Next Article in Journal
An Indoor Localization Method for Pedestrians Base on Combined UWB/PDR/Floor Map
Next Article in Special Issue
SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things
Previous Article in Journal
Semantic Segmentation with Transfer Learning for Off-Road Autonomous Driving
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks

1
Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410000, China
2
College of Information Engineering, Yangzhou University, Yangzhou 225000, China
3
School of Information Science and Engineering, Fujian University of Technology, Fuzhou 350000, China
4
School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore 632014, India
5
Liberal Arts & Convergence Studies, Honam University, Gwangju 622623624, Korea
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(11), 2579; https://doi.org/10.3390/s19112579
Submission received: 28 April 2019 / Revised: 31 May 2019 / Accepted: 4 June 2019 / Published: 6 June 2019
(This article belongs to the Special Issue Smart Cloud Computing Technologies and Applications)

Abstract

:
A wireless sensor network (WSN) is an essential component of the Internet of Things (IoTs) for information exchange and communication between ubiquitous smart objects. Clustering techniques are widely applied to improve network performance during the routing phase for WSN. However, existing clustering methods still have some drawbacks such as uneven distribution of cluster heads (CH) and unbalanced energy consumption. Recently, much attention has been paid to intelligent clustering methods based on machine learning to solve the above issues. In this paper, an affinity propagation-based self-adaptive (APSA) clustering method is presented. The advantage of K-medoids, which is a traditional machine learning algorithm, is combined with the affinity propagation (AP) method to achieve more reasonable clustering performance. AP is firstly utilized to determine the number of CHs and to search for the optimal initial cluster centers for K-medoids. Then the modified K-medoids is utilized to form the topology of the network by iteration. The presented method effectively avoids the weakness of the traditional K-medoids in aspects of the homogeneous clustering and convergence rate. Simulation results show that the proposed algorithm outperforms some latest work such as the unequal cluster-based routing scheme for multi-level heterogeneous WSN (UCR-H), the low-energy adaptive clustering hierarchy using affinity propagation (LEACH-AP) algorithm, and the energy degree distance unequal clustering (EDDUCA) algorithm.

1. Introduction

The development of embedded devices as well as the micro-electro mechanical system (MEMS) wireless sensor network (WSN) as an indispensable part of the Internet of Things (IoT), has also developed rapidly in recent years [1,2,3,4,5]. WSN commonly consists of a large number of tiny sensors, which form the network in a self-organizing and multi-hop manner. WSN has its unique features such as easy deployment, self-organization, low cost and fault tolerance, etc. Therefore, it has been widely used in many applications such as environmental detection [6], industrial production monitoring [7] and smart home [8].
One of the key research issues for WSN is energy efficiency [9,10,11,12,13,14], since the tiny sensors are generally powered by limited battery supply, and the battery replacement for these sensors is impossible because of the enormous quantity and harsh environment. Therefore, it is necessary to design energy-efficient routing protocols. In clustering-based protocols, all sensors are divided into different clusters according to some specific rules. Usually, one cluster head (CH) is selected in each cluster and the other nodes will communicate with the CH directly. By introducing clustering methods, the following benefits can be achieved. First, the clustering technique makes the data transmission between sensors easy and the network topology is easy to organize. CH can adopt the Time Division Multiple Access (TDMA) schema to its cluster members for data uploading. In this way, package loss rate will be reduced and much energy can be saved from data retransmission. Second, clustering can help to alleviate the hot spots problem which is caused by centralized data transmission. The rotation of CHs can largely balance the energy consumption of different sensors. Third, clustering can reduce the total energy consumption of the network by reducing the average intra-cluster communication distance.
Although many benefits can be obtained by introducing clustering methods, some drawbacks still exist in the practical applications. Many clustering protocols such as low-energy adaptive clustering hierarchy (LEACH) [15] and power-efficient gathering in sensor information system (PEGASIS) [16] prefer to select the CHs in a random way, which causes the uneven distribution of CHs. Sensors have to adopt long distance communication with CHs in those areas which contain few CHs. One good solution for this problem is to set the competition range of sensors during the selection procedure. Once a sensor claims to be a final CH, other sensors in its competition range will give up the election to avoid the dense distribution. Many schemas are less energy efficient and the total energy consumption of the network is high, because they do not optimize the intra-cluster and inter-cluster communication distance. Therefore, it is a good choice to introduce a heuristic algorithm such as ant colony optimization (ACO) and particle swarm optimization (PSO) to decrease the average communication distance. Additionally, premature death of sensors occurs in some protocols. Those protocols commonly not take the residual energy into consideration when they select the CHs. Premature death of CH will result in blind spots for monitoring and the performance of the network will sharply decrease. Therefore, it is important to take energy balancing strategy in routing protocol designing.
In order to solve the above problems, affinity propagation (AP) and the modified K-medoids [17] are combined for better clustering in this paper. AP is commonly used to calculate the similarity of nodes. It adopts the similarity matrix to represents the similarity between different nodes and the value of the diagonal of the similarity matrix is used as a criterion to judge whether the node can become a cluster center. One important function of AP is that it can figure out the optimal number of clusters according to the distribution of nodes. K-medoids, which is a machine learning based clustering method, is modified by taking the residual energy into consideration. By combining the modified K-medoids with AP, clustering will not be limited to the number of clusters and the initial cluster centers. In this paper, the AP algorithm is firstly introduced to calculate the optimal number of clusters and the initial cluster centers. Then, K-medoids is adopted to form the final clustering results by iteration based on the initial cluster centers. By adopting the elaborate selected initial cluster centers, the proposed method select more reasonable CHs compared to the traditional K-medoids algorithm.
The rest of this paper is organized as follows. In Section 2, some classic routing protocols which adopt clustering techniques are discussed. In Section 3, the system and energy models are given. Section 4 illustrates the proposed algorithm in detail. Section 5 provides extensive simulation results with analysis and comparison. Some discussions are presented in Section 6, and Section 7 concludes this paper.

2. Related Work

Some classic or recent literature about the clustering techniques for WSN is listed in Table 1. Low Energy Adaptive Clustering Hierarchy (LEACH) [15] is a hierarchical routing protocol with two layers, CHs layer and member layer. In each round, every sensor generates a random number and once the number exceeds the threshold value, it will be elected as a CH. One of the serious weakness of LEACH is that the selected CHs are uncontrolled and they distribute unevenly among the sensor field. Additionally, it does not consider the residual energy of sensors which may lead to the premature death of sensors.
LEACH-centralized (LEACH-C) [18] is an improved version of LEACH. In LEACH-C, before CHs selection in each round, the information of sensors such as residual energy and position are reported to the base station (BS). The BS calculates the average residual energy of the network and excludes the weak sensors from the candidate CHs. The main drawback of LEACH-C is that the topology of the network is not optimal and the total energy consume of the network is high in each round.
LEACH using the AP algorithm (LEACH-AP) [19] adopts iterations to select CHs. The proposed scheme generates clusters by iteration to exchange information between sensors. However, the number of clusters still needs to be set manually.
Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [16] is a chain-based clustering algorithm. The whole sensors in the network are connected into several chains and the chain leaders are dynamically selected. Chains are constructed by greedy algorithm and each node in the chain takes turn to be the leader. Each node on the chain only needs to communicate with its nearest neighbor. Due to the chain construct of the network, once a sensor in the chain fails, the whole chain will stop work. Additionally, chains in a larger-scale network will result in severe network latency.
Hybrid energy-efficient distributed Clustering (HEED) [20] is another hierarchical routing protocol. The mainly contribution of HEED is that it firstly presents a novel method for CHs selection by competition. The residual energy of sensors is taken into consideration for CHs selection. Each node calculates its average minimum reachability power (AMRP) to determine which CHs should join.
The threshold-sensitive energy-efficient sensor network protocol (TEEN) [21] is an event-driven and responsive algorithm. During the process of CHs selection, each candidate CH broadcasts two parameters, soft threshold and hard threshold, to other sensors among the cluster. The hard threshold records data eigenvalues, and the soft threshold records the maximal range of data change. One of the shortcomings of TEEN is that it achieves the clustering result by iterating and the algorithm is executed in the local sensors with low computing power. Therefore, it leads to great network latency.
The saving energy clustering algorithm (SECA) [22] is a centralized clustering algorithm. Candidate CHs are firstly selected according to the average residual energy. Then, the modified K-means algorithm which considers the location and residual energy is adopted to determine the final CHs. The algorithm mainly contains two parts, set-up phase and steady-state phase. In the set-up phase, the center location is calculated to set the initial means of points according to the location of the stationary nodes. Then K-means algorithm is utilized to divided the network into several clusters according to the previous initial means. The steady-state phase mainly conducts the data transmission. Member nodes send data to their corresponding CHs using the allocated TDMA schema and the CHs forward the data to the sink.
Energy aware unequal clustering (EAUC) [23] is a fuzzy logic-based clustering algorithm. In EAUC the sensor field is divided into several heterogeneous clusters. Those clusters close to the sink own smaller scale. The fuzzy logic system is utilized for CHs selection in EAUC and it comprehensively considers the features of sensors such as residual energy, position and the number of neighbors. The output of the fuzzy logic system is the possibility for a sensor node to be select as a CH.
The energy-efficient unequal clustering (EEUC) [24] Mechanism is an unequal clustering algorithm. In EEUC, the size of each cluster is calculated by the distance between its corresponding CH and the sink. CHs are elected via competition and the competition range enlarges with distance increasing. Using this method, clusters close to the sink generally own less members and the energy used for intracluster communication is reduced.
Unequal cluster-based routing scheme for multi-level heterogeneous WSN (UCR-H) [25] is a multiple CH-based clustering algorithm. The size of the cluster in UCR-H is contrary to EEUC. Clusters close to the sink own more sensor nodes. Meanwhile, multiple CHs are selected in one cluster to ease the burden of forwarding. The optimal number of clusters is calculated by linear programming.
The energy degree distance unequal clustering algorithm (EDDUCA) [26] partitions the network using Sierpinski Triangle. The triangle of the outer of the sensor field generally contains more sensor nodes.

3. System Model

3.1. Network Model

In this paper, the network is composed of numerous sensors as well as a BS, as shown in Figure 1. Some physical information of the sensor field such as temperature and humidity are detected by sensors and they transmit their monitored data to its corresponding CHs. There are two types of roles for the sensors to play. Member nodes need to monitor the surroundings and send the monitored data to corresponding CHs. CHs not only need to detect the information of the environment, but also need to receive the data packages from their members and conduct data fusion. Finally, the fused data is uploaded to the BS by the CHs. The following assumption are made to conduct the simulation conveniently.
  • All the sensors are deployed in a rectangle area by planes or other vehicles and they keep stationary after they are deployed.
  • Sensor nodes can be identified by their unique ID.
  • Each sensor owns the knowledge of its position by the equipment such as the Global Positioning System (GPS), and they can get the information of other nodes by information exchange.
  • All the sensors own the same initial energy and their batteries cannot be changed. Once they exhaust their energy, they will be useless.

3.2. Energy Model

As the research [15,27,28,29,30] has discussed, the energy used for transmission accounts for the majority of the total energy consumption. Therefore, energy consumption used for transmission is only considered in this paper. The energy used for transmission is generally divided into two parts, sending and receiving units, as shown in Figure 2. In the sending unit, the digital signal is transformed into an analog signal by the transmit electronics and then the analog signal is strengthened by the amplifier. The power of the amplifier is adjustable and it uses different power according to the communication distance. A threshold value d 0 is calculated to adjust the power of amplifier. If the communication distance exceeds the threshold value d 0 , free space model is used, otherwise, a multi-path fading model is used. In the receiving unit, the analog signal is transformed into digital signal again and the energy used in this part only depends on the amount of data.
The total energy E T x used for sending unit can be calculated using the Formula (1).
E T x ( L , d ) = E e l e c · L + ε a m p · L
where d represents the communication distance between the source node and the target node. L denotes the length of data package. E e l e c represents the energy consumed by transmitting one-bit data between two sensors. ε a m p is the energy consumption for the amplifier and it can be calculated by Formula (2).
ε a m p = { ε f s · d 2 , w h e n   d d 0 ε m p · d 4 , w h e n   d > d 0
where ε f s represents the energy consumption for free space model and ε m p represents the energy consumption for multi-path fading model. Additionally, d 0 is the threshold value for amplifier to adjust its power. d 0 can be calculated by Formula (3).
d 0 =   ε f s ε m p
The total energy E R x used for receiving unit can be calculated using the Formula (4).
E R x ( L ) = E e l e c · L

4. The Proposed Affinity Propagation-Based Self-Adaptive (APSA) Algorithm

In this section, a detailed illustration of the affinity propagation-based self-adaptive (APSA) algorithm will be given. Initial phase, set-up phase and communication phase are contained in APSA. During the initial phase, sensors obtains the necessary information from their neighbors for network forming. After all the preparations are finished, set-up phase will start. In set-up phase, the network topology is determined by AP and the modified K-medoids. Then the network enters into the communication phase and data transmission is conducted in this phase.

4.1. Initial Phase

After all the sensors are deployed, the system begins to enter the initial phase. In the initial phase, the network has not been organized and sensors can only get their own location by GPS and record the information of residual energy. Then sensors begin to exchange their own information with their neighbors until the sink obtains the information of all the sensors. When the information exchange is finished, the system enters set-up phase.

4.2. Set-Up Phase

The main goal of the set-up process is to find the CHs and divide all the sensor nodes into appropriate clusters. During this phase, the AP algorithm is firstly introduced to find out the optimal cluster number and the position of initial cluster centers. Then K-medoids algorithm is used to achieve the final clustering result. In the traditional K-medoids algorithm, the initial cluster centers are randomly selected which means that the algorithm needs to iterate more time to converge. Additionally, the traditional K-medoids runs easily into local optimal solutions. With the purpose of solving the mentioned problems, AP is adopted to figure out the initial cluster centers to enhance the performance of K-medoids.
Firstly, the similarity between sensors can be calculated using the following formula:
s ( m , n ) = X m X n 2 m , n { 1 , , N } , m n
where X represents the location of sensors and s ( m , n ) denotes the similarity between node m and node n which is calculated by the square of their Euclidean distance. The similarity indicates whether the node n is suitable to be the CH for node m . For each node n , a real number s ( n , n ) represents the preference that it will be chosen as a cluster head node. s ( n , n ) is calculated by Formula (6).
s ( n , n ) = p
where p represents the negative cost of adding a cluster. By numerous simulations, when p is set as –6000, the AP algorithm can achieve a good result.
r represents the responsibility and a represents the availability. a is firstly set as zero, and then r and a can be updated using Formulas (7) and (8).
r ( m , n ) = s ( m , n ) max n n { s ( m , n ) + a ( m , n ) }
a ( m , n ) = { m m m a x { 0 , r ( m , n ) } i f   n = m m i n { 0 , r ( n , n ) + m { m , n } m a x { 0 , r ( m , n ) } } i f   n m
where r ( m , n ) is defined as the value of the degree of node n if node n is selected as the CH of node m . a ( m , n ) represents the appropriate degree of node m to select n as its CH. Finally, Formula (9) is used to calculate the initial cluster centers.
T = a r g m a x n { a ( m , n ) + r ( m , n ) }
where T represents the set of the initial cluster centers. The pseudocode of AP is described as Algorithm 1.
Algorithm 1: The method for obtaining initial cluster centers
Input: the coordinate set of N sensor nodes { X 1 , X 2 , X 3 , , X N } ;
fori = 1, 2, 3, …, Ndo
  for j = 1, 2, 3, …, N do
   if i == j then
    set preference S i , i = 6000
    else
     calculate similarity S i , j = X i X j 2
    end if
  end for
end for
Repeat
for i = 1, 2, 3, …, N
  for j = 1, 2, 3, …, N
   calculate responsibility R i , j = S i , j max j j { S i , j + A i , j }
   if i == j then
     A i , j = i i m a x { 0 , R i , j }
   else
     A i , j = m i n { 0 , R j , j + i { i , j } m a x { 0 , R i , j } }
   end if
  calculate T = a r g m a x j { A i , j + R i , j }
  End for
End for
UntilT does not change
The initial cluster centers obtained through the AP algorithm are not optimal, and there may be outliers. Due to the disadvantages above, the K-medoids algorithm is adopted to further optimize the clustering results. K-medoids adopts real points as the cluster centers instead of virtual points, and therefore the absolute errors can be effectively reduced. By combining the advantages of AP and K-medoids algorithm, the distance between the member node and its corresponding CH is minimized. Formula (10) describes the problem that the algorithm needs to solve. We want to study how to minimize the criterion of the absolute error σ .
σ = i = 1 k s T i d i s t ( s , T i )
where s is the common node in T i and T i represents the set of nodes of cluster i . In order to minimize the criterion of the absolute error σ , greedy method is adopted to achieve this object.
A set of nodes of a cluster is represented as T = { τ 1 , τ 2 , , τ j , , τ k 1 , τ k } . Then a node τ r a n d o m is randomly selected in the network to replace the node in set T , meanwhile, the residual energy of τ r a n d o m which is randomly selected must be richer than other nodes in set T . Formula (11) describes the replacement method.
T ( t + 1 ) = { T * , σ * σ ( t ) < 0 T ( t ) , o t h e r w i s e
where T * = { τ 1 , τ 2 , , τ r a n d o m , , τ k 1 , τ k } . Then, the network is temporarily reclassified into k clusters. The new absolute error criterion σ * can be calculated by Formula (10). Compared with original σ ( t ) in the t-th time iteration, if σ ( t ) is greater than σ * , T ( t + 1 ) will be replaced by T * .
In the process of iteration, we focus on the remaining energy of each CH. In each iteration, once the average residual energy of all sensor nodes is greater than that of a CH, the CH must give up the election and become a member node. By repeating Formula (11), the final clustering results can be obtained. The pseudocode of the modified K-medoids is described as Algorithm 2.
Algorithm 2: The method for clustering
let T as the set of initial cluster centers;
calculate the number of initial cluster centers k = T
Repeat
 assign each remaining common node to the cluster with the nearest medoid;
 randomly select a common sensor node τ r a n d o m ;
 calculate the cost function S ( S = σ * σ ) of swapping node τ j with τ r a n d o m ;
if S<0 then
  swap τ j with τ r a n d o m to form the new set of k clusters;
 Until no change
Output: a set of k clusters.

4.3. Communication Phase

The clustering algorithm is executed in the remote server and the result of the clustering is sent to each sensor by broadcasting. When sensor nodes receive the clustering message, the real network architecture is established. In each round, the member nodes communicate with their corresponding CHs to upload the monitored data and their own residual energy. Each CH gather the monitored data of their members and then data fusion is conducted to filter the redundant data. Next, the compressed data is transmitted to the BS. At the end of each round, the BS uploads all the data of this round to the remote server. Finally, the remote server will quickly calculate the topology of next round of the network and return it to the BS. The BS determines whether it is necessary to send the reconstructed message by comparing whether the topology information of the previous round and current round are consistent. The next round starts with a message from BS and the network repeats the process from the set-up phase.

5. Performance Evaluation

5.1. Simulation Parameters

Matlab as a powerful project software has been widely used in automatic control, machine design and mathematical statistics. Researchers can solve the complicated engineering problem efficiently using the integrated toolbox in Matlab. Additionally, Matlab can dynamically simulate operation of the system and conveniently visualize the data. Matlab is run with version of R2016a in a personal computer equipped with an Intel Core I5 central processing unit (CPU) to test the performance of the proposed APSA. The simulator randomly generates the sensors in a specific area with the same initial energy. A round is used as the period of the network and in each round, a sensor needs to upload a data package to the base station via single or multi-hop communication. According to [19], considering the discriminability and run time of the simulation results, the initial energy E i n i t of each node is set as 2 J and the data aggregative energy E D A is 5 n J / b i t / s i g n a l . All the relevant parameters used in the simulation are listed in Table 2.
An assumption is made that the sensors can communicate with the other nodes in their transmission range. In each round, each node generates a data package which contains the monitored information of surroundings and the target of the network is to gather all the packages of sensors. In the simulation, 50 sensor nodes are firstly deployed in a 100 × 100   m 2 sensor field in a random way. Then a BS is set at the center of the monitoring area. The AP algorithm is executed to search the optimal initial cluster centers and adopt the modified K-medoids to form clusters. After the clusters are formed, the BS collects data at regular intervals. Generally, the normal node transmits the monitored data directly to CH if the CH is in its one-hop transmission range. Otherwise, it will choose a relay node to forward its data package to CH by greedy algorithm. In a greedy algorithm, node chooses a neighbor which is closer to the sink compared to itself as the relay node. After the data is received by CH, the CH compresses the data and forwards it to the BS.

5.2. Clustering Results of Different Number of Sensors

Figure 3 shows the ultimate clustering result of APSA. As clearly shown in Figure 3, the proposed algorithm divides all the sensors into five clusters. The small dots denote the sensors, and the blue lines represent the virtual link between sensors and CHs.
Another 50 sensors are added to the network to test the presented algorithm and the simulation result is illustrated in Figure 4. APSA changes the number of CHs adaptively and it divides all sensors into six clusters.

5.3. Analysis of Energy Consumption

The presented APSA is compared with LEACH-AP, UCR-H and EDDUCA which are all centralized routing protocols. For each protocol, 50 different samples of the network model are generated to execute the protocol and the result is based on the average value of repeated simulations. In Figure 5, the x-axis represents the number of rounds the network runs and the y-axis represents the total energy consumption of the network. It obviously shows that with rounds going, the total energy consumption of the presented APSA increases more slowly compared to the other three algorithms. In about the 1000th round, APSA achieves about 33.33%, 52.5% and 54.21% performance gain compared to UCR-H, LEACH-AP and EDDUCA respectively.

5.4. Analysis of Network Lifetime

The network lifetime is defined as the time when about half of the sensors in the network have dead. At this time, the network is divided into several isolated portions which leads to a serious decline in the performance of the network. In order to have a fair evaluation on different protocols, the same network model is used to execute the APSA, UCR-H, LEACH-AP and EDDUCA algorithms, respectively. The simulation result is demonstrated in Figure 6. As Figure 6 shows, the lifetime of APSA is 1511 rounds and it achieves about 16.23%, 31.39%, 51.1% performance gain compared to UCR-H, LEACH-AP and EDDUCA, respectively.

5.5. Analysis of Clustering Result

The reasonable CHs are expected to be selected during the selection procedure and one of the significant standards to evaluate the reasonability is the average communication distance between the CH and its members. The same simulation parameters are used and the number of sensors is set as 100. The presented algorithm is compared with LEACH-AP [19] and the simulation result is shown as Figure 7. From Figure 7, it can be seen that the presented APSA can greatly reduce the intracluster communication distance and improves about 30.5% performance compared to LEACH-AP.
Uneven distribution of CHs will result in unbalanced energy consumption between clusters and accelerate the death of the node. The CHs distribute more evenly, the number of members for each cluster will be closer. Therefore, the even distribution of CHs can be evaluated by the difference value between the number of maximal and minimal cluster members. The simulation result is illustrated in Figure 8. From Figure 8, it can be seen that in the presented APSA, the difference value is 2 when the algorithm achieves the worst result; however, it can be 6 in LEACH-AP.

5.6. Study of Affinity Propagation (AP) Preference

The parameter p has a great impact on the performance of APSA in terms of convergence time and number of clusters. Different values of p are tested under the same network model (100 sensors) and the simulation result is shown as Table 3. As shown in Table 3, when p is set as –6000, the algorithm convergences faster and achieves a more reasonable number of clusters.

6. Discussion

The initial cluster centers are obtained by iteration using the AP algorithm. With the scale of the network increasing, the time used for calculation of initial cluster centers will also increase rapidly. Therefore, one drawback of the presented clustering method is that it is not suitable for WSNs on a large scale. Additionally, the presented APSA can be improved by adjusting the value of AP preference. The value of the AP preference is obtained by experience and it has a significant influence on the performance of the AP; –6000 is just a suitable value for AP preference and we cannot ensure it is the optimal value. Therefore, our future work will focus on optimizing the parameter P.
The simulator used in this paper is MATLAB and it can only simulate the real world. However, in real applications, many other problems need to be solved. For example, in the simulation environment, it is assumed that the transmissions between sensors are always successful; while in the real environment, transmission may fail due to the harsh environment or the busy communication channel. Therefore, the presented algorithm still needs to be improved to adapt to the real environment.
Our future work will mainly focus on the improvement of expandability of the method. We will also combine popular mobile sink technology as well as data fusion technology with our clustering method to further improve performance.

7. Conclusions

The design of an energy-efficient routing algorithm has always been an important research issue for WSNs. In this paper, an adaptive clustering method based on an AP algorithm is presented, which can reduce the average data transmission distance of the network and provide load balanced routing effect. It firstly introduces the AP algorithm to calculate the initial cluster centers. Then a modified K-medoids algorithm is adopted to partition the whole network into clusters according to the previous initial cluster centers calculated by AP. Simulation results show that about 33.33%, 52.5% and 54.21% performance gain can be achieved in terms of energy consumption, and about 16.23%, 31.39%, 51.1% performance gain can be achieved in terms of network lifetime compared to the UCR-H, LEACH-AP and EDDUCA algorithms respectively.

Author Contributions

J.W. conceived and designed the experiments; K.W. and Y.G. performed the experiments; A.K.S. analyzed the data; S.-J.L. advised simulation settings; and J.W. wrote this paper.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61772454, 61811530332, 61811540410). Se-Jung Lim is the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Data Availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Potdar, V.; Sharif, A.; Chang, E. Wireless Sensor Networks: A Survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar]
  2. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H. An Intelligent Data Gathering Schema with Data Fusion Supported for Mobile Sink in WSNs. Int. J. Distrib. Sens. Netw. 2019, 15. [Google Scholar] [CrossRef]
  3. Yue, Y.G.; He, P. A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions. Inf. Fusion 2018, 44, 188–204. [Google Scholar] [CrossRef]
  4. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H. Energy Efficient Routing Algorithm with Mobile Sink Support for Wireless Sensor Networks. Sensors 2019, 19, 2363. [Google Scholar] [CrossRef] [PubMed]
  5. Al-Karaki, J.N.; Kamal, A.E. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun. 2004, 11, 6–28. [Google Scholar] [CrossRef]
  6. Wang, J.; Ju, C.; Gao, Y.; Sangaiah, A.K.; Kim, G. A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks. Comput. Mater. Contin. 2018, 56, 433–446. [Google Scholar]
  7. Imon, S.K.A.; Khan, A.; Francesco, M.D. Energy-efficient randomized switching for maximizing lifetime in tree-based wireless sensor networks. IEEE ACM Trans. Netw. 2015, 23, 1401–1415. [Google Scholar] [CrossRef]
  8. Wang, J.; Zhang, Z.; Li, B.; Lee, S.Y.; Sherratt, R.S. An Enhanced Fall Detection System for Elderly Person Monitoring using Consumer Home Networks. IEEE Trans. Consum. Electron. 2014, 60, 23–29. [Google Scholar] [CrossRef]
  9. Wang, J.; Cao, J.; Sherratt, R.S.; Park, J.H. An improved ant colony optimization-based approach with mobile sink for wireless sensor networks. J. Supercomput. 2018, 74, 6633–6645. [Google Scholar] [CrossRef]
  10. Arain, Q.A.; Uqaili, M.A.; Deng, Z. Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-Zones Over Road Networks. Wirel. Pers. Commun. 2016, 95, 411–428. [Google Scholar] [CrossRef]
  11. Wang, J.; Gao, Y.; Yin, X.; Li, F.; Kim, H. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018, 9472075. [Google Scholar] [CrossRef]
  12. Wang, F.; Wu, S.; Wang, K. Energy-Efficient Clustering Using Correlation and Random Update Based on Data Change Rate for Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 5471–5480. [Google Scholar] [CrossRef]
  13. Ya, T.; Lin, Y.; Wang, J.; Kim, J. Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification. Comput. Mater. Contin. 2018, 55, 243–254. [Google Scholar]
  14. Wang, J.; Gao, Y.; Liu, W.; Wu, W.; Lim, S. An Asynchronous Clustering and Mobile Data Gathering Schema based on Timer Mechanism in Wireless Sensor Networks. Comput. Mater. Contin. 2019, 58, 711–725. [Google Scholar] [CrossRef]
  15. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences, Big Island, HI, USA, 7–10 January 2002; p. 8020. [Google Scholar]
  16. Lindsey, S. PEGASIS: Power-efficient gathering in sensor information system. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 9–16 March 2002; Volume 3, pp. 1125–1130. [Google Scholar]
  17. Kaufman, L.; Rousseeuw, P.A. Clustering by Means of Medoids.Statistical Data Analysis Based on the L 1 Norm; Elsevier: Berlin, Germany, 1987; pp. 405–416. [Google Scholar]
  18. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  19. Illsoo, S.; Lee, J.-H.; Lee, S.H. Low-energy adaptive clustering hierarchy using affinity propagation for wireless sensor networks. IEEE Commun. Lett. 2016, 20, 558–561. [Google Scholar]
  20. Younis, O.; Fahmy, S. HEED: A Hybrid, Energy-efficient, Distributed Clustering Approach for Ad hoc Sensor Networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef]
  21. Manjeshwar, A.; Agrawal, D.P. TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks. In Proceedings of the International Parallel and Distributed Processing Symposium, San Francisco, CA, USA, 23–27 April 2000. [Google Scholar]
  22. Chang, J.Y.; Ju, P.H. An efficient cluster-based power saving scheme for wireless sensor networks. Eurasip J. Wirel. Commun. Netw. 2012, 1–10. [Google Scholar] [CrossRef]
  23. Bagci, H.; Yazici, A. An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Proceedings of the 2010 IEEE International Conference on Fuzzy Systems, Barcelona, Spain, 18–23 July 2010. [Google Scholar]
  24. Li, C.; Ye, M.; Chen, G. An energy-efficient unequal clustering mechanism for wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7 November 2005. [Google Scholar]
  25. Yang, L.; Lu, Y.Z.; Zhong, Y.C. An unequal cluster-based routing scheme for multi-level heterogeneous wireless sensor networks. Telecommun. Syst. 2017, 68, 1–16. [Google Scholar] [CrossRef]
  26. Guiloufi, A.B.F.; Nasri, N.; Kachouri, A. An Energy-Efficient Unequal Clustering Algorithm Using ‘Sierpinski Triangle’ for WSNs. Wirel. Pers. Commun. 2016, 88, 449–465. [Google Scholar] [CrossRef]
  27. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H. An Improved Routing Schema with Special Clustering using PSO Algorithm for Heterogeneous Wireless Sensor Network. Sensors 2019, 19, 671. [Google Scholar] [CrossRef] [PubMed]
  28. Neamatollahi, P.; Naghibzadeh, M.; Abrishami, S. Fuzzy-Based Clustering-Task Scheduling for Lifetime Enhancement in Wireless Sensor Networks. IEEE Sens. J. 2017, 17, 6837–6844. [Google Scholar] [CrossRef]
  29. Afsar, M.; Tayarani-N, M.H. Clustering in sensor networks: A literature survey. J. Netw. Comput. Appl. 2014, 46, 198–226. [Google Scholar] [CrossRef]
  30. Wang, J.; Cao, J.; Ji, S.; Park, J.H. Energy Efficient Cluster-based Dynamic Routes Adjustment Approach for Wireless Sensor Networks with Mobile Sinks. J. Supercomput. 2017, 73, 3277–3290. [Google Scholar] [CrossRef]
Figure 1. Network model.
Figure 1. Network model.
Sensors 19 02579 g001
Figure 2. Network model.
Figure 2. Network model.
Sensors 19 02579 g002
Figure 3. Cluster result of affinity propagation-based self-adaptive (APSA) algorithm (50 sensors).
Figure 3. Cluster result of affinity propagation-based self-adaptive (APSA) algorithm (50 sensors).
Sensors 19 02579 g003
Figure 4. Cluster result of APSA (100 sensors).
Figure 4. Cluster result of APSA (100 sensors).
Sensors 19 02579 g004
Figure 5. Energy consumption between different algorithms (50 sensor nodes).
Figure 5. Energy consumption between different algorithms (50 sensor nodes).
Sensors 19 02579 g005
Figure 6. Alive nodes (50 sensor nodes).
Figure 6. Alive nodes (50 sensor nodes).
Sensors 19 02579 g006
Figure 7. Comparison of average intracluster communication distance.
Figure 7. Comparison of average intracluster communication distance.
Sensors 19 02579 g007
Figure 8. Comparison of difference values.
Figure 8. Comparison of difference values.
Sensors 19 02579 g008
Table 1. Comparison of routing protocols based on clustering.
Table 1. Comparison of routing protocols based on clustering.
Algorithm NameYearStructureCH Election FeaturesTopology ControlMethods UsedDemerit
LEACH2002Two-layer structureRandom selectionDistributed Uneven CH distribution
LEACH-C2002Two-layer structureResidual energy, positionCentralized High energy consumption
LEACH-AP2016Two-layer structurepositionCentralizedAP algorithmNumber of clusters assigning
PEGASIS2002Chain-structurePositionDistributedGreedy algorithmHeavy network latency, poor robustness
HEED2004Two-layer structurepositionDistributedIterationLong iteration time
TEEN2001Two-layer structureResidual energy, positionDistributedIterationLong iteration time
SECA2012Two-layer structureResidual energyCentralizedK-means algorithmUnreason CHs selection
EAUC2010Two-layer structureResidual energy, Position, number of neighborsCentralizedFuzzy logic systemHigh energy consumption
EEUC2005Two-layer structureResidual energy, PositionDistributedIterationHigh energy consumption
UCR-H2017Two-layer structureResidual energy, PositionCentralizedMultiple CHs in each clusterHigh energy consumption
EDDUCA2016Two-layer structurePosition CentralizedSierpinski triangle dividingHigh energy consumption
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterDefinitionValue
NNumber of nodes50
coorBsCoordinate of the base station (BS)(40,160)
PSPacket Size for one communication2000 bits
E i n i t Initial energy of each node2J
E e l e c Energy consumption per bit 50 nJ / bit
ε fs Transmitter amplifier (Free space model) 10 pJ / bit / m 2
ε mp Transmitter amplifier (Multi-path model) 0.0013 pJ / bit / m 4
E D A Data aggregation energy 5 nJ / bit / signal
pAffinity propagation (AP) preference−6000
Table 3. Results of different values of p .
Table 3. Results of different values of p .
Value of p−4500−5000−5500−6000−6500−7000−7500
Converge time (s)2.121.541.220.991.131.272.46
Cluster number8986689

Share and Cite

MDPI and ACS Style

Wang, J.; Gao, Y.; Wang, K.; Sangaiah, A.K.; Lim, S.-J. An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks. Sensors 2019, 19, 2579. https://doi.org/10.3390/s19112579

AMA Style

Wang J, Gao Y, Wang K, Sangaiah AK, Lim S-J. An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks. Sensors. 2019; 19(11):2579. https://doi.org/10.3390/s19112579

Chicago/Turabian Style

Wang, Jin, Yu Gao, Kai Wang, Arun Kumar Sangaiah, and Se-Jung Lim. 2019. "An Affinity Propagation-Based Self-Adaptive Clustering Method for Wireless Sensor Networks" Sensors 19, no. 11: 2579. https://doi.org/10.3390/s19112579

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop