Next Article in Journal
Deep Visible and Thermal Image Fusion for Enhanced Pedestrian Visibility
Previous Article in Journal
ARTS, an AR Tourism System, for the Integration of 3D Scanning and Smartphone AR in Cultural Heritage Tourism and Pedagogy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Marine Observation Beacon Clustering and Recycling Technology Based on Wireless Sensor Networks

1
College of Engineering, Ocean University of China, Qingdao 266100, China
2
College of Letters and Science, University of Wisconsin-Madison, Madison, WI 53711, USA
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(17), 3726; https://doi.org/10.3390/s19173726
Submission received: 13 July 2019 / Revised: 23 August 2019 / Accepted: 25 August 2019 / Published: 28 August 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
Monitoring of marine polluted areas is an emergency task, where efficiency and low-power consumption are challenging for the recovery of marine monitoring equipment. Wireless sensor networks (WSNs) offer the potential for low-energy recovery of marine observation beacons. Reducing and balancing network energy consumption are major problems for this solution. This paper presents an energy-saving clustering algorithm for wireless sensor networks based on k-means algorithm and fuzzy logic system (KFNS). The algorithm is divided into three phases according to the different demands of each recovery phase. In the monitoring phase, a distributed method is used to select boundary nodes to reduce network energy consumption. The cluster routing phase solves the extreme imbalance of energy of nodes for clustering. In the recovery phase, the inter-node weights are obtained based on the fuzzy membership function. The Dijkstra algorithm is used to obtain the minimum weight path from the node to the base station, and the optimal recovery order of the nodes is obtained by using depth-first search (DFS). We compare the proposed algorithm with existing representative methods. Experimental results show that the algorithm has a longer life cycle and a more efficient recovery strategy.

1. Introduction

The utilization of marine resources is increasingly becoming important and active to solve the issue of resource shortage. Correspondingly, marine pollution is becoming more serious with the exploitation of marine resources [1,2]. Wireless sensor networks (WSNs) play an important role in oceanic scenarios such as environmental monitoring and ocean exploration [3,4,5,6,7]. The categories of ocean monitoring include marine buoy monitoring, vessels, satellites, and aerial-based monitoring [8,9,10]. Compared with other detection methods, mobile and fixed-point ocean observation buoy monitoring has advantages in accuracy and cost performance [11]. After an ocean observation beacon completes the data collection task, it needs to be recycled, as shown in Figure 1. However, in the process of monitoring the marine environment, due to the influence of natural hazards such as waves and tides on the monitoring equipment, there are still many problems in completing the recovery of large-scale monitoring equipment [12,13]. So far, clustering is the most effective way to improve target detection efficiency [14]. Meanwhile, due to the instability of the marine environment, the real-time location of the monitoring equipment directly affects the communication efficiency and recovery efficiency of the equipment [15]. Therefore, the rapid acquisition of node information is essential for the recovery of the target.
WSNs have different requirements for routing algorithms, according to different application scenarios. The main purpose is to extend the network life cycle and balance the energy consumption of network nodes [16]. WSNs are composed of a number of sensor nodes (SNs), which are generally powered by lithium batteries and communicate wirelessly to form a sensor communication network. Because the nodes are powered by batteries, it is not realistic to replace the dead nodes with batteries in a wide range of application scenarios. Therefore, the energy problem is a key factor limiting the reliability of WSNs [17,18,19,20]. The low-power design of the node is an effective way to solve the energy problem. However, low-power design limits the computational and storage capabilities of the node [21,22].
In these protocols, SNs are divided into ordinary nodes and cluster heads (CHs). An ordinary node does not directly communicate with the base station (BS), but sends information to the CHs, k whereas the CHs send the processed data to the BS [23,24,25]. Therefore, the CH forwarding not only reduces the energy consumption of the node’s ultra-long-distance transmission, but also the data transmission amount through data fusion. The clustering algorithm is divided into centralized and distributed according to the way the CH is generated [26]. The centralized algorithm selects the CH based on the global information of the network, and the distributed algorithm generally adopts the method of “self-recommended” or partial competition to generate the CH. In the cluster-based approach, the rationality of clustering and CH allocation can ensure the balance of network energy consumption, network scalability, and manageability.
Many researchers proposed methods for solving the energy problems of WSNs. The low-energy adaptive clustering hierarchy (LEACH) algorithm is the most classical clustering algorithm [27]. The node rotation mechanism is used to select the CH. Each node has the opportunity to be elected as the CH. The CH selection mechanism of the algorithm cannot guarantee the quantity and quality of the CH and does not consider the node energy problem. The network is prone to the “energy hole” phenomenon. The power-efficient gathering in sensor information systems (PEGASIS) algorithm is based on the idea of the LEACH algorithm, which constructs a chain through greedy algorithms for all nodes in the network [28]. The algorithm requires each node to know the location of other nodes, which increases the storage difficulty of nodes. The long chain length increases the communication energy consumption of the node, and CH failure leads to network routing failure. The LEACH-C (LEACH centralized) algorithm effectively compensates for the shortcomings of LEACH algorithm by selecting CHs through the BS [29]. However, the flexibility of the algorithm is limited by the availability of the global information. The distributed energy-efficient clustering (DEEC) algorithm adds the initial energy and residual energy of the node based on the LEACH-C algorithm. The DEEC algorithm not only balances network energy but also extends the network life cycle [30]. The algorithm requires uniform network energy consumption, which limits the practicability of the algorithm. The LEACH-MEEC (LEACH mobile, energy-efficient, and connected) algorithm selects the CH by the connectivity between adjacent nodes and the residual energy of the nodes. The LEACH-MEEC algorithm uses four mobile models to verify the rationality of the algorithm [31]. The CH of each round is selected according to the state of adjacent nodes, which lacks global features. The energy-efficient unequal clustering (EEUC) algorithm adopts a networking method of non-uniform clustering and inter-cluster multi-hop routing [32]. The distance between the CH and the BS is taken into consideration when selecting the CH. In order to balance the network energy, the distance between the relay node and the BS and the energy of the relay node need to be considered when selecting the relay node. The CH selection mechanism of the algorithm does not add the node energy factor, which has some defects. The ant colony optimization-based uneven clustering (ACOUC) algorithm is an improved version of EEUC algorithm, which adds a directional diffusion ant colony optimization algorithm to the EEUC algorithm [33]. The algorithm can yield more surviving nodes in a longer period of time. The ACOUC algorithm has extremely complex message complexity. When the network size is large, there is a heavy network burden. The coverage and energy-aware clustering algorithm (CECA) guarantees the rationality of the CH and cluster compactness based on parameters such as node degrees, distance between nodes, and energy [34]. However, the rationality of the cluster size cannot be guaranteed.
Heuristic algorithms and clustering algorithms provide a better solution for reducing the energy consumption of WSNs. Reference [35] used the k-means algorithm to optimize the LEACH and HEED (hybrid energy-efficient distributed clustering) algorithms to increase clustering compactness of the network based on Euclidean distance. Simulation results showed that the scheme improves both network lifetime and energy efficiency. The two-tier distributed fuzzy logic-based protocol (TTDFP) is a two-layer distributed fuzzy logic algorithm. The first layer of the algorithm selects CHs through the energy competition of the provisional leaders. The second layer uses the three connectivity parameters (node connectivity, distance to the BS, and remaining node energy) to find the optimal path from the channel to the receiver. The clustering method of the algorithm is a fuzzy distributed non-uniform clustering method. There is no BS involvement in the CH election process [36]. The improved energy-efficient cluster head selection (IEECHS) algorithm selects two CHs in a single cluster and proposes corresponding data fusion techniques according to the characteristics of the dual CHs. Experiments showed that this method has good performance in terms of network lifetime and energy consumption [37]. The energy-balance routing protocol (EBRP) uses the k-means++ algorithm to divide the network into clusters and uses fuzzy logic systems (FLS) to optimize CH selection. The algorithm uses the genetic algorithm (GA) to obtain fuzzy rules [38]. The simulation results showed that the EBRP algorithm has a longer life cycle than the current routing protocol network. The FL-EEC/D (fuzzy logic-based energy-efficient clustering for WSN based on minimum separation distance) algorithm uses a k-means-based fuzzy logic CH selection model using descriptors such as residual energy, position suitability, density, compression, and distance between nodes and the BS [26]. The algorithm uses the Gini index to measure energy efficiency. In Reference [39], an adaptive neuro fuzzy inference system (ANFIS) and an artificial bee colony (ABC) algorithm were proposed to solve the problem of dangerous goods path planning. The study sought the optimal path by considering the combination of seven factors (operating costs, emergency response, risk associated with the environment, etc.). The Dijkstra risk (D-R) model is a new method based on the combination of multi-standard risk analysis and the traditional Dijkstra algorithm [40]. The model uses a variety of potential factors and normalizes the indicators to optimize path selection. The energy saving-oriented least-hop routing algorithm (ESLHA) is based on improvements of Dijkstra’s (ESRAD) energy-efficient routing algorithm [41]. The algorithm introduces node processing information energy consumption and inter-node information transmission energy consumption to evaluate node indicators. Then, the minimum energy consumption path is obtained by the Dijkstra algorithm. Reference [42] used the weighted sum method to calculate node weights, and the node closest to the standard weight of a particular cluster was elected as CH. The Dijkstra algorithm was used to obtain the optimal path for information transfer. However, GA is computationally intensive and fuzzy rules apply simple if–then rules to distribute computing whether it is machine learning, other intelligent algorithms, or natural-based heuristic evolutionary algorithms [43], which require nodes and BSs with high computing performance and high memory capacity. In particular, when the number of networks is large, the system delay increases [26]. Therefore, it is necessary to limit the network scale or application range for increasing system real-time performance.
The communication efficiency and recovery efficiency of the nodes are challenges as discussed in the previous discussions. To target the reduction of node energy consumption on communication and to increase node recovery efficiency, we propose the k-means algorithm and fuzzy logic system (KFNS), a data gathering algorithm for the recycling of marine beacons. Compared with published methods, the algorithm takes the advantages of centralized and distributed algorithms. It not only increases the real-time performance of the system but also reduces unnecessary data communication to improve network lifetime. Another highlight of this work is that the algorithm proposed in this paper has lower hardware requirements for nodes. We take into account the low power consumption factor and assign the nodes with simplified tasks. We also introduce the FLS and Dijkstra algorithms for optimal path selection with certain adaptability. Path selection weights are determined by a variety of influencing factors.
The KFNS algorithm is divided into three stages: Monitoring phase, cluster routing phase, and recovery phase. The KFNS algorithm discards network construction in the monitoring phase. The boundary nodes are selected by Euclid distance due to the limited computing power of the nodes to maximize network energy. In the cluster routing phase, the initial clustering center and the number of clusters are selected according to the location of the boundary nodes and the real-time requirements of the system to optimize the clustering effect and extend the network life cycle. In the recovery phase, a single cluster recovery strategy is adopted; the FIS is used to optimize the Dijkstra algorithm; the DFS is used to obtain the optimal recovery order of the nodes and accelerate the recovery efficiency of monitoring equipment. The application background of the marine observation beacon recycling has its unique problems compared to other WSNs application scenarios. The KFNS algorithm combines application scenarios and phased target requirements to better suit actual requirements. The method optimizes network energy consumption and improves network performance through these phase divisions. The main contributions of this paper are given below.
We divide the recycling process of the marine observation beacon into three phases. The algorithm is designed to meet the demands of different phases.
A novel scheme is proposed where the FLS is used to comprehensively consider the influence of various environmental factors on the path weight, breaking through the limitations of traditional description methods.
We propose an effective solution by using centralized and distributed algorithms. After the BS completes the clustering, the CH replacement is completed by the nodes in the cluster. Nodes reduce unnecessary communication energy consumption, which extends the network life cycle.
The rest of this paper is organized as follows: Section 2 introduces the network model, including the node model, the energy model, and the node movement model. Section 3 introduces the proposed recovery algorithm for large-scale ocean observation beacons based on WSNs. Simulations and experiments are shown in Section 4, and Section 5 concludes this paper.

2. Network Model

In this section, the node model, energy model, and node movement model are presented in detail [44].

2.1. Node Model

(1)
This paper assumes that nodes are distributed over a continuous two-dimensional plane. This plane has no isolated points (beyond the communication range of all other nodes).
(2)
The node uses the LoRa (Long Range Radio) module to communicate, and the nodes in different clusters can be simultaneously communicated by changing the LoRa frequency band.
(3)
Node information: n nodes are randomly and independently distributed in a circular area. The size of the area is π R 2 , where R is the radius. Node information is represented by S = { S 1 , S 2 S n } , and the initial energy of the node is E i = E 0 × ( 0.9 + r a n d ( 0.1 ) ) , where E 0 = 5 . Due to the difference between the beacon battery and the beacon start-up time, the initial power of each node is different.
(4)
The node controls the node communication range by controlling the transmission power.
(5)
All nodes are positioned and calibrated periodically by a global positioning system (GPS).
(6)
Each node has a unique identifier (ID) number and has small computing and storage capacity.
(7)
It is assumed that the CH receives k bits of data from each node and can be compressed into k bits of data.

2.2. Energy Model

All nodes satisfy the free communication model [45]. The node communication energy consumption includes sending transmission consumption and receiving energy consumption. The transmission energy consumption includes the energy consumption of the RF (Radio Frequency) module and the signal amplification; the receiving energy consumption includes the energy consumption of the receiving module. When the communication distance is less than the distance threshold, d T h r e s h o l d , the free space propagation model is adopted, and the path attenuation index is 2. When the communication distance is greater than the threshold, d T h r e s h o l d , the two-ray propagation model is adopted, and the path attenuation index is 4.
The node transmits k bits of data through multi-hop routing between clusters, as shown in Figure 2 and its energy consumption is as follows [46]:
P k × c e i l ( d tot d 1 h o p ) × ( 2 E e l e c + E cpu + E amp × d 1 h o p γ ) ,
where P is the energy consumption for sending k bits of data, d t o t is the distance from the sending point to the target node, E e l e c ( n j / b i t ) is the RF energy consumption coefficient, E a m p ( n j / b i t / m 2 ) is the amplifier energy factor, E c p u is processor power consumption, d 1 h o p is the distance between neighbor nodes and γ is the signal attenuation index.
The optimal single-hop distance obtained from Equation (1) is as follows:
d 1 h o p = k × d t o t × ( 2 E e l e c + E c p u ) E a m p × ( γ 1 ) γ .
To ensure that the signal-to-noise ratio (SNR) is within a reasonable range, the energy consumption model of the node sending data is calculated as follows:
E T x ( k , d ) = { E e l e c × k + E f s × k × d 2 , d d T h r e s h o l d E e l e c × k + E m p × k × d 4 , d > d T h r e s h o l d .
The energy consumption model of the node receiving data is determined as follows:
E R x = E e l e c × k ,
where E T x is the transmission energy consumption, d is the transmission distance, E f s ( n j / b i t / m 2 ) , E m p ( n j / b i t / m 4 ) is the power dissipation factor of the amplifier under different communication models, d T h r e s h o l d is the distance threshold, and E R x is the receiving energy consumption.

2.3. Node Movement Model

In the marine environment, the simulation results based on the mobile model are reliable [47]. The entity movement model includes the following aspects:
(1)
Random walk;
(2)
Random waypoint mobile model;
(3)
Random direction model;
(4)
Gauss Markov model.
In the field environment, the velocity and direction before and after the joint motion interact with each other. The Gauss Markov model can better describe the motional behavior of the node. The Gauss Markov model assigns an initial velocity and initial direction to each node. After a fixed interval, the node updates its current speed, direction, and location information as follows:
s n = α s n 1 + ( 1 α ) s ¯ + ( 1 α 2 ) γ m ,
s n = α s n 1 + ( 1 α ) s ¯ + ( 1 α 2 ) γ m ,
where s n and d n are the speed and direction of the node at time n, s ¯ and d ¯ are the average value of the speed and direction, γ m and φ m are random variables subject to Gaussian distribution, and α is a randomness variable generally taken as 0 α 1 .
x n = x n 1 + s n 1 cos d n 1 ,
y n = y n 1 + s n 1 sin d n 1 ,
where ( x n , y n ) are the coordinates of the node at time n, and ( x n 1 , y n 1 ) are the coordinates of the mobile node at time n−1.

3. Proposed KFNS Algorithm

In the recovery process of the marine observation beacon, it can be further divided into three stages according to different requirements including: the monitoring phase, the cluster routing phase and the recovery phase. The corresponding algorithm is designed over the characteristics of each stage to improve the applicability of the algorithm in the recycling process.
We define D B S as the distance between the BS and the node network, D max as the distance between the BS and the node network when it is greater than the communication distance, and D min as the range in which the BS enters to recover the node.
When the BS does not reach the node network boundary, the node network is in the monitoring phase ( D max < D B S ). The main purpose of this phase is to monitor whether the BS reaches the periphery of the node networks and the internal nodes of the network are in sleep mode. Therefore, the network can maximize its energy. When the BS moves to the node network boundary, the node is in the cluster routing phase ( D min D B S < D max ). This phase is to complete the node networking operation. When the BS can summarize the beacon location information. The node network information can provide data support for the direction of movement of the BS. When the BS moves to the node recovery range, the node network is in the recovery phase ( D B S D min ). The main goal of this phase is the dynamic update of the CH and the order in which the nodes are recycled. Using fuzzy rules can break through the limitations of traditional assessment methods. Figure 3 and Figure 4 are the work flow of each stage and the flow chart of KFNS algorithm respectively.

3.1. Monitoring Phase

When D max < D B S , we set the initial mode of the node to monitoring mode. The node firstly compares its own residual energy and initial energy conditions with the set threshold, as well as the energy consumption ratio over time. When T ( i ) is greater than the set threshold T, the node acts as a boundary cluster head (BCH). Based on the relationship between the ID number and the time t, the BCH sends the contention message “HEAD” to the neighbor node with the optimal communication distance as follows:
t = ( T r e c + T s e n d + T c p u + T d e l a y ) × I D ,
where t is the node information interaction and processing time, T r e c is the time when the node receives data, T s e n d is the time when the node sends data, T c p u is the data processing time, and T d e l a y is the anti-collision delay.
When the BCH receives the message from other BCHs, the receiver gives up the CH identity. The broadcast time interval of the same BCH is then calculated as follows:
T n + 1 T n > n × t ,
where n is the number of nodes to guarantee that only one BCH works at a time. When the same BCH broadcasts more than a certain number of times, but there is no neighbor node response, then the BCH considers leaving the network and enters sleep mode until the periodic wake-up. The probability that a node is elected as a BCH is as follows:
T ( i ) = α E i _ c u r r e n t + ( 1 α ) E i _ sta r t E i _ c u r r e n t t i _ n o w t i _ s t a r t ,
where T ( i ) is the probability that node i is elected as the BCH, E n _ c u r r e n t is the current node energy, E n _ start is the initial energy of the node, t n o w is the current time of the node, t start is the node boot time, and α is the proportion of energy and time.
After the surrounding node receives the BCH information, if the current neighbor node is configured to be a BCH, the neighbor node abandons the BCH identity. All neighbor nodes send their own location information and node energy information to the BCH in TDMA (Time Division Multiple Access) mode with their ID number after the BCH receives the information of the neighbor node. According to the position of the receiver, the optimal communication distance is the radius, and the fan-shaped area with an angle of 90° is divided into four regions. The average energy of the nodes in the current region is firstly calculated. Then, according to the energy and distance of the neighbor nodes in the current domain, the probability that all neighbor nodes in the region become temporary boundary nodes is obtained. The neighbor node with the highest probability becomes the temporary boundary node of the domain, and the probability is calculated as follows:
P ( i ) = α E i E a v e × ( 1 α ) d i B C H d a v e ,
where P ( i ) is the probability that the node is elected as a temporary boundary node, E i is the current remaining energy of the node, E a v e is the average energy of all nodes in the four regions of the BCH, d i B C H is the distance between the boundary node and the BCH, d ave is the average distance from all nodes to the BCH, and α is the specific gravity relationship of each parameter.
According to Equation (12), temporary boundary nodes of four regions of BCH can be obtained. The BCH broadcasts regional network energy and temporary boundary node information to nodes in the area. The BCH abandons the CH identity and enters sleep mode (timed wake up to receive messages). The intra-area node receives the information of the BCH and then classifies it as a normal node or a temporary boundary node. The normal node enters sleep mode, and the temporary boundary node becomes the new BCH. The latest generated BCH continues to broadcast the “HEAD” message and receives node information for the other three regions. The process is repeated in turn until the outermost corner of the network. When the BCH does not have a suitable temporary boundary node selection in a certain area, the BCH acts as a boundary node.
Because the nodes move relative to each other, the boundary nodes need to broadcast “boundary” messages periodically. In order to improve communication success rate and reduce signal collision, firstly, the radio signal of the air is monitored by the channel monitoring function of the LoRa module. When there is a radio signal in the air, it continues to monitor after a random delay. If there is no signal communication in the air after the delay, the “boundary” message is broadcasted. Secondly, the default zone node information is received if new node information appears. A new boundary node is generated based on the distance and energy of the neighbor nodes. If no new boundary node is generated, the boundary node enters the receiving mode, and other ordinary nodes enter the sleep mode. When the energy of the boundary node is lower than 15%, the boundary node sends the final sleep message, and the boundary node identity is abandoned to enter the sleep mode (waking up regularly to receive the message). After receiving the final sleep message of the boundary node, the neighbor node re-selects the boundary node.

3.2. Cluster Routing Phase

3.2.1. Temporary Network Routing

The BS periodically broadcasts the “finding” message. After the packet is received by the boundary node, it sends its own location and energy information to the BS ( D min D B S < D max ) . The boundary node informs the BS that it reached the edge of the network and the BS continues to move in the direction of the network target. After the boundary node sends its own location energy information, it broadcasts a “collect” message to collect network node location and energy information for temporary networking. Due to the low-power design, the microprocessor has limited computing capability. Therefore, the temporary networking algorithm cannot be too complex. After receiving the collection command, the neighbor node sends its own position and energy information to the boundary node in TDMA with its own ID. The boundary node selects the temporary CH of each domain according to the average energy of the neighbor node and the distance from the boundary node. The distance factor from the node to the temporary CH and the energy consumption rate of the node are introduced in the election of a temporary CH. The node that makes the most energy far away from the BS is elected as the temporary CH, and the probability of being elected as the temporary CH is calculated as follows:
P ( n ) = α E n _ c u r r e n t E n _ sta r t + β d i B S i C H Re d ( n i , C H Re ) N + γ E n _ s t a r t E n _ c u r r e n t t n o w t s t a r t ,
α + β + γ = 1 ,
where P ( n ) is the probability that a node is elected as a temporary CH, E n _ c u r r e n t is the current remaining energy of the node, E n _ s t a r t is the initial energy of the node, t n o w is the current node time, t start is the node startup time, d i B S is the distance from the node to the temporary CH, d ( n i , C H R E ) is the distance from the node to the temporary CH, and α , β , γ are the proportion of each part.
After the boundary node selects the temporary CH, the temporary CH broadcasts the “HEAD” message. Neighbor nodes match “HEAD” messages to join temporary clusters according to their ID. The next suitable temporary CH is selected by Equation (13) according to the neighbor node information until all nodes form a temporary network. The temporary network sends information to the BS through a multi-hop route. Because the BS has no energy limitation and has certain computing power, the BS clusters the nodes by summarizing the node information of the entire network.

3.2.2. Enhanced K-Means Algorithm

The traditional k-means algorithm is a simple iterative clustering algorithm, which classifies all points into k-class by selecting k initial centers. The algorithm selects the optimal clustering center by iteration and compares the effect of each iteration with that of the previous iteration. Until the difference between the two iterations is within the set threshold, the iteration is completed [48,49]. The traditional k-means algorithm needs to specify the number of clusters k, which requires a certain prior condition. an improper value of k not only affects the clustering effect but also causes uneven energy consumption of nodes. The initial clustering center is randomly selected to increase the number of clustering iterations and affect the clustering effect.
Combined with the application background of the marine observation beacon, the deficiencies of the traditional k-means algorithm are improved. The improvement ideas are as follows: (1) the number of clusters k is determined according to the real-time requirements and empirical values of the system. The clustered optimal solution is found by comparing the clustering compactness functions after different k value iterations. (2) The initial cluster center is determined according to the location relationship of boundary nodes. The intra-cluster clustering is implemented by adding the intra-cluster evaluation effect function, and the real-time processing of the information in the cluster is increased. Therefore, it can maximize the rationality of clustering results, prolong network lifetime, and optimize the energy consumption of boundary nodes and CHs. The improvement process is described by Algorithm 1.
Algorithm 1 Improved k-means algorithm
Input: E = { P , Q } , P = { p 1 , p 2 , , p i } , Q = { q 1 , q 2 , , q j } //set of i ordinary sensor nodes and
j boundary sensor nodes.
Output: A set of k clusters C = { C 1 , C 2 C k }
1: for i k min to n do
2:  C i
3:  choose centroid r i among E belong to C i
4:  for each set E j E do
5:    assign E j to the cluster C i with nearest r i i.e. ( d i s j , i ( E j , r i ) d i s j , i ( E j , r i * ) ; i { k min , , n } )
6:  end for
7:  repeat
8:  for all i ( k min , , k o p t ) and cluster C i do
9:   the centroid r i to be the center of all nodes in C i , so that r i = 1 | C i | j C i d ( E j , r i )
10:  end for
11:  until r i <V (i.e. r i less than the threshold)
12:  calculate criterion function E = i = 1 k p C i | p m i | 2
13: end for
14: find the minimum of E and get the optimal k o p t
15: determine the optimal C
16: return C
The main work of our proposed clustering method is to narrow the judgment interval of the optimal CH and optimize the selection of the initial convergence center. Therefore, the election of the final CH takes into account the energy consumption of ordinary nodes, the energy consumption of the CH, and the energy imbalance of boundary nodes. We divide the optimization process of the algorithm into two steps, which are the cluster number selection and the initial cluster center selection.
(1) Determine the number of clusters.
At present, the best number of clusters is selected by iterating the clustering results with different k values. Comparing the clustering evaluation function after iteration, the optimal number of clustering is determined [50,51]. The iteration range of the k value is the empirical value 2 k n . However, the number of nodes is too large and conducted over size steps of iterations for k value, which seriously affects the real-time performance of the system. According to the real-time requirement of the system, this paper reduces the iteration range of the k value and speeds up the selection of the optimal k-value. The cluster size k o p t is scored by the following formula:
k min = n n u m × ( t r e c + t s e n d + t m c u + t d e l a y ) T C ,
k min k o p t n ,
where T C is the time period required by the system, t S e n d the sending time of the node, t r e c is the time when a node receives a message, t mcu is the time when the master unit processes the data, n n u m is the number of nodes, t d e l a y is the anti-collision delay, and k min is the number of clusters that satisfy real-time performance.
The range of cluster number k is determined according to the above formula. It not only ensures the real-time nature of the data, but also the rationality of the number of cluster nodes. The optimal k value is selected by comparing the clustering evaluation effect function.
(2) Selection of initial convergence centers.
Due to differences in node functions during the monitoring phase, there is a large energy difference between different nodes. This directly affects the choice of the initial cluster center. Therefore, it is necessary to consider the relationship between the initial cluster center and boundary nodes. The initial cluster center is too far away from the boundary node, causing the boundary node to consume more energy for data communication and the node to die prematurely. The initial cluster center is too close to the boundary node to reduce the selectivity of the CH rotation and increase the network consumption within the cluster. Therefore, the relationship between the boundary node and the CH needs to be considered in the initial cluster center selection.
1. There are N boundary nodes in a certain network. The sum of the distances of l ( l N ) boundary nodes in this network is less than the optimal communication distance. The optimal cluster center m is selected by the farthest boundary node among the l boundary nodes. The distance between the reference node and the boundary node, the average energy ratio, and the cosine similarity selected for the optimal clustering center are as follows:
S = a b | | a | |   | | b | | ,
P i , j , m ( m ) = μ × d i s i , j d i s i , m + d i s j , m + η × E m E a v e + γ ( 1 S ) ,
μ + η + γ = 1 ,
where a and b are the direction vectors of node m relative to the boundary node, S is cosine similarity, P i , j , m ( m ) is the probability that the node m selected as the cluster center, d i s i , j is the distance between boundary nodes i and j , E m is the energy of node m, E a v e is the average energy of the network, and μ , η , γ are the proportion of each part.
2. The distance between the remaining two arbitrary boundary nodes is larger than the optimal communication radius d 1 h o p . The boundary nodes farthest from the initial clustering center are selected as the boundary nodes for the next clustering center. The probability of a node being elected as the cluster center is as follows:
P ( i ) = ω × m = 1 N 1 d i s i , m N 1 + ( 1 ω ) E i E a v e ,
where P ( i ) is the probability that the node i is selected as the cluster center, d i s i , m is the distance from boundary node i to initial cluster center m, E i is the energy of node i , E a v e is the average energy of network nodes, and ω is the proportion of each part.
3. If c ( c < k o p t ) cluster centers are selected according to boundary nodes, according to Equation (20), the remaining cluster centers are selected according to any selected cluster centers, and the boundary nodes are replaced by ordinary nodes until the end of c = k o p t .
The optimal clustering result is obtained from Algorithm 1. However, optimal clustering does not guarantee minimized size. The cluster size is too large to meet the real-time requirements of the system. Therefore, it is necessary to improve the cluster density. If a cluster is relatively dense, the real-time performance of a single CH is poor ( n i > n max ). It is necessary to increase the number of CHs to improve the real-time performance of the system. The number of CHs is determined as follows:
k i = T i i = 1 n u m ( t i _ s e n d + t i _ c p u ) + t C H ,
where ni is the number of nodes in the cluster, n max is the maximum number of nodes to satisfy the real-time requirement, k i is the number of clusters, T i is the intra-cluster communication time, t i _ s e n d is the time when a node sends data, t i _ c p u is the central processing unit (CPU) processing time, and t C H is the inter-cluster communication time.
In the above steps, the optimal clustering in the region is obtained. According to the optimal communication distance, the clustering results are hierarchically divided. Data communication between CHs is carried out among CHs at different levels. When the CH energy is below a certain threshold, the CH is replaced in the cluster. Nodes close to the optimal CH with sufficient energy are selected as the new CHs. Depending on different clustering results, the LoRa frequency band in the cluster is replaced and the bandwidth is set. The function of simultaneously performing intra-cluster information communication via different clusters is completed, and the real-time performance of the network is increased. The CH is replaced with the same frequency band during inter-cluster communication.
Because of the movement characteristics of the nodes, it is necessary to monitor the status of the current network clustering results in real time. If some nodes in the clustering network have too large a deviation from the CH, i.e., f > f max , then the BS re-clusters the node or restructures the whole network. The evaluation function of the restructuring is as follows:
f = max i = 1 , 2 , , k { n i C H k d ( n i , C H k ) N n u m } ,
where f is an evaluation factor, d ( n i , C H k ) is the distance from the node to the corresponding CH, and N n u m is the number of nodes in the cluster.
The BS receives the location and energy information of each node and the clusters through KFNS algorithm, and then sends the clustering information to the nodes. Depending on different clustering results, nodes are divided into CHs and ordinary nodes. Ordinary nodes send data information to CHs. After data fusion, the CH transmits the information to the superior CH until the data are transmitted to the BS. The KFNS algorithm adopts a distributed and centralized approach in the cluster routing phase. The BS is not limited by energy and can use high-performance CPUs and large storage devices to perform complex algorithms.
In the process of node clustering, the BS needs to comprehensively consider the energy imbalance of the boundary nodes, the high energy consumption of CH aggregation messages, the compactness of clustering, and the real-time nature of network information. In the case of ensuring the energy consumption of the boundary nodes, the cluster center should be as far as possible from the boundary nodes. In other words, the probability is small that a boundary node is elected as a CH when updating a CH within a cluster. In order to ensure the compactness of clustering and the real-time nature of network information, it is necessary to limit the number and size of networks. After the clustering is completed, the rotation of the CH is completed by the nodes of each cluster. The BS no longer participates in the election of the CH, and minimizes the communication energy consumption caused by the CH replacement. The BS performs cluster routing operations based on the global information of sensor networks, and evaluates the operation of the whole network according to the real-time data returned by mobile nodes. Once the network clustering compactness is greater than the set threshold, the BS re-clusters the network. The KFNS algorithm can minimize unnecessary network communication and reduce network energy consumption under the condition of ensuring the rationality of clustering.

3.3. Recovery Phase

When the recovery ship moves to a certain range of beacon machine network ( D B S D min ), the beacon machine needs to be recovered. Considering the recycling efficiency of the nodes, the Dijkstra algorithm is used to plan the recycling path. In order to ensure the real-time performance of the system and reduce the energy consumption of network reorganization, a single-cluster recovery strategy is adopted. After the single cluster node is recovered, the node recovery of the next cluster is performed. The recycling process not only needs to consider the residual energy of the node and the recovery efficiency of the recovery vessel, but also the dynamical change of the CH during the recycling process. The order of recycling of nodes is affected by a variety of factors. The best choice of fuzzy rules can be used to obtain better parameter results, as shown in Figure 5. Therefore, this paper optimizes the Dijkstra algorithm by fuzzy logic and adds DFS to optimize the recovery efficiency. The details of the algorithm are shown in Algorithm 2.
Algorithm 2 Compute node recovery order
Input: E n e r g y = { e 1 , e 2 , , e i } , D i C H = { d 1 C H , d 2 C H , , d i C H } , D i j = { d 12 , d 13 , , d i j } , D B S = { d 1 B S , d 2 B S , , d i B S }
Output: node recycling order
1: Min–max normalization technique: y i = x i min { x j } 1 j n max { x j } 1 j n min { x j } 1 j n
2: add membership function of fuzzy set
3: get inter-node weights and CH chance
4: initialize d i s t [ i ] , v i s i t [ θ ]
5: for i n do
6:  if ! v i s i t [ i ] && d i s t [ i ] < min
7:    min = d i s t [ i ]
8:    min j = j
9:  end if
10: end for
11: for j n do// Relaxed edge
12:  if ! v i s i t [ i ] && d i s t [ j ] > d i s t [ i ] + t a b [ j ] [ k ]
13:    d i s t [ j ] = d i s t [ i ] + t a b [ j ] [ k ]
14:  end if
15: end for
16: get the node to BS minimum weight path
17: DFS {
18: judging the boundary
19: for k n do
20:  DFS (step+1)
21: end for
22: return}
In the process of node recovery, a variety of factors work together on the node’s recycling order and CH election. To eliminate the dimensional effects between the influencing factors, we use the min–max normalization technique to scale the language variables [52].
y i = x i min { x j } 1 j n max { x j } 1 j n min { x j } 1 j n ,
where y i is the normalized value, x i is the given variable, and max { x j } 1 j n and min { x j } 1 j n are the maximum and minimum of all given variables.
The FLS has four input variables, including node energy (energy), distance between nodes ( D i j ), distance between node and BS ( D B S ), and distance between node and CH ( D i C H ). The role of the fuzzifier is mapping each input value to the fuzzy set. Two output variables are generated by the FIS for the chance that the node is elected as the CH and for the recycling weight of the node. Weight is related to energy, D i j , and D i C H , and CH election is related to energy, D B S , and D i C H . The membership function of the input language variable is derived empirically. For each of the four input variables, each input variable has more than one linguistic variable. Figure 6 shows the membership function of each variable. Table 1 and Table 2 are linguistic variables.
The KFNS algorithm uses a fuzzy model to calculate the weights between nodes and elects to collect CHs during the recovery phase. The BS uses the weight relationship between nodes to obtain the connected node with the smallest weight of any node. The minimum weight path from any node to the BS is obtained by the Dijkstra algorithm. Similarly, a directed weight map from the BS to the node is obtained using DFS to traverse all nodes to get the optimal path for the reclaimed nodes. In order to ensure the system’s real-time performance and information transmission efficiency, the BS does not communicate directly with nodes in the network; rather, it communicates through the CH. The CH obtained by the fuzzy model is responsible for collecting the node information of the recovered cluster and forwarding the node information of other clusters.

4. Simulation and Experiments

In order to verify the feasibility of the algorithm, the proposed algorithm was simulated and verified by MATLAB on an Intel Core 3.9-GHz CPU with 8 GB memory, with different requirements in each stage of the marine observation beacon recovery process, in terms of computing power between nodes and BS. In the stage of recycling, network operations do not involve the participation of BS. The node uses a low-power CPU design that greatly limits the computing power of the node. Therefore, in the monitoring phase, we compared algorithms that include LEACH-C, DEEC, CECA, and EEUC. In the cluster routing phase, the addition of BS greatly increases the computing power of the network, allowing it to run more complex algorithms. Therefore, the algorithm proposed in the EBRP and Reference [35] is compared in the cluster routing phase. We call the algorithm proposed in Reference [35] the k-means CH. In the recovery phase, the effects of three optimal recovery strategies, namely, optimal distance, optimal energy, and fuzzy logic, on recovery efficiency and node energy are compared. The simulation parameters are shown in Table 3.

4.1. Monitoring Phase Simulation

According to the actual situation, the nodes are distributed across an area of varying size. The node communication range may cover the whole distribution area, or it needs multi-hop routing to complete area coverage. Both cases were simulated and analyzed.

4.1.1. Single-Hop Coverage Simulation

The simulation environment was within the distribution area of nodes, and any two nodes could communicate with each other. That is, all nodes were within the maximum communication range of any node. Figure 7a compares the network life cycles of the three algorithms: LEACH-C, DEEC, and KFNS. The difference between the number of dead nodes and the time between algorithms can be seen. Compared to the former three algorithms, KFNS had a longer network life cycle. The number of rounds of the first dead node of the KFNS algorithm was 2195. The network life cycle increased by 201% and 160% compared to LEACH-C and DEEC. The algorithm proposed in this paper uses a distributed algorithm in the monitoring phase to reduce the energy loss caused by global network communication. The tasks of this phase were completed through the information exchange of some nodes. Figure 7b compares the relationship between the total energy of the network and the time of the three algorithms by comparing the remaining states of the network energy when the first node in the graph dies. The algorithm proposed in this paper has the longest survival time, and the total network has the most residual energy. The excess of network energy compared to other algorithms can be ignored relative to the prolongation of network lifetime. Figure 7c compares the number of CHs and boundary nodes generated by each algorithm during operation. The more the algorithm concentrates on the generated data, the more stable the number and size of clusters in the algorithm will be. From the data in the figure, it can be concluded that the mobility of the node seriously affects the LEACH-C and DEEC algorithms. There was a big difference in cluster size throughout the network life cycle. The algorithm proposed in this paper uses local network information for clusters to interact with each other. In this case, we assume that the physical boundary of the network does not change much, and that the number of boundary nodes does not vary greatly.

4.1.2. Multi-Hop Coverage Simulation

The simulation used a large set of randomly distributed nodes, whereby any two nodes may need other nodes to forward information for communication. Figure 8a compares the network node lifetime of the multi-hop clustering routing algorithms CECA, EEUC, and KFNS. Compared with other algorithms, the network lifetime of the KFNS algorithm increased exponentially. The number of rounds of the first dead node of the KFNS algorithm was 1431. The network life cycle increased by 4.88 and 3.56 times compared to CECA and EEUC. Multi-hop networks require more energy for network communication, which leads to excessive consumption of network energy. Through the comparison of the network life cycle, the effectiveness and feasibility of the KFNS algorithm were verified. Figure 8b compares the total energy consumption of the three algorithms over time. The KFNS algorithm has a longer network life cycle and longer network residual energy. Compared to other algorithms that use most of the network energy for inter-node communication, the KFNS algorithm avoids this part of the energy consumption. The network lifetime of KFNS is 3.5 times that of other algorithms. Figure 8c compares the number of CHs and the number of boundary nodes generated by the three algorithms in a multi-hop coverage environment. Similarly, CECA and EEUC are affected by node movement. Compared with the single-hop coverage, as the coverage increased, the number of boundary nodes also increased. The concentrated distribution of the number of boundary nodes indicates that the KFNS algorithm can cope with the impact of node movement, and the network has higher stability.
In this section, the application of the KFNS algorithm in different ranges was simulated by MATLAB. From the simulation results, compared with other algorithms, the KFNS algorithm could greatly improve the lifetime of network nodes and the network energy consumption. It is particularly useful for large-scale multi-hop routing networks; because of the reduction of large-scale communication loss, the algorithm has better performance in saving network energy.

4.2. Cluster Routing Phase Simulation

This phase was a simulation of the node networking and information collection process to compare the differences in network lifetime and network energy consumption of each algorithm. Figure 9a compares the node lifetimes of the k-means CH, EBRP, and KFNS algorithms. The number of rounds of the first dead node of the KFNS algorithm was 386. The network life cycle increased by 130% and 121% compared to k-means CH and EBRP. The k-means CH algorithm requires frequent network reorganization and CH replacement. The algorithm does not limit the cluster size and affects the real-time performance of the system. The EBRP algorithm performs clustering and then performs CH election and communication. The choice of the initial clustering center of the EBRP algorithm is only iteratively selected based on the Euclidean distance. The energy difference between nodes is ignored. The energy-unbalanced node may be close to or far away from the CH while ensuring that the CH is optimal. The node close to the CH causes selective reduction of the CH rotation, which increases the consumption of the common node. The node of energy imbalance being far away from the CH causes the node energy to be further consumed, and the node dies prematurely. Therefore, the clustering result has contingency, which directly affects the stability of network survival time. Figure 9b compares the total energy consumption of the network using the three algorithms. The KFNS algorithm has a lower residual network energy. The proposed algorithm has a positive effect on solving WSNs with extremely unbalanced node energy. Figure 9b also reflects the excessive network energy surplus of the EBRP algorithm. The algorithm does not consider the relationship between the CH and lower-energy nodes. As a result, lower-energy nodes die early, and there remains a large amount of energy in the cluster.
The lifetime and the energy consumption of the KFNS algorithm and other clustering algorithms in the cluster routing phase were also compared by MATLAB simulation. The proposed algorithm has advantages in terms of system real-time performance, energy consumption balance, and node clustering rationality. In the CH election stage, the location relationship between the optimal CH and the boundary nodes (energy-unbalanced nodes) is considered to make the CH election more reasonable.

4.3. Recovery Phase Simulation

The recycling order of nodes directly affects the recycling efficiency. Through the simulation of the recycling process, the rationality of the proposed algorithm in the recycling process was verified. Figure 10 shows the comparisons of optimal path, optimal energy, and the KFNS algorithm. The energy, node position, and CH rotation order of each node were the same in the simulation process, and the energy consumption followed Reference [45]. By comparing the two parameters of residual energy and recovery time, the advantages and disadvantages of recovery strategy can be discussed. Figure 11 compares the node recovery time of the three path plans with the remaining energy of the recovered nodes. The path optimization and energy optimization had dead nodes in the recovery process. The optimal path and optimal energy network energy fluctuation range were 2.857 and 2.835, and the KFNS algorithm had an energy fluctuation range of 2.219. Therefore, compared with other path selection methods, the KFNS algorithm performs better in balancing node energy consumption and reducing recovery time.

4.4. Node Recycling Process Simulation

Because the recycling process of the marine observation beacon is divided into multiple stages, and the computing power of the network in each stage is quite different, several representative algorithms need to be combined when performing the node recovery process simulation. It can be concluded from Figure 7 that the DEEC algorithm in the single-hop coverage simulation had better performance. In the multi-hop coverage simulation results in Figure 8, the EEUC algorithm performed better. Through the simulation results of the cluster routing stage in Figure 9, it can be concluded that the EBRP algorithm was more reasonable. We compared the proposed algorithms with several popular algorithms. Due to the different deployment scope of the marine observation beacon, we divided the simulation environment into single-hop coverage and multi-hop coverage. Figure 12a shows a comparison of recovery results for single-hop coverage. The average residual energy of the recovered nodes in the proposed solution was 1.6 times and 1.88 times that of other algorithms. Moreover, it had better performance in balancing network energy consumption. Figure 12b shows a comparison of recovery results for multi-hop coverage. The average energy of the KFNS algorithm recovery node was 1.9 times and 2.2 times that of other methods. This also illustrates the potential of the proposed algorithm for the recovery of large-scale nodes. Compared with other algorithms where node death occurs, the nodes recovered by the KFNS algorithm had a certain energy surplus. Based on the simulation results, the KFNS algorithm can provide better performance in response to large-scale node recovery.

4.5. Implementation and Experiments

We verified the feasibility of the proposed algorithm and other algorithms through the hardware platform shown in Figure 13. The platform performed channel monitoring and data communication through the UM402 LoRa module, and the positioning and calibration time were completed by the NEO-6M-0-001 GPS module. The experimental area was 100   m × 100   m × π without a building covering a circular area. The optimal communication distance of the experimental platform was 50 m, and the network time period was 10 s. The node received, sent, and processed data at 0.6 s/round. Equation (11) had an energy ratio of 0.8 and a BCH selection threshold of 0.3, which led to α = 0.6 , β = 0.2 , γ = 0.2 in Equation (13) of the temporary network routing. In Algorithm 1, Equation (18) for selecting the cluster center led to μ = 0.3 , η = 0.5 , γ = 0.2 , and ω = 0.2 in Equation (20); the cluster center iteration threshold was 0.1, and the network reorganization evaluation function threshold was set to 8. The experiment was carried out 15 times, and the average experimental results are shown in Figure 14. The experimental results show that the KFNS algorithm provides better performance than the other algorithms because it solves practical problems in stages.

5. Conclusions

A large amount of equipment is required for environmental monitoring during the marine development process. However, in the process of recycling marine monitoring equipment, due to the influence of natural factors such as currents and tides, the network is unevenly distributed, leading to communication delay and packet loss. Due to the complexity of the marine environment, the energy storage of monitoring equipment is limited and cannot be supplemented. This brings difficulties and challenges to the recycling of marine equipment.
In this paper, a clustering algorithm for WSNs based on the k-means algorithm and FLS was proposed for the recovery of marine observation beacons. The KFNS algorithm was divided into three phases: monitoring, cluster routing, and recovery. In the monitoring phase, network consumption was reduced, and network energy was saved to the maximum extent. In the cluster routing phase, according to the real-time requirements of the system and the location information of the boundary nodes, the clustering size and the initial clustering center were determined, which reduced the number of cluster iterations and made the clustering more practical. In the process of CH selection, the optimal cluster center location, and the energy difference between common nodes and boundary nodes were considered comprehensively. In the recovery phase, a fuzzy model was used to calculate the weight between nodes, and the CH was selected. The Dijkstra algorithm and DFS were used to determine the optimal recovery path of the nodes. The proposed KFNS algorithm has three main advantages over other methods. Firstly, centralized and distributed algorithms improve the design procedures and increase the practicality of the algorithm’s practical application. Secondly, the algorithm proposed in this paper has a lower requirement for node hardware and it reduces production costs. Thirdly, fuzzy rules can break through the limitations of traditional assessment methods. The simulation and experimental results showed that the proposed KFNS algorithm has lower network consumption, a longer network lifetime, and a more efficient recovery strategy.
For marine monitoring equipment recycling scenarios, collaboration between multiple BSs leads to information intersections and repetitions. Therefore, in the future, we will further study the information sharing of multi-base station cooperation. The path planning problem of multiple BSs is also one of the future research directions.

Author Contributions

The authors of this paper were Z.Z., S.Q., and S.L. They proposed relevant methods and conducted experiments and data analysis. S.Q. put forward constructive suggestions in the algorithm. Z.Z. contributed a certain amount of work in simulation analysis and circuit design. S.L. participated in the experimental process.

Funding

This research was supported by the Fundamental Research Funds for the Central Universities (grant No. 201964014).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen:, J.; Zhang, W.; Wan, Z.; Li, S.; Huang, T.; Fei, Y. Oil spills from global tankers: Status review and future governance. J. Clean. Prod. 2019, 227, 20–32. [Google Scholar] [CrossRef]
  2. Beyer, J.; Trannum, H.C.; Bakke, T.; Hodson, P.V.; Collier, T.K. Environmental effects of the Deepwater Horizon oil spill: A review. Mar. Pollut. Bull. 2016, 110, 28–51. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Wang, X.; Wei, D.; Wei, X.; Cui, J.; Pan, M. HAS(4): A Heuristic Adaptive Sink Sensor Set Selection for Underwater AUV-Aid Data Gathering Algorithm. Sensors 2018, 18, 4110. [Google Scholar] [CrossRef] [PubMed]
  4. Izadi, D.; Abawajy, J.H.; Ghanavati, S.; Herawan, T. A data fusion method in wireless sensor networks. Sensors 2015, 15, 2964–2979. [Google Scholar] [CrossRef]
  5. Feng, T.; Li, W.; Hwang, M. False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey. Int. J. Netw. Secur. 2015, 17, 229–236. [Google Scholar]
  6. Xu, G.; Shi, Y.; Sun, X.; Shen, W. Internet of Things in Marine Environment Monitoring: A Review. Sensors 2019, 19, 1711. [Google Scholar] [CrossRef] [PubMed]
  7. Han, G.; Liu, L.; Chan, S.; Yu, R.; Yang, Y. HySense: A hybrid mobile crowdsensing framework for sensing opportunities compensation under dynamic coverage constraint. IEEE Commun. Mag. 2017, 55, 93–99. [Google Scholar] [CrossRef]
  8. Moroni, D.; Pieri, G.; Salvetti, O.; Tampucci, M.; Domenici, C.; Tonacci, A. Sensorized buoy for oil spill early detection. In Proceedings of the Oceans 2015—Genova, Genova, Italy, 18–21 May 2015; pp. 1–5. [Google Scholar]
  9. Xu, J.; Liu, P.; Wang, H.; Lian, J.; Li, B. Marine Radar Oil Spill Monitoring Technology Based on Dual-Threshold and C-V Level Set Methods. J. Indian Soc. Remote Sens. 2018, 46, 1949–1961. [Google Scholar] [CrossRef]
  10. Sun, S.; Hu, C. The Challenges of Interpreting Oil-Water Spatial and Spectral Contrasts for the Estimation of Oil Thickness: Examples from Satellite and Airborne Measurements of the Deepwater Horizon Oil Spill. IEEE Trans. Geosci. Remote Sens. 2019, 57, 2643–2658. [Google Scholar] [CrossRef]
  11. Yu, F.; Hu, X.; Dong, S.; Liu, G.; Zhao, Y.; Chen, G. Design of a low-cost oil spill tracking buoy. J. Mar. Sci. Technol. 2018, 23, 188–200. [Google Scholar] [CrossRef]
  12. Wu, H.; Mei, X.; Chen, X.; Li, J.; Wang, J.; Mohapatra, P. A novel cooperative localization algorithm using enhanced particle filter technique in maritime search and rescue wireless sensor network. ISA Trans. 2018, 78, 39–46. [Google Scholar] [CrossRef] [PubMed]
  13. Wu, H.; Xian, J.; Wang, J.; Khandge, S.; Mohapatra, P. Missing data recovery using reconstruction in ocean wireless sensor networks. Comput. Commun. 2018, 132, 9. [Google Scholar] [CrossRef]
  14. Zou, T.; Li, Z.; Li, S.; Lin, S. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks. Sensors 2017, 17, 1028. [Google Scholar] [Green Version]
  15. Huang, M.; Liu, A.; Xiong, N.; Wang, T.; Vasilakos, A.V. A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 317–332. [Google Scholar] [CrossRef]
  16. Chandrawanshi, V.S.; Tripathi, R.; Pachauri, R. An intelligent energy efficient clustering technique for multiple base stations positioning in a wireless sensor network. J. Intell. Fuzzy Syst. 2019, 36, 2409–2418. [Google Scholar] [CrossRef]
  17. He, S.; Chen, J.; Jiang, F.; Yau, D.K.Y.; Xing, G.; Sun, Y. Energy Provisioning in Wireless Rechargeable Sensor Networks. IEEE Trans. Mob. Comput. 2013, 12, 1931–1942. [Google Scholar] [CrossRef]
  18. Han, G.; Liu, L.; Jiang, J.; Shu, L.; Hancke, G. Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2015, 13, 135–143. [Google Scholar] [CrossRef]
  19. Chen, J.; Li, J.; Lai, T. Trapping Mobile Targets in Wireless Sensor Networks: An Energy-Efficient Perspective. IEEE Trans. Veh. Technol. 2013, 62, 3287–3300. [Google Scholar] [CrossRef]
  20. Yousefi, H.; Malekimajd, M.; Ashouri, M.; Movaghar, A. Fast aggregation scheduling in wireless sensor networks. IEEE Trans. Wirel. Commun. 2015, 14, 3402–3414. [Google Scholar] [CrossRef]
  21. Shurman, M.M.; Al-Mistarihi, M.F.; Harb, S. An Energy-Efficient Coverage Aware Clustering Mechanism for Wireless Sensor Networks. In Proceedings of the 5th International Conference on Communications, Computers and Applications (MIC-CCA 2012), Istanbul, Turkey, 12–14 October 2012; pp. 154–158. [Google Scholar]
  22. Shurman, M.M.; Al-Mistarihi, M.F.; Alsaedeen, M.; Drabkh, K.; Ababnah, A. Hierarchal Clustering Using Genetic Algorithm in Wireless Sensor Networks. In Proceedings of the 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO2013), Opatija, Croatia, 20–24 May 2013; pp. 479–483. [Google Scholar]
  23. Yin, K.; Zhong, C. Data collection in wireless sensor networks. In Proceedings of the IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, China, 15–17 September 2011; pp. 98–102. [Google Scholar]
  24. Lu, J.; Zhang, B.; Xu, L. A data correlation-based wireless sensor network clustering algorithm. In Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, China, 22–24 October 2010; pp. 61–65. [Google Scholar]
  25. Shurman, M.M.; Alomari, Z.M.; Mhaidat, K.M. An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks. Wirel. Eng. Technol. 2014, 5, 62–73. [Google Scholar] [CrossRef] [Green Version]
  26. Hamzah, A.; Shurman, M.; Al-Jarrah, O.; Taqieddin, E. Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors 2019, 19, 561. [Google Scholar] [CrossRef] [PubMed]
  27. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  28. Lindsey, S. PEGASIS: Power efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference Proceedings, Big Sky, MT, USA, 9–16 March 2002; pp. 1125–1129. [Google Scholar]
  29. Ihsan, A.; Saghar, K.; Fatima, T.; Hasan, O. Formal comparison of LEACH and its extensions. Comput. Stand. Interfaces 2019, 62, 119–127. [Google Scholar] [CrossRef]
  30. Qing, L.; Zhu, Q.; Wang, M. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks. Comput. Commun. 2006, 29, 2230–2237. [Google Scholar] [CrossRef]
  31. Ahmad, M.; Li, T.; Khan, Z.; Khurshid, F.; Ahmad, M. A Novel Connectivity-Based LEACH-MEEC Routing Protocol for Mobile Wireless Sensor Network. Sensors 2018, 18, 4278. [Google Scholar] [CrossRef] [PubMed]
  32. Li, C.; Ye, M.; Chen, G.; Wu, J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7–10 November 2005; pp. 597–604. [Google Scholar]
  33. Zhang, R.; Cao, J. Uneven Clustering Routing Algorithm for Wireless Sensor Networks Based on Ant Colony Optimization. J. Xi’An Jiaotong Univ. 2010, 44, 33–38. [Google Scholar]
  34. Ding, Y.; Ding, Y.; Yu, C.; Li, W. An Energy-Efficient Clustering Routing Algorithm with Improved Quality of Cluster in Wireless Sensor Networks. Chin. J. Sens. Actuators 2012, 25, 258–262. [Google Scholar]
  35. Park, G.Y.; Kim, H.; Jeong, H.W.; Youn, H.Y. A Novel Cluster Head Selection Method based on K-means Algorithm for Energy Efficient Wireless Sensor Network. In Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013; pp. 910–915. [Google Scholar]
  36. Sert, S.A.; Alchihabi, A.; Yazici, A. A Two-Tier Distributed Fuzzy Logic Based Protocol for Efficient Data Aggregation in Multihop Wireless Sensor Networks. IEEE Trans. Fuzzy Syst. 2018, 26, 3615–3629. [Google Scholar] [CrossRef]
  37. Jesudurai, S.A.; Senthilkumar, A. An improved energy efficient cluster head selection protocol using the double cluster heads and data fusion methods for IoT applications. Cogn. Syst. Res. 2019, 57, 101–106. [Google Scholar] [CrossRef]
  38. Li, L.; Li, D. An Energy-Balanced Routing Protocol for a Wireless Sensor Network. J. Sens. 2018, 5, 8505616. [Google Scholar] [CrossRef]
  39. Pamucar, D.; Ljubojevic, S.; Kostadinovic, D.; Dorovic, B. Cost and risk aggregation in multi-objective route planning for hazardous materials transportation-A neuro-fuzzy and artificial bee colony approach. Expert Syst. Appl. 2016, 65, 15. [Google Scholar] [CrossRef]
  40. Ebrahimi, H.; Milos, T. Optimization of dangerous goods transport in urban zone. Decis. Mak. Appl. Manag. Eng. 2018, 1, 131–152. [Google Scholar] [CrossRef]
  41. Zhang, L.; Yang, W.; Rao, Q.; Nai, W.; Dong, D. An energy saving routing algorithm based on Dijkstra in wireless sensor networks. J. Inf. Comput. Sci. 2013, 10, 2087–2096. [Google Scholar] [CrossRef]
  42. Razzaq, M.; Shin, S. Fuzzy-Logic Dijkstra-Based Energy-Efficient Algorithm for Data Transmission in WSNs. Sensors 2019, 19, 1040. [Google Scholar] [CrossRef] [PubMed]
  43. Simon, M.; Iveta, D.L.; Huraj, L.; Pospichal, J. Multi-Hub Location Heuristic for Alert Routing. IEEE Access 2019, 7, 40369–40379. [Google Scholar] [CrossRef]
  44. Periyasamy, S.; Khara, S.; Thangavelu, S. Balanced Cluster Head Selection Based on Modified k-Means in a Distributed Wireless Sensor Network. Int. J. Distrib. Sens. Netw. 2016, 12, 5040475. [Google Scholar] [CrossRef]
  45. Arjunan, S.; Sujatha, P. Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Appl. Intell. 2018, 48, 2229–2246. [Google Scholar] [CrossRef]
  46. Shelby, Z.; Pomalaza-Ráez, C.; Karvonen, H.; Haapola, J. Energy Optimization in Multihop Wireless Embedded and Sensor Networks. Int. J. Wirel. Inf. Netw. 2005, 12, 11–21. [Google Scholar] [CrossRef]
  47. Guezouli, L.; Barka, K.; Bouam, S.; Bouhta, D.; Aouti, S. Mobile sensor nodes collaboration to optimize routing process based mobility model. In Proceedings of the 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, 1–4 November 2017; pp. 1–5. [Google Scholar]
  48. Rida, M.; Makhoul, A.; Harb, H.; Laiymani, D.; Barharrigi, M. EK-means: A new clustering approach for datasets classification in sensor networks. Ad. Hoc. Netw. 2019, 3, 158–169. [Google Scholar] [CrossRef]
  49. Han, G.; Yang, X.; Liu, L.; Zhang, W. A joint energy replenishment and data collection algorithm in wireless rechargeable sensor networks. IEEE Internet Things J. 2018, 5, 2596–2604. [Google Scholar] [CrossRef]
  50. Zhu, E.; Li, P.; Ma, Z.; Li, X.; Liu, F. Effective and Optimal Clustering Based on New Clustering Validity Index. In Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanjing, China, 9–11 May 2018; pp. 529–534. [Google Scholar]
  51. Zhang, M.; Duan, K. Improved Research to K-means Initial Cluster Centers. In Proceedings of the 2015 Ninth International Conference on Frontier of Computer Science and Technology, Dalian, China, 26–28 August 2015; pp. 349–353. [Google Scholar]
  52. Ioffe, S.; Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv 2015, arXiv:1502.03167. [Google Scholar]
Figure 1. Schematic diagram of marine environmental buoy monitoring.
Figure 1. Schematic diagram of marine environmental buoy monitoring.
Sensors 19 03726 g001
Figure 2. Node communication model.
Figure 2. Node communication model.
Sensors 19 03726 g002
Figure 3. K-means algorithm and fuzzy logic system (KFNS) workflow at each stage.
Figure 3. K-means algorithm and fuzzy logic system (KFNS) workflow at each stage.
Sensors 19 03726 g003
Figure 4. KFNS algorithm flow chart.
Figure 4. KFNS algorithm flow chart.
Sensors 19 03726 g004
Figure 5. Fuzzy system model.
Figure 5. Fuzzy system model.
Sensors 19 03726 g005
Figure 6. Membership functions of the fuzzy sets. (a) Energy; (b) D i C H ; (c) D i j ; (d) D B S ; (e) fuzzy output variable weight; (f) fuzzy output variable CH.
Figure 6. Membership functions of the fuzzy sets. (a) Energy; (b) D i C H ; (c) D i j ; (d) D B S ; (e) fuzzy output variable weight; (f) fuzzy output variable CH.
Sensors 19 03726 g006
Figure 7. (a) The curves of dead node number by rounds; (b) network energy consumption; (c) number of cluster heads and boundary nodes.
Figure 7. (a) The curves of dead node number by rounds; (b) network energy consumption; (c) number of cluster heads and boundary nodes.
Sensors 19 03726 g007
Figure 8. (a) The curves of dead node number by rounds; (b) network energy consumption; (c) number of cluster heads and boundary nodes.
Figure 8. (a) The curves of dead node number by rounds; (b) network energy consumption; (c) number of cluster heads and boundary nodes.
Sensors 19 03726 g008
Figure 9. (a) The curves of dead node number by rounds; (b) network energy consumption.
Figure 9. (a) The curves of dead node number by rounds; (b) network energy consumption.
Sensors 19 03726 g009
Figure 10. Path comparison of different recycling strategies. (a) Optimal path.; (b) Optimal energy; (c) KFNS algorithm.
Figure 10. Path comparison of different recycling strategies. (a) Optimal path.; (b) Optimal energy; (c) KFNS algorithm.
Sensors 19 03726 g010
Figure 11. Comparison of recycling efficiency.
Figure 11. Comparison of recycling efficiency.
Sensors 19 03726 g011
Figure 12. Comparison of node recovery results. (a) Single-hop coverage. (b) Multi-hop coverage.
Figure 12. Comparison of node recovery results. (a) Single-hop coverage. (b) Multi-hop coverage.
Sensors 19 03726 g012
Figure 13. Beacon structure.
Figure 13. Beacon structure.
Sensors 19 03726 g013
Figure 14. Comparison of network lifetime of each algorithm: (a) single-hop network environment; (b) multi-hop network environment; (c) network routing phase.
Figure 14. Comparison of network lifetime of each algorithm: (a) single-hop network environment; (b) multi-hop network environment; (c) network routing phase.
Sensors 19 03726 g014
Table 1. Linguistic variables.
Table 1. Linguistic variables.
Energy D i j D B S D i C H
LowCloseCloseClose
MediumMediumMediumMedium
HighFarFarFar
Table 2. Linguistic variables.
Table 2. Linguistic variables.
No.InputOutput
Energy D i C H D i j D B S WeightCH
1LowCloseCloseCloseLowHMid
2LowCloseMediumMediumHMidMid
3LowCloseFarFarHighLMid
4LowMediumCloseCloseLowLMid
5LowMediumMediumMediumLMidLow
6LowMediumFarFarMidVLow
7LowFarCloseCloseVLowLMid
8LowFarMediumMediumVLowLow
9LowFarFarFarLowVLow
10MediumCloseCloseCloseHMidHigh
11MediumCloseMediumMediumHighHMid
12MediumCloseFarFarVHighMid
13MediumMediumCloseCloseHMidMid
14MediumMediumMediumMediumHighLMid
15MediumMediumFarFarVHighLow
16MediumFarCloseCloseVLowLMid
17MediumFarMediumMediumLowLow
18MediumFarFarFarLMidVLow
19HighCloseCloseCloseMidVHigh
20HighCloseMediumMediumHMidHigh
21HighCloseFarFarVHighHMid
22HighMediumCloseCloseMidHMid
23HighMediumMediumMediumHighMid
24HighMediumFarFarVHighLMid
25HighFarCloseCloseLowHigh
26HighFarMediumMediumLMidMid
27HighFarFarFarHMidLMid
Table 3. Simulation parameters.
Table 3. Simulation parameters.
Parameter NameParameter Value
Single-hop network size ( R s ) 30   m × 30   m × π
Multi-hop network size ( R m ) 100   m × 100   m × π
Number of nodes ( n ) 100
Initial energy ( E 0 ) E i = E 0 × ( 0.9 + r a n d ( 0.1 ) ) , E 0 = 5
Communication range of sensors ( r ) 60 m
Time for each round ( T ) 10 s
Speed range ( V l )1–5 m/s
Energy consumption of transmission circuit ( E e l e c ) 50 n j / b i t
Amplifier parameter for free-space model ( E ε f s ) 10 p j / b i t / m 2
Amplifier parameter for multi-path model ( ε m p ) 0.0013 p j / b i t / m 4

Share and Cite

MDPI and ACS Style

Zhang, Z.; Qi, S.; Li, S. Marine Observation Beacon Clustering and Recycling Technology Based on Wireless Sensor Networks. Sensors 2019, 19, 3726. https://doi.org/10.3390/s19173726

AMA Style

Zhang Z, Qi S, Li S. Marine Observation Beacon Clustering and Recycling Technology Based on Wireless Sensor Networks. Sensors. 2019; 19(17):3726. https://doi.org/10.3390/s19173726

Chicago/Turabian Style

Zhang, Zhenguo, Shengbo Qi, and Shouzhe Li. 2019. "Marine Observation Beacon Clustering and Recycling Technology Based on Wireless Sensor Networks" Sensors 19, no. 17: 3726. https://doi.org/10.3390/s19173726

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop