have certain influences on wireless signal fading [13].
As a network with low power consumption and limited energy, WSNs feature self-organization and a certain amount of invulnerability, thus, a stable and reliable CMFM-WSN protocol applicable to changing environments is the research emphasis of WSN applications for underground coal mine faces. Considering that the fluctuations in underground WSN signal fading have a significant influence on network data transmission, a clustering network transmission protocol applicable to signal fading is studied to improve the performance of network data transmission and ensure that the demands for safe underground production are met. Clustering protocol are the most widely applied at present, thanks to their strong adaptability and self-organization management. References [14,15] summarize the cluster routing protocol of WSNs. The most typical clustering algorithm, LEACH [16], is a clustering control algorithm that was proposed early on and has been applied in WSN topology, including relevant improved LEACH protocols, such as ALEACH [17], LEACH-VH [18], W-LEACH [19] and ANCH [20]. In a clustering algorithm, researchers mainly emphasize clustering rules and routing protocols under a clustering topology. The clustering algorithm mainly considers a cluster head (CH) selection strategy and clustering rules, whereas in the CH selection and clustering process, researchers typically regard certain parameters as the basis for selecting a CH, such as the node residual energy, distance from the node to the aggregation node and neighbor node degree, to form clusters with different dimensions and degrees of uniformity, e.g., uniform clustering (PEGASIS [12]) and non-uniform clustering (EC [21]). Inter-cluster routing is classified as either single- or multi-hop communication (e.g., LEACH-IACA [22]). Multi-hop communication is typically chosen in large-scale deployment areas because it saves energy and enables maximum throughput, whereas single-hop communication is preferred in small areas, where communication with a sensor node is feasible. The spatial distance of the coal mine face determines whether single-hop communication is feasible; single-hop communication is also favorable for reducing data transmission delay. Relevant research has shown that a spatial change in the coal mine face, electrical equipment and movement of equipment and operators influence CMFM-WSN considerably, typically in terms of severe electromagnetic wave transmission fluctuations, strong noise interference, shadow fading and link interruption. These issues also cause changes in the data parameters of the physical layer (e.g., RSSI, SNR) and influence the network layer and data link layer. Faced with this problem, the design of an adaptive clustering algorithm under channel fading is important. Reference [23] uses a layerless network design and regards channel shadow fading as the background for analyzing the influence of a random distance between nodes on the link connection success rate, selects a critical node as a CH based on the node degree, reduces the number of isolated clusters generated by a boundary node and creates a clustering network topology. However, the cluster maintenance overhead and the computational cost of each node are high, thus increasing the amount of energy consumed; moreover, the relationships between the cluster and CH and between a CH and the base station (BS) are not considered. EBACR [24] reports that the RSSI value and node residual energy can be used as the basis of CH and relay node selection by using a multi-attribute decision-making model with an indoor channel model. The advantage of this approach is that the target node and neighbor node are compared; however, the message complexity is increased. The communication between a CH and the BS is the most important factor in a clustering network, and communication loss with nodes in the cluster is far smaller than that between clusters and between the CH and BS. Therefore, the increase in certain message overhead may not necessarily lower the network’s overall energy consumption. Moreover, Antonopoulos et al. [25] studied the performance of a cooperative NC-aided Automatic Repeat reQuest (ARQ) MAC protocol under correlated shadowing conditions. In [26], authors studied a cross-layer analytical model to study network coding-based ARQ MAC protocols in correlated slow-fading environments, where two end nodes are assisted by a cluster of relays to exchange data packets.
To adapt to the influence of environmental changes on the network, MAC layer and PHY layer, this paper proposes power-efficient and fading-aware clustering with a cross-layer (PEAFC-CL) based on the traditional clustering algorithm and performs anti-fading power control over it through power compensation to make it applicable to channel fading characteristics at a coal mine face, hence reducing the energy consumption and improving the network data transmission ability.
The remainder of this paper is organized as follows: the network model and channel fading characteristics are described in Section 2. Section 3 presents the details of the proposed PEAFC-CL clustering algorithm, followed by the energy consumption and power control in Section 4. Section 5 analyzes some properties of the PEAFC-CL algorithm. Simulation results and analysis of the results are reported in Section 6, and the conclusions are drawn in Section 7.

2. Network Model and Channel Fading Characteristics

2.1. Network Model

In this paper, a coal mine face is taken as the network application scenario to carry out WSN monitoring in the context of unmanned mining in an intelligent mine. A coal mine face mainly comprises three pieces of working equipment: a mining machine, a scraper conveyer and a hydraulic support, herein called “three machines”. As the mining machine moves, the scraper conveyer and hydraulic support should follow the progress of the mining machine [27]. As shown in Figure 1a, sensor nodes are deployed on the roadway wall, the hydraulic support (blue pattern in Figure 1a), the scraper conveyer (green pattern in Figure 1a) and the mining machine (yellow pattern in Figure 1a). The red rectangular area in Figure 1a shows the space region of the coal mine face; to better understand the real scenario of a coal mine face, an on-site photograph of one is also provided in Figure 1b; the space dimensions and network topology are given in Figure 1c.
Suppose that the nodes are distributed in the coal mine face area and that the system features the following properties: (1) the nodes in the network are fixed after the initial deployment and can move together with the equipment if fixed on mobile equipment; (2) the BS is in the center of the region, is connected to an underground Ethernet, and has strong computation and memory ability with no energy limitations; (3) the power of all sensor nodes is adjustable, and direct communication with the BS is ensured; (4) all sensor nodes have the same structure, limited energy and the same initial energy; (5) the network possesses self-organization, and no artificial maintenance is required for the network after deployment; and (6) the position information of the network nodes is known.

2.2. Influence of Environmental Factors on Channel Fading

In contrast to above-ground wireless signal transmission, the wireless signal in an underground coal mine is influenced by three factors: (1) the transmission medium, viz., and air quality (e.g., temperature, humidity, dust, and smog); (2) spatial structure (e.g., laneway size, laneway wall roughness and inclination); and (3) moving obstacles [28] (e.g., noise of surrounding electrical equipment, moving people and equipment). References [29,30,31] analyze and conclude that the signal fading model of a coal mine face comprises both path loss and additional loss. Equation (1) presents the wireless channel transmission model of a coal mine face:
L o v e r a l l l o s s = L E h + L r c + L t c + L h + L s = 5.13 c 2 f 2 d [ ε r a ε r 1 + 1 b 3 ε r 1 ] + 4.343 π 2 h 2 [ 1 a 4 + 1 b 4 ] c f d + 4.343 π 2 θ 2 d f / c + 5 × 10 3 d 2 + 9 × 10 3 d + 10 lg ( P m n 1 2 / d s m 2 ) + Y c
In Equation (1), L E h refers to the horizontal polarization loss in the electromagnetic wave roadway space, L r c refers to the fading loss caused by the roadway wall roughness, L t c refers to the fading loss caused by the roadway wall inclination, L h is the fading loss of the three machines’ metal conductor structure on the electromagnetic wave interference, and L s is the influence of the mechanical noise of the three machines on the wireless signal’s SNR.
L o v e r a l l l o s s ( ε r , d , θ 2 , h 2 , a 4 , b 4 , n 1 2 ) . In a practical site environment, when the transmission distance is fixed, the fading loss of a CMFM-WSN system channel is directly influenced by θ , h , a , b and n 1 through the mining process; however, the variation of a and n 1 is strongest ( n 1 is the motor speed of the mining machine and a is the mine face width; a increases continuously with the mining) and is also affected by shadow fading of moving obstacles. Numerous change factors result in strong channel time-varying characteristics of the CMFM-WSN system. Therefore, nodes have different channel characteristics for a fixed distance at the same position at a different time, which yields different requirements for power regulation and the control of network data transmission. Meanwhile, network topology variations should also adapt to such changes to guarantee network robustness.
The channel model of WSN for the coal mine face can be summarized as the superposition of a path loss model and a shadow fading model [32]. Signal transmission loss under a log-normal shadowing channel model can be expressed as follows:
P L ( d ) = P L 0 + 10 α log 10 ( d d 0 ) X σ
X σ is a Gaussian random variable, and X σ ~ N ( 0 , σ 2 ) . Generally, α is a path loss index ranging from 2 to 6, and σ is between 1 and 8 dB. Generally, the receiving power for a logarithmic normal distribution model is:
P r ( d ) = P T P L 0 10 α log 10 ( d d 0 ) + X σ
Receiving power P r determines the SNR, which certainly has influence on BER; actually, SNR and BER are closely related to link quality. For such a case, connected link probability (LP) can be defined as P r ( P r P t h ) , and it can be seen from the model in [33] that is:
P t h = P T P L 0 10 α log 10 ( d t h d 0 )
where P t h refers to threshold receiving power (receiver sensitivity), and d t h is the distance where the threshold receiving power becomes detectable. Then:
P r ( P r P t h ) = P r ( 10 α log 10 ( d d t h ) + X σ 0 ) = 1 2 π σ 10 α log 10 ( d d t h ) e x 2 2 σ 2 d x = Q ( 10 α σ log 10 ( d d t h ) ) = 1 2 e r f c ( 1 2 10 α σ log 10 ( d d t h ) ) = 1 2 ( 1 e r f ( 10 2 ξ log 10 ( d d t h ) ) )
where ξ = σ / α , and a large ξ value indicates high channel variance intensity. It can be seen from Figure 2 that the greater the channel fading intensity is, the lower the success probability of a network nodes connection will be.

3. Cluster Routing Protocol

We make the following improvements to cluster routing to address the deficiencies of traditional clustering algorithms and the signal time-varying fading characteristics of the application environment:
(1)
To maintain the optimal number of CHs, we consider that the number of nodes actually participating in data transmission in a network changes continuously because some nodes run out of energy; the original fixed number of CHs K also changes accordingly (mainly depending on the number of active nodes and the rate of generating CHs); K = ( k 1 , k 2 , k 3 , , k r ) and k r = c % N a c t i v e .
(2)
To keep the number of CHs in each round under the optimum, the use of a random number of each node compared with the threshold used for CH selection is improved and corrected from the original fixed variation range of [0,1] to a self-adapting variable sliding window Wr.
(3)
The original threshold T(n) is improved in two ways: the total number N of deployment nodes in the original threshold is replaced by the number of active nodes Nactive to better guarantee that the number of CHs formed in each round follows optimization, and a node residual energy ratio factor and channel efficiency ratio factor are introduced.
(4)
When member nodes select their own CH to join, the final communication loss of data transmission to the BS should be considered instead of simply the distance and energy factors because in a channel fading environment, the energy consumed by nodes at the same distance while successfully transmitting equivalent data may be different; this is mainly affected by channel fading.
The clustering protocol is mainly divided into a clustering creation stage and a stable transmission stage on the time axis, as shown in Figure 3.
T C F is the cluster construction period, which consists of initialization, CH selection and cluster set formation, whereas T I C refers to the inter-cluster communication period. The CH of each cluster creates TDMA scheduling based on the number of nodes that participate. Member nodes in a cluster transmit data to the corresponding CH based on the TDMA time slot created by the CH, and during T T S , the CH transmits the collected data to the BS or an aggregation node. By referring to the round-robin communication adopted in LEACH, the round’s communication time is T r = T C F + T I C + T T S , where T C F is regarded as the creation stage and T I C + T T S is regarded as the stable data transmission stage.

3.1. Initialization Stage

Definition 1. 
Residual energy ratio: E i _ c u r r / E r _ max , where E i _ c u r r refers to the current remaining energy of node i , and E r _ max is the maximum energy among the nodes joining in the cluster head competition.
Definition 2. 
Channel efficiency ratio: M i _ c u r r / M r _ max , M i _ c u r r refers to the current channel efficiency of node i , and M r _ max is the maximum channel efficiency among the nodes joining in the cluster head competition.
M i _ c u r r = ( 1 L i _ l o s s P L ( i ) ) C max C i _ r C max
P L ( i ) is the theoretical reference value in Equation (3), L i _ l o s s is the actual loss, and L i _ l o s s = P T R S S I . In Equation (6), 1 ( L i _ l o s s / P L ( i ) ) reflects the channel fading condition among nodes from the physical layer, while ( C max C i _ r / C max ) reflects the link information on the MAC.
C i _ r is a variant of a maintainer in the MAC management information library, which is used to record the retransmission times of current node Probe request explorer frames [34]. As for the node that is going to be involved in the next round of cluster head selection after awakening each time, the variable C i _ r in its MIB information library is reset to 0 and increases by 1 when the Probe request explorer frame retransmits once [35]. When the maximum value of the counter is reached, it gives up the transmission and discards the frame, with the counter reset to 0. Experiments prove that it is most ideal when the maximum value of C i _ r is set to 6 [36,37].
To save energy, all nodes will enter into a short sleeping state after this round of data transmission and return to the active state at the beginning of the next round. Each round of transmission is uniformly triggered by a Sink node, and initialization includes three steps:
Step 1. In the network initialization stage, a notice message is sent to the network via a Beacon frame at regular intervals, under the control of the BS, to awaken the nodes in the sleeping state and stop those still in the transmission state so that the data not transmitted will be continued in the next round;
Step 2. Regarding the nodes that awaken in the network with data that will not transmitted again (node participating in the next round of transmission), the communication loss L i _ l o s s will be calculated based on the transmitting power P T in the Beacon frame received and the RSSI value measured; all nodes participating in the next round of transmission send a Probe request explorer frame to the BS and carry the node energy information E i _ c u r r , the variable C r e q u e s t maintained by MAC and the L i _ l o s s calculated and then transmit the three variables to the BS;
Step 3. After receiving a Probe request explorer frame, the BS calculates N a c t i v e , M r _ max , M r _ max (the mean of the channel efficiency of all nodes in the current round), E r _ max and E r _ a v e r (the mean of the energy of all nodes in the current round) and then responds to the corresponding nodes in the form of a Probe request response frame using cross-layer scheduling.
During initialization, a cross-layer data report is adopted to enable the interaction of the energy information and RSSI value of the physical layer and the frame retransmission number of the MAC layer via the frame and is then reported to the network layer, as shown in Figure 4.

3.2. CH Selection

In the last time slot of T i n i t i a l i z e , the BS broadcasts the start message: S T A R T _ M S G . After receiving such a message, each node in the network randomly generates a random number W i _ r . W i _ r [ 0 , W r ] , where W r is a dynamic value that it will change dynamically during the operation of the network:
W r = β E r _ a v e r E r _ max + ( 1 β ) M r _ a v e r M r _ max
M r _ a v e r = 1 N a c t i v e i = 1 N a c t i v e M i _ c u r r
E r _ a v e r = 1 N a c t i v e i = 1 N a c t i v e E i _ c u r r
where 0 β 1 , 0 W r 1 . A variable data set G i ( t ) is introduced to determine whether the node participates in the CH competition of this round. When node i is selected as the CH, G i ( t ) = 0 , otherwise G i ( t ) = 1 . Similar to the LEACH protocol, a randomly generated number W i _ r is compared with a threshold; if W i _ r is smaller than the threshold T i ( t ) , the node will be selected as the CH and the message C L U S T E R _ H E A D _ M S G will be broadcast to the surrounding nodes. The expression for T i ( t ) is:
T i ( t ) = { 0 , G i ( t ) = 0 , T n ( t ) [ β E i _ c u r r E r _ max + ( 1 β ) M i _ c u r r M r _ max ] G i ( t ) = 1 , r < R 1 , G i ( t ) = 1 , r = R
where:
T n ( t ) = k r N a c t i v e k r ( r mod N a c t i v e / k r )
Here, t refers to the current round of the network (viz., t = r ) and R is a complete cycle R = N a c t i v e / k r , i.e., a minimum time unit guaranteeing that each node is eventually selected as the CH. In each cycle, r is a counter that is reset to 0 when r = R . N a c t i v e is the number of nodes participating in the CH competition at present (also called the number of active nodes), and β is the weight of the regulating energy factor and data frame transmission quality. In contrast to the previous judgment threshold, we have introduced two factors that mainly guarantee the optimal overall energy consumption of the network based on optimal energy consumption and link quality.

3.3. Cluster Formation

Those nodes not selected as the CH are member nodes that calculate the fading loss for the distance between themselves and the CHs based on the notice sent out by the CH; then, they compare the total loss L i a l l of completely transmitting data to the BS; L i a l l = L i C H n + L C H n B S , where L i C H n is the power loss between a member node and the candidate CH n and L C H n B S refers to the loss between candidate CH n and the BS. Through comparison, the CH with the minimum L i a l l value is selected as the final CH and joins in the cluster set G C H . If L i B S < L i a l l , the node communicates with the BS directly, indicating that the network topology of the cluster structure in the network is formed.
As indicated in Section 2, some nodes deployed on mechanical equipment move along with the moving equipment. Meanwhile, environmental changes have an impact on channel fading. These factors influence the loss arising from communication fading. After the new round of CHs is generated, nodes, excluding the CH node, calculate the loss of communication between nodes for messages, indicating the role of the CH. As in the PEAFC-CL protocol, the CH with the lowest communication loss is selected as the CH for the new round of communication. As a result, some nodes may leave their previous cluster and join other clusters. The pseudo-code for Algorithm 1 PEAFC-CL is as follows:
According to the timer, initially, BS send a Beacon frame to the network during the T i n i t i a l i z e stage, the variable C i _ r is reset to 0 by all nodes. All nodes participating in the followed round of transmission calculate the value L i _ l o s s based on the B e a c o n frame, and send a frame Pr o b e _ r e q u e s t to the BS (the Pr o b e _ r e q u e s t carry three variables: E i _ c u r r , C i r e q u e s t and L i _ l o s s ). After receiving the frame Pr o b e _ r e q u e s t , the BS calculates N a c t i v e , M r _ max , M r _ max , Ε r _ max and Ε r _ a v e r and then responds to the corresponding nodes in the form of a Probe request response frame using cross-layer scheduling. During the CH selection stage, BS broadcasts the start message S T A R T _ M S G (the S T A R T _ M S G contains six information: N a c t i v e , M i _ c u r r , M r _ a v e r , M r _ max , E r _ max and E r _ a v e r ); each node in the network randomly generates a random number W i _ r , W i _ r [ 0 , W r ] . When W i _ r < T i ( t ) , the node will be selected as the CH and join CH set G C H , otherwise the node will be member node and join non CH set G ¯ C M . When the time is in T Building cluster , the cluster set will be constructed. The message C L U S T E R _ H E A D _ M S G will be broadcast to the surrounding nodes by CHs, then the nodes from non CH set G ¯ C M calculate the fading loss L i C H n . Through comparison, the CH with the minimum L i a l l value is selected as the final CH for node i . If L i B S < L i a l l , the node does not select CH as router and communicates with the BS directly, the cluster in the network is formed.
Algorithm 1 PEAFC-CL
Upon Timer
BS: broadcast “ B e a c o n ” frame in network
foreach sensor node N i do
  Reset C i _ r e q u e s t to 0
  Upon receiving a beacon frame from BS
  Compute L i _ l o s s
  send “ Pr o b e _ r e q u e s t ” frame (contain: E i _ c u r r , C i r e q u e s t , L i _ l o s s )
end
Upon receiving a Probe request frame from N i
BS compute: N a c t i v e , M i _ c u r r , M r _ a v e r , M r _ max , E r _ max , E r _ a v e r
If T initialize < current time < T initialize + T CH-election then
  BS broadcast “ S T A R T _ M S G ” (contain: N a c t i v e , M i _ c u r r , M r _ a v e r , M r _ max , E r _ max , E r _ a v e r )
  foreach sensor node N i do
    W i _ r ← Random (0, W r )
    If W i _ r < T i ( t ) then
     Be cluster head ← T R U E
      N i G C H
    else
     Be cluster head ← F A L S E
      N i G ¯ C M
    end
  end
else if T initialize + T CH-election < current time < T C F then
  foreach CH node do
   Broadcast “ C L U S T E R _ H E A D _ M S G ” message
   Upon receivingh a “ R E Q _ J O I N ( int e n d e d _ I D , C M j ) ” message
   if C H _ I D = int e n d e d _ I D then
    Record information contained in “ R E Q _ J O I N
    Add C M j to CH Member node list
   else
    Discard “ R E Q _ J O I N
   end
  end
  foreach CM node do
   Upon receivingh a “ C L U S T E R _ H E A D _ M S G ” message
   Compute: L i C H n , L i a l l
   If L i C H n + L C H n B S < L i C H m + L C H m B S and L i C H n + L C H n B S < L i B S then
     int e n d e d _ I D C H n _ I D
    Broadcast “ R E Q _ J O I N ( int e n d e d _ I D , C M j ) ” message
   end if
  end
end

3.4. Route Selection

A cluster-based protocol under channel fading is studied in this paper. As implied by the previous study background and network topology, the network topology in the PEAFC-CL protocol is similar to that in the LEACH protocol. In such a topology, a communication mode based on single-hop transmission is applied between clusters. Routing selection is not a complex process for nodes after the cluster set is created. The role of a node is first determined (CH or member node). A CH is able to directly communicate with the BS. A member node is required to determine whether the fading loss of the communication with the BS by taking their own CH as the routing node is less than the fading loss of direct communication with the BS through the node itself. If so, then the CH is selected as its own routing node. Otherwise, data transmissions can be directly achieved with the BS.

3.5. Data Transmission Stage

The time of the data transmission stage is divided into several frames, and each frame is divided into several time slots based on the number of active nodes. The data transmission by each node occurs in the time slot assigned to it in each frame. If the data are not sent in their own time slot, they will enter into the dormant state and continue sending in the next time slot. The time slot length of a member node (i.e., the time for transmitting data) depends on the number of member nodes in the cluster. To reduce the inter-cluster interference of adjacent clusters and reduce its own energy loss, each node adjusts its own transmission power based on the actual need. Spread spectrum (SPSP) and Carrier Sense Multiple Access (CSMA) are adopted to send data from the CH to the BS. Because mining equipment moves periodically and people walk randomly, a deployed network node can become a hidden terminal; the MAC adopts a four-way handshake scheme (viz., RTS/CTS/DATA/ACK) to address the problem of hidden terminals. When there are data to be sent, the CH should detect whether other clusters are using the spreading code of the BS for data transmission in the channel. If the channel is busy, the CH must wait until the current data transmission is completed. Otherwise, the CH can use the spreading code of the BS for data transmission.

4. Energy Consumption Model and Power Control

4.1. Energy Consumption Model

The energy effect of the PEAFC-CL algorithm is closely related to the channel fading model; the energy consumption in the channel is given in Figure 5.
The energy consumed for data transmission depends on the data volume sent and the sending power; thus the energy consumed in sending z -bit data is:
E T = z ( P A P P T R b / R c + P T η a m p R b / R c )
where P A P P T refers to the power consumption of the transmission circuit, P T / η a m p is the power consumption of the transmission amplifier, η a m p refers to the efficiency of the transmission amplifier (typically η a m p 1 ), and R b / R c is the bit code rate. The energy consumed during data reception is:
E R = z P A P P R R b / R c
where P A P P R is the power consumed in data reception. The energy consumed by the sensing channel is E S e n s = P A P P S T S e n s , where P A P P S is the power used in the sensing channel and T S e n s is the length of the sensing channel’s window.

4.2. Power Control

Different powers should be selected based on the channel variance and the SNR requirement of the node. The clustering protocol itself divides the nodes into two different kinds: member nodes and CH nodes. Relative to a member node, a CH node plays an important role in data communication. The power of a CH node should be a compromise between spatial multiplexing and correct receiving probability because an excessive amount of power guarantees spatial coverage but wastes a considerable amount of energy and interferes with other cluster sets, whereas an insufficient amount of power makes the receiver unable to meet the requirement of a correct receiving rate, which leads to message retransmission and wasting of bandwidth resources and energy. This section describes the node transmission power mechanism of each stage under the PEAFC-CL protocol and the requirement for transmission power under wireless channel fluctuations. The receiving power of the receiving node and the number of decibels of transmission loss can typically be measured: P L ( d B ) = P T ( d B ) P R ( d B ) , where P T and P R refer to transmitting power and receiving power, respectively; P R can also be acquired from the RSSI value of the physical layer of the node components. When various communication equipment and application scenes are adopted in practice, the transmission loss obtained is also different. Through modeling analysis, P R is mainly determined logically by considering the distance between links, the antenna gain and the additional loss in a scene. In this paper, it is supposed that the channel characteristics conform to Gaussian distribution characteristics and that all communication losses are as shown in Equation (2). Then, the logarithmic value of P L is P L ( d B ) = 10 log 10 P L + X σ . Two concepts will be defined here to better regulate the transmission power of a node in different periods:
Definition 3. 
Transmission range: this satisfies the effective data transmission under the pre-set quality of service (QoS) in the transmission range; its minimum transmission power is P R min (i.e., the aforementioned receiving power threshold P t h ).
Definition 4. 
Carrier sensing range: a node within the carrier sensing range can sense the communications of a node but may not satisfy the data transmission needs under the pre-set QoS; its minimum transmission power is P S min , and typically P R min / P S min > 1 .
When the receiving power of a node is P R < P S min , the node can neither sense data packet transmission nor transmit data; when P S min < P R < P R min , the node can sense data transmission but cannot calculate the path loss; thus, the information that the node sent cannot be read; when P R > P R min , the node can try to read the data transmitted by the sending end and calculate the path loss between links.
Now, we set p e p = 10 2 , i.e., the data packet transmission error rate is not higher than 0.01; then:
p e p = i = t + 1 z ( z i ) p e b i ( 1 p e b ) z i
where z is the length of the data packet and p e b refers to the bit error rate. Supposing that the BPSK debugging mode is adopted for the signal,
P e , B P S K = Q ( 2 E b N 0 R c )
where R c is the coding rate, N 0 is the one-sided power spectral density of the additive white Gaussian noise (AWGN), and E b is the received energy per information bit. γ S N R is the signal-to-noise ratio (SNR) at the receiver input, γ S N R = P R / P N = ( E b R b ) / ( N 0 W ) , and W refers to the noise bandwidth, viz., the number of bits transmitted per unit time. Thus, based on satisfying a certain packet error rate, its receiving signal sensitivity, i.e., minimum transmission power, can be calculated as P R min = γ S N R N 0 R b , where R b is the bit rate and γ S N R is the SNR needed to detect a packet, which is typically set as 3 dB.
We now consider the transmission power adapted in the different phases of the PEAFC-CL algorithm. When the BS launches a new round at network initialization, it uses the maximum transmission power to ensure that all nodes in the network can receive the message:
P T max ( d max ) = P R min P L ( d max ) F L
d max refers to the distance between the BS and the node in the scenario farthest from it. F L is the signal fade margin, which is introduced to keep the probability of packet failure due to the random fluctuations of the channel under control:
F L = 2 δ / e r f c ( 2 p o u t ) = 2 2 δ π 2 p o u t e t 2 d t
where p o u t is the maximum outage probability, which depends on the SNR of the current link and its channel fading distribution characteristics [38], and p o u t = p o u t s t a r t in the network initialization stage. In the clustering stage, the transmitting power of the CH broadcasting the message of becoming a CH to surrounding nodes is P B r = P R min P L ( d R C H ) F L , where p o u t = p o u t B r . In the T C F period, the power of the receiving data and the CH broadcasting message is:
P R C F ( d B ) = P R min ( d B ) + 10 log 10 F L ( d B ) X σ
In each round of communication, we adopt the same communication frequency band, and based on the node deployment region and density, the distance between a CH and the BS is considerably smaller compared to the distance between the CH and the member nodes; therefore, the communication between a CH and its member nodes mainly refers to visual range communication with little communication loss. Here, the transmitting power of member nodes in a cluster sending data to the CH in the T I C period is set as P T I C = P R min P L ( d i C H ) .
During the T T S stage, the transmitting power of all CH nodes directly communicating with the BS (including the nodes not participating in the cluster set but directly communicating with the BS) can be calculated using the formula P T _ T S = P R min P L ( d i B S ) if the truth value of the path loss is successfully calculated; otherwise its transmitting power will be set as in Equation (16), where p o u t = p o u t T S .

5. Performance Analysis

5.1. Message Complexity

The message complexity of the PEAFC-CL protocol is O(N). In the network initialization stage, there is one Beacon broadcast message, N a c t i v e probe request explorer packets and one S T A R T _ M S G start data packet. In the clustering stage, the CH formation rate is c % ; thus, there are c % N a c t i v e CHs broadcasting c % N a c t i v e messages to the surrounding nodes, and ( 1 c % ) N a c t i v e member nodes broadcasting the message of applying to participate in the cluster set. Because the inter-cluster single-hop communication mode is adopted, each CH directly transmits data directly, and the total number of messages sent in the network is:
2 + N a c t i v e + c % N a c t i v e + ( 1 c % ) N a c t i v e + 1 = 3 + 2 N a c t i v e
Therefore, it can be proven that the message complexity of the PEAFC-CL algorithm is O(N).
A comparison of the simulation results and analytical values is presented in Figure 6. The number of messages controlled in the clustering protocol is largely consistent with that of the theoretical analysis, and the existing minor errors are mainly from the differences in CH number.

5.2. Proof of Cluster Heads Expectation

Theorem 1. 
The expected number of CHs per round in PEAFC-CL is k r , k r = c % N a c t i v e .
Proof: 
Based on the CH selection strategy, the expected number of CHs formed in each round is:
E ( N C H ) = i = 0 n p i G i ( t )
where p i is the probability of node i being selected as the CH in the current round. It can be known from the window size of the node-generating random number (i.e., W r ) and its own contrast threshold T i ( t ) , that:
p i = T i ( t ) 0 W r 0 = T n ( t ) [ β E i _ c u r r E r _ max + ( 1 β ) M i _ c u r r M r _ max ] 0 β E r _ a v e r E r _ max + ( 1 β ) M r _ a v e r M r _ max 0 = T n ( t ) β E i _ c u r r M r _ max + ( 1 β ) M i _ c u r r E r _ max β E r _ a v e r M r _ max + ( 1 β ) M r _ a v e r E r _ max
Set:
H i = β E i _ c u r r M r _ max + ( 1 β ) M i _ c u r r E r _ max β E r _ a v e r M r _ max + ( 1 β ) M r _ a v e r E r _ max
we have:
E ( N C H ) = i = 0 n p i G i ( t ) = k r i = 0 n ( H i G i ( t ) ) N a c t i v e k r ( r mod N a c t i v e / k r
(1)
When r mod N a c t i v e / k r = 0 , there are i ( 1 , 2 , n ) and G i ( t ) = 1 . At the current time of the network, the sum of the residual energy of all nodes is equal to N a c t i v e times the average energy, that is:
i = 0 n E i _ c u r r = N a c t i v e E r _ a v e r
and i = 0 n M i _ c u r r = N a c t i v e M r _ a v e r ; thus, when r = 0 for the first round of a cycle, the expected number of CHs in the network is k r :
E ( N C H ) = k r i = 0 n ( H i G i ( t ) ) N a c t i v e k r ( r mod N a c t i v e / k r = k r N a c t i v e N a c t i v e = k r
(2)
When r mod N a c t i v e / k r = 1 , that is, k r nodes are selected as CHs after one round, there is i = 0 n ( H i G i ( t ) ) = N a c t i v e k r :
E ( N C H ) = k r ( N a c t i v e k r ) N a c t i v e k r = k r
(3)
When r mod N a c t i v e / k r = m and m > 1 , that is, m k r nodes are selected as the CH after m rounds, there is:
i = 0 n ( H i G i ( t ) ) = N a c t i v e m k r
therefore:
E ( N C H ) = k r ( N a c t i v e m k r ) N a c t i v e m k r = k r
Therefore, in this paper, the expected number of CHs formed in each round is k r .
A statistical overview of the number of CHs with different numbers of active nodes is given in Figure 7; the statistical analysis is given in Table 1. Considering the variance, the number of CHs for 60 nodes is relatively close to the theoretical value and also relatively stable.

6. Experimental Simulation and Analysis of the Results

To verify the performance of the PEAFC-CL algorithm, a simulation experiment was carried out on the NS2 platform, and the performance was compared with that of algorithms of the same type, with the indoor Shadowing model chosen as the channel model. The simulation parameter settings are shown in Table 2.

6.1. Selection of Parameter β

As the weight coefficient of the two reference factors introduced in PEAFC-CL during the CH selection strategy, the parameter β determines the proportion of the residual energy ratio factor and the channel efficiency factor in the threshold. Twenty-one groups of data are obtained by taking a value between [0,1] at 0.05 unit intervals and regarding the death time of the first node in the network as the criterion; the bottom curve shown in Figure 8 is drawn based on curve fitting. The network lifetime is maximum when β is between 0.5 and 0.6. Meanwhile, specific to different values of β within [0,1], the average acceptance rate of a packet is regarded as the criterion for discovering that an inflection point appears when β is 0.8 or between 0.5 and 0.6, which indicates that the value at these two points plays an important role in the data acceptance rate of the network. Overall, it is best to set the parameter to 0.55.

6.2. Number of CHs

Specific to the formation of the CHs, 100 nodes are selected in the simulation experiment, and 100 rounds are extracted for statistics before the death of the first node. Figure 9 shows the comparison of the number of CHs formed under the four protocols, and it is discovered in the traditional LEACH algorithm that the number of CHs is rather dispersed with a large fluctuation. The CNF-Degree algorithm introduces the distance of nodes as the reference, which is superior to the LEACH algorithm; however, PEAFC-CL is rather dispersed by comparison. However, the probability of the nodes near the BS becoming the CH and relay node is large in the EBACR protocol, which makes the number of CHs formed unstable. However, in the PEAFC-CL algorithm, the number of CHs formed is controlled by the sliding window and the number of active nodes in each round; therefore, the number of CHs generated by PEAFC-CL is relatively concentrated, with more than 50% above the expected number of five.

6.3. Comparison of Network Lifetime

Figure 10a shows the comparison of network lifetime. PEAFC-CL ensures the optimal effect regardless of whether network lifetime is measured in terms of the death time of the first node or after the first node dies. In terms of the time slope of node death in the network, the PEAFC-CL protocol ensures a better effect than the other three protocols. By regarding the distance between nodes as the condition, the CNF-Degree protocol optimizes the coverage of the network based on node degree and then optimizes the energy consumption of the network to ensure that its network energy efficiency is superior to that of the LEACH protocol. However, EBACR regards the fading loss of nodes and residual energy of nodes as the conditions for selecting the CHs and relay node; thus, it improves network lifetime. The PEAFC-CL protocol follows the change in active nodes in the network from the optimal CH number; however, it adopts the optimal channel and energy as the reference factors in CH selection to make a node with high energy and a good channel become the CH. The energy factor plays the role of balancing energy consumption in the network and avoiding “energy hot”, whereas the channel efficiency factor enables the CH node that plays an important role in transmitting data stably, thus avoiding retransmission and an increase in transmitting power because of unstable signals and reducing the energy consumption caused by abnormal data transmission.
In Figure 10b, the efficiency of the four protocols is assessed by investigating the death time of the first node in the network under different channel variance intensities. PEAFC-CL ensures the best effect, followed by EBACR and then LEACH. This ranking occurs because PEAFC-CL integrates the fading loss between the CH and BS and the link conditions reflected by MAC, which ensures a superior channel efficiency factor. Only the loss of nodes is regarded as the parameter in the EBACR protocol; the distance between nodes in the CNF-Degree is not always entirely consistent with the communication loss of fading channel characteristics.

6.4. Influence of Channel Fading on The Network

Figure 11a presents the first network node death of the four protocols for different path loss exponents. Based on the linear change of the four curves, the PEAFC-CL protocol is superior to the other three protocols; its superiority is better embodied with the increase in the path loss exponent, which only embodies the advantage of regarding transmission loss as the reference for CH selection and member nodes selecting cluster sets in the PEAFC-CL protocol. Along with the increase in the path loss exponent, the variation trend of the first network node death under the PEAFC-CL protocol tends to be gradual, whereas the variation in slope of the other three protocols increases gradually. Figure 11b shows the packet loss rate (PLR) of the four protocols for different numbers of distributed nodes. The overall trend illustrates that the PLR of the four protocols increases with varying degrees with increases in the number of nodes because the increase in node quantity will cause increases in the data volume and PLR according to probability statistics. The PLR is influenced by network layers and bears important relations with network topology. In the LEACH protocol, a CH is formed by a comparison between a random number and threshold, and the randomness causes an unstable network topology; thus, the PLR is highest for LEACH. With network coverage as the object, the CNF-Degree protocol guarantees the relationship between a CH and member node and neglects the important relationship between a CH and the BS; thus, the PLR is superior to the LEACH protocol but inferior to EBACR and PEAFC-CL. Considering network energy consumption, EBACR starts with channel fading, but it only considers the influence of the physical layer on the network relative to PEAFC-CL.
The introduction of the channel efficiency factor in PEAFC-CL not only stabilizes the influence of the CH formation number on the PLR from the network layer but also considers the condition of the bottom channel, which benefits from the fact that cross-layer design provides relevant information from the physical layer and the MAC layer to the network layer. Therefore, the improved network layer increases the data delivery rate. Figure 12 analyzes the PLR in PEAFC-CL under various channel fading intensities and shows that the PLR increases with increases in the channel fading intensity, which is consistent with the above theoretical analysis.

6.5. Performance Gains from Cross-Layer Optimization

To investigate the benefits gained by the cross-layer information sharing in the PEAFC-CL protocol, we compared the PEAFC(No-CL) protocol with the PEAFC-CL protocol in terms of network lifetime and packet loss ratio based on simulations. Cross-layer technology is not applied to the PEAFC(No-CL) protocol, eliminating the need to acquire channel efficiency parameters. Only the residual energy is cited as the reference factor for the CH selection. In Figure 13a, the first node death is taken as an objective for investigation. The first node death time of the network based on the PEAFC-CL protocol is extended by 15% on average compared with that of the network based on the PEAFC(No-CL) protocol. Figure 13b indicates that the packet loss ratio of the PEAFC-CL protocol is 20%–30% lower than that of the PEAFC(No-CL) protocol. With increasing number of nodes, the PEAFC-CL protocol is more competitive in terms of the network packet loss ratio because the link status on the MAC layer and variations of the signal intensity on the physical layer are fed back to the network layer, thus providing the network layer with specific references during cluster construction and data transmission and promoting the transmission performance.
The PEAFC-CL protocol offers two major contributions: one is the design of a clustering network protocol self-adaptive to and aware of channel fading changes, and the other one is the adjustment of the receiving and sending power of nodes according to fading situations. In realistic environments, particularly situations with channel fading, the PEAFC-CL protocol can adapt to channel fading changes and complete adaptive networking, which increases the robustness of network topology; it can also improve gains regarding data transmission rate and throughput in the environment of a large-flow network. Second, through the control of node power, it is largely able to avoid unnecessary energy consumption caused by excessively large or small node power during fluctuation of channel fading, thus improving the energy utilization efficiency and extending the service life of the network.

7. Conclusions

This paper applies the concept of cross-layer design considering the random fluctuations of the channel in a coal mine face scenario, and the information intensively embodying network channel variance characteristics was explored from the physical layer and MAC layer to design an anti-fading clustering protocol using management frames and control frames. Moreover, the signal fade margin was also adopted to optimize power. The simulation results indicated that PEAFC-CL possesses a stable network topology and is applicable despite the complexity and variation of the underground environment, effectively prolonging the network lifetime and increasing the data transmission rate. During research with the CMFM-WSN system, network performance is influenced by each layer and a cross-layer technique is widely applied; however, the constraint of all layers cannot be ignored.
A coal mine face is the most dangerous and important location for mine production. The CMFM-WSN system provides industrial production with technical support and safety supervision assurances. In the future, efforts will be made to study the networking technology under the environment of channel fading and to further probe node deployment, heterogeneous network integration and QoS in wireless mobile multimedia networks for a coal mine face as a unique application scene. Priority will also be given to studying the transmission reliability of the CMFM-WSN system.

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant No. 51204176), Innovation Fund Project on the Integration of Industry, Education and Research of Jiangsu Province (Grant No. BY2012081), Natural Science Foundation of Jiangsu Province (No. BK20140202), and China 863 Project (No. 2012AA062103). We would also like to thank the editor and the referees for their valuable comments.

Author Contributions

All authors significantly contributed to the manuscript. Jiansheng Qian is responsible for the theoretical analysis of the routing algorithm. Peng Ren designs the simulation procedure and analyzes the simulation results.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Brown, W.C. The history of power transmission by radio waves. IEEE Trans. Microw. Theory. Tech. 1984, 32, 1230–1242. [Google Scholar] [CrossRef]
  2. Chao, R.Y.; Chung, K.S. A low profile antenna array for underground mine communication. In Proceedings of the International Conference on Computational Science, Singapore, Singapore, 14–18 November 1994; pp. 705–709.
  3. Western Australian: Virtual Miners Memorial. Mining Accidents Database. Available online: http://www.wavmm.com/mining-accidents-database/ (accessed on 2 June 2016).
  4. Bandyopadhyay, L.K.; Chaulya, S.K.; Mishra, P.K. Wireless Communication in Underground Mines: RFID-Based Sensor Networking; Springer-Verlag: New York, NY, USA, 2009. [Google Scholar]
  5. Sun, J.P. Characteristics of Coal Mine Accidents and New Technologies of Coal Mine Communication, Personnel Positioning and Monitoring. Ind. Mine Autom. 2015, 41, 1–5. [Google Scholar]
  6. Thring, M.W. Automation in coal mining. Long Range Plan. 1983, 16, 66–75. [Google Scholar] [CrossRef]
  7. Jonathon, R.; David, R.; Chad, H.; David, H. Sensing for advancing mining automation capability: A review of underground automation technology development. Int. J. Min. Sci. Technol. 2014, 24, 305–310. [Google Scholar]
  8. Large, D.B.; Ball, L.; Farstad, A.J. Radio Transmission to and From Underground Coal Mines—Theory and Measurement. IEEE Trans. Commun. 1973, 21, 194–202. [Google Scholar] [CrossRef]
  9. Forrest, R.T. A practical approach to radio propagation measurements-as used in the design of mobile radio communications systems. IEEE Trans. Veh. Technol. 1975, 24, 46–53. [Google Scholar] [CrossRef]
  10. Stoica, L.; Rabbachin, A.; Oppermann, I. Impulse radio based non-coherent uwb transceiver architectures—An example. In Proceedings of IEEE International Conference on Ultra Wideband Systems and Technologies, Waltham, UK, 24–27 September 2006; pp. 483–488.
  11. Serra, J.; Serra, J.; Pubill, D.; Antonopoulos, A.; Verikoukis, C. Smart HVAC Control in IoT: Energy Consumption Minimization with User Comfort Constraints. Sci. World J. 2014, 2014, 1–11. [Google Scholar] [CrossRef] [PubMed]
  12. Lindsey, S.; Raghavendra, C.; Sivalingam, K.M. Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Parallel Distrib. Syst. 2002, 13, 924–935. [Google Scholar] [CrossRef]
  13. Hakem, N.; Delisle, G.; Coulibaly, Y. Radio-wave propagation into an underground mine environment at 2.4 GHz, 5.8 GHz and 60 GHz. In Proceedings of the 8th European Conference on Antennas and Propagation, Hague, The Netherlands, 6–11 April 2014; pp. 3592–3595.
  14. Liu, X. A survey on clustering routing protocols in wireless sensor networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef] [PubMed]
  15. Soroush, N.; Hamidreza, G.; Chee-Onn, C.; Hiroshi, I. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks. Sensors 2012, 12, 7350–7409. [Google Scholar]
  16. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  17. Ali, M.S.; Dey, T.; Biswas, R. ALEACH: Advanced LEACH routing protocol for wireless microsensor networks. In Proceedings of the International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 20–22 December 2008; pp. 909–914.
  18. Mehmood, A.; Lloret, J.; Noman, M.; Songet, H. Improvement of the wireless sensor network lifetime using LEACH with vice-cluster head. Adhoc Sens. Wirel. Netw. 2015, 28, 1–17. [Google Scholar]
  19. Abdulsalam, H.M.; Kamel, L.K. W-LEACH: Weighted Low Energy Adaptive Clustering Hierarchy Aggregation Algorithm for Data Streams in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Data Mining Workshops, Sydney, Australia, 13 December 2010; pp. 1–8.
  20. Zanjireh, M.M.; Shahrabi, A.; Larijani, H. ANCH: A New Clustering Algorithm for Wireless Sensor Networks. In Proceedings of 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013; pp. 450–455.
  21. Wei, D.; Jin, Y.; Vural, S.; Moessneret, K. An Energy-Efficient Clustering Solution for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2011, 10, 3973–3983. [Google Scholar] [CrossRef] [Green Version]
  22. Long, C.; Liao, S.; Zou, X.; Zhou, X.M.; Zhang, N. An Improved LEACH Multi-Hop Routing Protocol Based on Genetic Algorithms for Heterogeneous Wireless Sensor Networks. J. Inf. Comput. Sci. 2014, 11, 415–424. [Google Scholar] [CrossRef]
  23. Tseng, C.C.; Chen, K.C. Layerless Design of a Power-efficient Clustering Algorithm for Wireless Ad Hoc Networks under Fading. Wirel. Pers. Commun. 2008, 44, 3–26. [Google Scholar] [CrossRef]
  24. Tian, Y.; Tang, Z.A.; Yu, Y. Energy-balanced Adaptive Clustering Routing for Indoor Wireless Sensor Networks. J. Electron. Inf. Technol. 2013, 35, 2992–2998. [Google Scholar] [CrossRef]
  25. Antonopoulos, A.; Renzo, M.; Verikoukis, C. Effect of Realistic Channel Conditions on the Energy Efficiency of Network Coding-Aided Cooperative MAC Protocols. IEEE Wirel. Commun. 2013, 20, 76–84. [Google Scholar] [CrossRef]
  26. Antonopoulos, A.; Lalos, A.; di Renzo, M.; Verikoukis, C. Cross-layer Theoretical Analysis of NC-Aided Cooperative ARQ Protocols in Correlated Shadowed Environments. IEEE Trans. Veh. Technol. 2015, 64, 4074–4087. [Google Scholar] [CrossRef]
  27. Fan, Q.G. Study on Equipments Positioning and Task Coordination for Three Machines Controlling on the Mechanized Mining Face. Ph.D. Thesis, China University of Mining and Technology, Xuzhou, China, 2013. [Google Scholar]
  28. Zhang, H.Q.; Ren, M.R.; Fan, Q.W.; Gao, X.J. Effection on wave propagation for Fresnel zone and obstacles underground tunnel. Chin. J. Radio Sci. 2007, 22, 200–202. [Google Scholar]
  29. Zhou, L.J.; Chen, G.Z.; Luo, C.M. Wireless Channel Modeling in Underground Coal Face Wireless Sensor Network. Chin. J. Sens. Actuators 2010, 23, 722–726. [Google Scholar]
  30. Forooshani, A.E.; Bashir, S.; Michelson, D.G.; Noghanian, S. A Survey of Wireless Communications and Propagation Modeling in Underground Mines. IEEE Commun. Surv. Tutor. 2013, 15, 1524–1545. [Google Scholar] [CrossRef]
  31. Zhang, Y.W.; Zhang, J.L. Influence of mine dust on propagation characteristic of UHF electromagnetic wave in tunnel. J. China Coal Soc. 2009, 34, 1554–1557. [Google Scholar]
  32. Zuniga, M.; Krishnamachari, B. Analyzing the transitional region in low power wireless links. In Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Los Angeles, CA, USA, 4–7 October 2004; pp. 517–526.
  33. Wang, B.; Lim, H.B.; Ma, D.; Fu, C. The hop count shift problem and its impacts on protocol design in wireless ad hoc networks. Telecommun. Syst. 2010, 44, 49–60. [Google Scholar] [CrossRef]
  34. Guan, J.M.; Yang, L.U.; Sheng, F.; Wang, J.W. On-demand routing protocol based on node’s capacity of access to medium for Ad Hoc networks. J. China Inst. Commun. 2007, 28, 32–37. [Google Scholar]
  35. Zhu, H.; Li, M.; Chlamtac, I.; Prabhakaran, B. A survey of quality of service in IEEE 802.11 networks. IEEE Wirel. Commun. 2004, 11, 6–14. [Google Scholar] [CrossRef]
  36. Chatzimisios, P.; Vitsas, V.; Boucouvalas, A.C. Throughput and delay analysis of IEEE 802.11 protocol. In Proceedings of the IEEE 5th International Workshop on Networked Appliance, Liverpool, UK, 31–31 October 2002; pp. 168–174.
  37. Gunes, M.; Hecker, M.; Bouazizi, I. Influence of adaptive RTS/CTS retransmissions on TCP in wireless and Ad-Hoc networks. In Proceedings of International Symposium on Computers and Communications, 30 June–3 July 2003; pp. 855–860.
  38. Yi, Z.; Adve, R.; Teng, J.L. Outage Probability at Arbitrary SNR in Cooperative Diversity Networks. IEEE Commun. Lett. 2005, 9, 700–702. [Google Scholar]
Figure 1. (a) Sensor node distribution model on the coal mine face; (b) Coal mine face; (c) Diagram of the network topology.
Figure 1. (a) Sensor node distribution model on the coal mine face; (b) Coal mine face; (c) Diagram of the network topology.
Sensors 16 00835 g001
Figure 2. Model of link connection success rate.
Figure 2. Model of link connection success rate.
Sensors 16 00835 g002
Figure 3. Time axis diagram for the three stages of the clustering protocol.
Figure 3. Time axis diagram for the three stages of the clustering protocol.
Sensors 16 00835 g003
Figure 4. Schematic of information sharing via cross-layer.
Figure 4. Schematic of information sharing via cross-layer.
Sensors 16 00835 g004
Figure 5. Block diagram of the transmission system.
Figure 5. Block diagram of the transmission system.
Sensors 16 00835 g005
Figure 6. Analysis of message complexity.
Figure 6. Analysis of message complexity.
Sensors 16 00835 g006
Figure 7. Comparison of the statistics of the number of CHs formed.
Figure 7. Comparison of the statistics of the number of CHs formed.
Sensors 16 00835 g007
Figure 8. Impact of β on network performance.
Figure 8. Impact of β on network performance.
Sensors 16 00835 g008
Figure 9. Comparison of the statistics of the number of CHs formed.
Figure 9. Comparison of the statistics of the number of CHs formed.
Sensors 16 00835 g009
Figure 10. (a) Number of nodes still alive vs. the number of rounds; (b) Round when the first node dies vs. ξ
Figure 10. (a) Number of nodes still alive vs. the number of rounds; (b) Round when the first node dies vs. ξ
Sensors 16 00835 g010
Figure 11. (a) Round when the first node dies vs. α ; (b) Packet loss ratio vs. number of nodes for different protocols.
Figure 11. (a) Round when the first node dies vs. α ; (b) Packet loss ratio vs. number of nodes for different protocols.
Sensors 16 00835 g011
Figure 12. Packet loss ratio vs. number of nodes for different values of ξ .
Figure 12. Packet loss ratio vs. number of nodes for different values of ξ .
Sensors 16 00835 g012
Figure 13. (a) Round when the first node dies vs. number of nodes; (b) Packet loss ratio vs. number of nodes.
Figure 13. (a) Round when the first node dies vs. number of nodes; (b) Packet loss ratio vs. number of nodes.
Sensors 16 00835 g013
Table 1. The analysis of cluster heads expectation.
Table 1. The analysis of cluster heads expectation.
Analytical CHs ExpectationSimulated CHs ExpectationVariance
N = 100 55.0110.64
N = 80 44.0100.53
N = 60 32.9920.45
Table 2. Reference value of simulation parameters.
Table 2. Reference value of simulation parameters.
ParameterValueParameterValue
f 2.4 GHz P A P P T 3.36 mW
α 2.0–6.0 P A P P R 11.13 mW
σ 1–8 dB P A P P S 5.56 mW
η a m p 0.8 R b 54 Mbit/s
E 0 5.0 J W 1030 kHz
P R min 5.92 pW P S min 3.4 pW
p o u t B r 0.12 p o u t S t a r t 0.01
p o u t T S 0.05 N 30, 40, 60, 100

Share and Cite

MDPI and ACS Style

Ren, P.; Qian, J. A Power-Efficient Clustering Protocol for Coal Mine Face Monitoring with Wireless Sensor Networks Under Channel Fading Conditions. Sensors 2016, 16, 835. https://doi.org/10.3390/s16060835

AMA Style

Ren P, Qian J. A Power-Efficient Clustering Protocol for Coal Mine Face Monitoring with Wireless Sensor Networks Under Channel Fading Conditions. Sensors. 2016; 16(6):835. https://doi.org/10.3390/s16060835

Chicago/Turabian Style

Ren, Peng, and Jiansheng Qian. 2016. "A Power-Efficient Clustering Protocol for Coal Mine Face Monitoring with Wireless Sensor Networks Under Channel Fading Conditions" Sensors 16, no. 6: 835. https://doi.org/10.3390/s16060835

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop