You are currently on the new version of our website. Access the old version .
SensorsSensors
  • Article
  • Open Access

11 October 2019

A New Centralized Clustering Algorithm for Wireless Sensor Networks

,
,
,
and
1
Department of Telecommunication Engineering, Universidad de Jaén, 23100 Linares, Spain
2
Department of Statistics and Operational Research, Universidad de Jaén, 23100 Linares, Spain
3
Department of Electrical Engineering, Universidad de Málaga, 29071 Málaga, Spain
*
Author to whom correspondence should be addressed.
This article belongs to the Section Sensor Networks

Abstract

Clustering is presently one of the main routing techniques employed in randomly deployed wireless sensor networks. This paper describes a novel centralized unequal clustering method for wireless sensor networks. The goals of the algorithm are to prolong the network lifetime and increase the reliability of the network while not compromising the data transmission. In the proposed method, the Base Station decides on the cluster heads according to the best scores obtained from a Type-2 Fuzzy system. The input parameters of the fuzzy system are estimated by the base station or gathered from the network with a careful design that reduces the control message exchange. The whole network is controlled by the base station in a rounds-based schedule that alternates rounds when the base station elects cluster heads, with other rounds in which the cluster heads previously elected, gather data from their contributing nodes and forward them to the base station. The setting of the number of rounds in which the Base Station keeps the same set of cluster heads is another contribution of the present paper. The results show significant improvements achieved by the proposal when compared to other current clustering methods.

1. Introduction

Wireless Sensor Networks (WSN) are composed of multiple nodes, which are deployed randomly in most situations. Although there are some commercial solutions for this kind of network in e-health, smart grids or surveillance [1], there are still some technological aspects that could be addressed to improve their performance. Presently, their main failing is the durability of the network in an autonomous and reliable way. For this reason, there are several proposals to reduce the energy consumption of the nodes while it operates correctly. This energy consumption is mainly caused by the data gathering and the data transmission.
The formation of groups or clusters in this kind of network helps in the reduction of the energy dissipation during the data transmission especially when considering scalability and robustness [2]. As a consequence, the network autonomous lifetime (without the need for replacing the nodes’ batteries) is prolonged when clustering is conveniently applied. In a cluster, there is a node, referred to as the Cluster Head (CH), which is in charge for the communication with other CHs or with the Base Station. It recollects the data from the nodes belonging to its cluster, it aggregates this information and then proceeds to send it to the Base Station (BS). The base station or sink decides the actions to take according to the data.
The decision about which nodes are the CHs can be taken centrally by the BS or in a distributed mode by the sensor nodes. Centralized clustering algorithms demonstrated their ability to have an optimal behaviour in comparison with their distributed counterparts as more information can be used to create the clusters appropriately [3].
Another important issue related to clustering is how long the cluster structure is going to be maintained. The initial proposals on clustering algorithms set that the clusters should be periodically formed. In particular, they opted for deciding about the CHs in each round. A round is the interval of time into which the network lifetime is divided. In a round, the inter-cluster communication, the data fusion/aggregation and the intra-cluster communication sequentially take place to send the measurements to the BS. Therefore, the first proposals (e.g., LEACH-C [4]) included the determination of the CHs at the beginning of each round.
An alternative and novel approach consists of including the execution of the selection of the CHs only in some rounds. The skip stands for the number of rounds in which the cluster heads will be kept [5]. The work in [5] sets the skip as a constant parameter and equal to 2. However, the appropriate value for this parameter is related to the network density, the nodes’ positions and the traffic pattern.
In the present paper, we propose a novel centralized clustering algorithm that decides the cluster heads while it sets an optimized skip. The algorithm, named as “Centralized Skip Based Algorithm” or CSBA, is based on two hypotheses. The first hypothesis, or H1, relies on the fact that when a CH is conveniently elected, maintaining it during some rounds will make the network lifetime longer as the control information (and the consumption related to the transmission and reception of these frames) does not need to be exchanged. However, the second hypothesis on which CSBA is based, or H2, is that keeping a node as a CH indefinitely degrades the network performance in terms of reliability, that is, not all the measurements are collected from the nodes. This happens because the node acting as CH will receive information from the nodes which are ascribed to it. As a consequence, the energetic dissipation of this node increases, especially when this operation is prolonged over several rounds. The measurements that should be collected by this node cannot be guaranteed to be transmitted. In our proposal, the selection of the cluster heads is modelled by a Type-2 Fuzzy system incorporated into the Base Station. Then, the skip is set by an experimental evaluation of the network performance in terms of reliability and durability. The implementation of the technique demonstrates the extension of the network lifetime when compared with other clustering algorithms. Therefore, this paper presents the following contributions:
  • The demonstration of the benefits obtained when a skip is set. As described in hypothesis H1, a carefully selected skip value significantly improves the lifetime of a WSN.The paper also verifies that nodes elected as CHs cannot keep this role for an undetermined period because they will deplete their batteries prematurely and degrade network reliability. This last behaviour is compliant with hypothesis H2.
  • The definition and validation of a Type-2 fuzzy system to manage the uncertainty of the network information when deciding the CHs with reduced control messages.
  • The proposed algorithm was tested in a wide set of scenarios and compared with a significant number of clustering algorithms.
The rest of the paper is structured as follows. The next section presents a review and a classification on the algorithms used to select the CHs. Section 3 describes the proposed fuzzy system, giving a detailed explanation about how this system was designed. Section 4 describes the simulation results obtained to evaluate the proposed algorithm. Finally, Section 5 includes the conclusions and the future research guidelines.

3. Proposed Method

The proposed method is a centralized algorithm that combines the decision about the CHs and the skip setting. The selection of the CHs is made by the identification of the best scores obtained from the inferred results of a fuzzy system. The BS runs this system applied to each node. The inputs for each fuzzy system are parameters that the base station gathers or estimates from the information obtained from the network. The output score ranges from 0 to 1. Thus, the BS manages the network in a rounds-based schedule that updates the score of the nodes after a variable interval of rounds called s k i p . The exact round scheduling is detailed in Section 3.2.
As previously commented, the way that the BS sorts the nodes to elect the CHs is based on the output of a Type-2 Fuzzy inference system (T2FIS) or score. Precisely, a high value implies a high probability of converting a node into a CH. Finally, the BS only selects k nodes with the highest value to be CH and informs all the nodes of their role: cluster head or contributing node. The T2FIS is explained in the next section. The parameter k is set in the configuration process.
Concerning the skip configuration, this parameter is set in the configuration phase of the WSN. The goal of this setting is obtaining a good performance of the network in terms of reliability (making all the measurements from all the sensors available as long as possible) and durability (keeping the functionality of most sensors).

3.1. Node Scoring

The fuzzy system used to infer a score for each node is a Type-2 one. This kind of artificial intelligence is especially suitable for WSN, in which there is no mathematical function to model its performance and in which the uncertainty degree is really high. Type-2 Fuzzy sets also work better in those applications whose input variables also have uncertainty because they could be estimations from measurements with a high level of tolerance. In WSN, it is necessary to rely on estimations to decrease the control information exchanged among the nodes and, as a consequence, the consumption due to the control tasks is jointly decremented. Type-2 Fuzzy systems are also applied in other technological fields such as decision in Mobile Ad hoc Networks [17], risk analysis in Marine Power [18], wireless indoor location [19] and PID control [20].
The block diagram of a Type-2 Fuzzy inference system is shown in Figure 2. As can be noticed, Type-2 Fuzzy systems differ from Type-1 systems only in the output processing block. Each input is fuzzified before entering into the inference system, that is connected to the knowledge base. The knowledge base includes the rules that link input and output variables to be used by the output processor. This last block differs from the Type-1, because the reducer is added before the final defuzzification is accomplished. Besides, the output of the T2FIS is an interval ( s l , s h ) instead of a crisp value obtained by a Type-I fuzzy system. Both limits of the interval are used when computing the best CHs according to the following rule: if the node was elected as CH in the previous round, then the lowest value of the interval, s l , is chosen for a comparison operation. Otherwise, the highest value of the interval, s h , is used in the comparison. This strategy was followed in some previous works such as [5,15]. This rule avoids that a node with a high output value could be selected continuously as a CH. This setting should be avoided as it would eventually deplete its battery.
Figure 2. Block diagram of Type-2 fuzzy logic (T2FIS).
The input variables of the T2FIS was carefully selected to achieve an efficient balance between energy consumption, performance and reliability (availability of the measurements from all the sensors in the network). Therefore, the input variables captures the evolution of the energy spent in every node and the behaviour of each node. Consequently, the T2FIS was designed with the following input variables:
  • Residual Energy ( R i ) of node i, measured as the ratio between the current energy and the initial energy of each node. The current energy of a node is estimated by the BS basing on the energy consumption model explained in Section 3.3.
  • Normalized Distance ( D i ), computed as the distance from the BS to the node i divided into the maximum one.
  • The degree of deviation of the energy ( D D E i ) in a node i ( R i ) compared with the average energy of all the alive nodes ( R a ). As the input variable of the fuzzy system must be kept between 0 and 1, this ratio is normalized according to Equation (1). Nodes with a high residual energy charge could saturate this value. For the normalization of D D E i , the value 1.5 was set because it is assumed that a node with more than the 50% of the average energy should be a good candidate to be elected as CH and it is desirable to avoid higher levels of unbalanced battery charges in the network.
    D D E i = 1 i f R i 1.5 × R a R i 1.5 R a i f R i < 1.5 × R a
  • Normalized number of rounds without being a CH ( R n o C H i ). It is defined as the number of rounds without being CH ( r o u n d s n o C H i ) compared with a threshold ( R n o C H t h ). This input is established according to Equation (2).
    R n o C H i = 1 i f r o u n d s n o C H i R n o C H t h r o u n d s n o C H i R n o C H t h i f r o u n d s n o C H i < R n o C H t h
    where r o u n d s n o C H i is zero when the node i is elected as a CH and is incremented by one in each round in the opposite case.
This set of input variables makes the T2FIS exportable to a wide range of applications because they are application independent. Other parameter such as the on duty or idle periods or the rate of event detection could be considered in the configuration phase but without altering the T2FIS. As it will be discussed in the next section, the duration of a round could be adjusted for this purpose.
These variables, all of them normalized between 0 and 1, are the input of the fuzzy system depicted in Figure 2. Each of these variables are fuzzified with the Type-2 member function layouts that are depicted in Figure 3.
Figure 3. Membership functions of interval type-2 fuzzy system.
Once they are fuzzified, the values will interrelate between them through the knowledge base that contains the IT-THEN rules of the expert system. Each rule is defined as follows: IF R i is V a l u e 1 and D i is V a l u e 2 and D D E i is V a l u e 3 and R n o C H i is V a l u e 4 , THEN s c o r e i is Output Value, where V a l u e s 1 , V a l u e 2 , V a l u e 3 and V a l u e 4 belong to l o w , m e d i u m , h i g h as shown in Figure 3. The Output Value belongs to very low (VL), low (L), medium (M), high (H), very high (VH) as illustrated in Figure 4.
Figure 4. Output Membership functions of interval Type-2 fuzzy system.
The rule base designed for the proposed method (see Table 1) is composed of 81 rules and, as can be observed, the effect of the qualitative value of each variable in the output score is different. For instance, high values of distance variable D i affect more negatively in the score than low values of residual energy R i due to the higher cost of long range communications compared with the threat of a low battery charge. Consequently, if rule 1 (L L L L -> L) is compared with rule 73 (H H L L -> VL), the output scores differ even when they share the same values for D D E i and R n o C H i . For rule 1, the output is L however being far from the BS is penalized as modelled by rule 73. In rule 73, the output score is VL because D i is also high (a node far from the BS) even if the node has an almost full battery ( R i is high). In the case of input variable R n o C H , its purpose is trying to achieve a good score even in the worst conditions (low battery and long distances e.g., rules 12, 15 or 21) for nodes that have not been CH for several rounds, whereas D D E i tries to exclude nodes that are supposed to be bad CHs candidates when the average available energy in the network is still high (e.g., rules 25–27 or 79–80).
Table 1. Rule base for the type-2 fuzzy controller.
The fuzzy system is a Mamdani one, in which the output variable is also a Type-2 fuzzy set like in Figure 4.
In the last block of the T2FIS (see Figure 2), the defuzzification is made and the output interval for the score ( s l , s h ), is obtained. Then, the intervals obtained for each node are used by the BS to elect the CHs accordingly to the process outlined in the next section.

3.2. Cluster Head Election Algorithm

As previously commented, the BS rules the network in a round-based schedule to minimize the message exchange necessary to decide the CHs and, as a result, the energy consumption of the nodes is reduced.
The overall process has two main phases: an initial setup phase and an operation round-based phase. This rounds-based scheduling must be synchronized with the desired event detection or measurement rate in order to fullfil the application requirements. Hence, the duration of any round must be carefully set to effectively detect the events or measure the physical magnitude under study. However, the time chosen for a round does not impact on the proposed algorithm because the energy spent in idle periods or node measurement is taken into account by variables R i and D D E i respectively. Thus, the design of the algorithm allows that the WSN has an effective adaptation to the timing requirements.
Once the initial setup is accomplished (see below for further details), the BS begins the operation phase. First, in order to elect the set of CHs for a round, it has to infer the scores for each node. Once it knows the scores for each node, it chooses the k nodes with the highest score to convert them into CH. To do so, it broadcasts that information to the network. The election of the next CHs is skipped a certain number of rounds (defined by the s k i p parameter), which is set by the BS in the initial phase. The different steps of the overall process are depicted in Figure 5 and detailed as follows.
Figure 5. Proposed algorithm.
Initial Setup
In the initial phase, the BS broadcasts a startup message to all the nodes in the covered area. Next, the nodes send to the BS a message at maximum power so that the BS candetermine the distance of each node to it. For this determination, the Received Signal Strength Indicator (RSSI) is used. Due to the method design, the exact position, and its corresponding hardware, is not needed as the system can work with an approximation thanks to the Type-2 fuzzy system. All the nodes hear this message and their replies so that they can compute the distances to the rest of the nodes too. In this way, in a future phase they can decide which node is the nearest CH.
CHs Selection
This is the first step of the operation phase. The BS computes the score value for all the nodes with the T2FIS. For previous CHs, the score corresponds to the lower limit in the output interval obtained by the T2FIS. Alternatively, for non-CHs, the score is the higher limit of the T2FIS output. With this selection of the score, we aim at assigning the role of CHs to most nodes during the complete WSN lifetime. In this way, a fair energy consumption is possible. Once the BS computes all the scores, it selects the best k nodes (according to their scores) to nominate them as CHs with a future message. The value of k indicates the optimal number of cluster heads. It was established in the 5 % of the total number of nodes as was recommended in [4].
Cluster Configuration
The BS sends a broadcast message indicating which nodes are CH to all the nodes. With this message, the nodes join to the closest CH. The number of nodes in a cluster is not the same for all the structures, so the proposal is considered an unequal clustering method. The nodes joining a cluster adjusts their power transmission in order to just communicate with their corresponding CH.
Data Gathering
With this information, the rest of the nodes will send their information to the nearest CH. Each CH aggregates the data from the ascribed nodes, in such a way that it can also inform the BS if a node is not ascribed (death of a node). Additional information about the residual energy is also sent, so that the BS does not have to estimate those values for a future CH selection.
Skip Loop Iteration
In our proposal all the nodes are maintained as CHs during a s k i p number of rounds. In this phase, the BS updates a counter each time it receives information from the CHs. Once the counter equals the s k i p value, the BS steps on a new calculation of the scores of each node to restart the operation phase.

3.3. Computation of the Skip Value

The s k i p parameter tries to model the inertia of the network avoiding unnecessary CHs updates. In a previous work [5,15], we detected that the CHs election process tends to throw the same results from one round to the following one. Thus, it is commonly unnecessary to recompute the CHs. Consequently, we added the s k i p parameter to find a trade off between the consumption of the communications and the CHs actualization.
When determining the optimal value for the s k i p parameter, it is necessary to know the metrics used in wireless sensor networks, which are mainly referred to the lifetime of the network. The most used three parameters checked in the WSN analysis are (i) the round when the first node dies o First Node Dies ( F N D ), (ii) the round when at least half of the nodes are death or Half Nodes Death ( H N D ), and (iii) the round when the last node dies or Last Node Dies ( L N D ). Depending on the application requirements, it will be of interest to favour one of these metrics or all of them. For instance, in the case of medical sensors the first death should be used, because a bad working of the network could imply lost measurements with severe consequences on the health’s patient. In other scenarios, like a WSN to measure/control the humidity of a terrain, the first death is not relevant because the WSN usually counts on with redundant sensors. If a high precision is not required, the other two performance metrics could be enough in this kind of application.
The computation of the optimal value for the s k i p parameteris going to be done through simulation. For this, the energy model to simulate data communications follows the first order radio model widely used in the related literature since its proposal in [4]. The model is described with Equations (3)–(5).
E T x ( l , d ) = f ( x ) = l · ( E e l e c + E f s · d 2 ) , d d 0 l · ( E e l e c + E m p · d 4 ) , d > d 0
d 0 = E f s E m p
E R x ( l ) = E e l e c · l
where:
  • l is the number of bits of any message.
  • E e l e c the energy consumed in the transmitter or receiver circuitry for one bit.
  • d is the distance that any message must cover.
  • E f s is the energy consumed by the amplifier in free space model ( d d 0 ) to get an acceptable bit error rate.
  • E m p is the energy consumed by the amplifier in th multi-path (mp) model ( d d 0 ) to obtain an acceptable bit error rate.
When a CH receives data from a contributing node, in addition to the energy spent in receiving the data, the CHs must spend energy in the data aggregation process. Therefore, the amount of energy spent in the reception process of l-bits is defined by Equation (6) for a CH:
E R x D A = ( E e l e c + E D A ) · l
where E D A is the energy spent by the processing unit of a CH when aggregating the data received from a contributing node.
In a similar way to [4], the configuration values for the first order radio model used in Equations (3)–(6) are summarised in Table 2:
Table 2. Parameters for the losses in the first order radio model and data aggregation.
Two other configuration parameters are shown in Table 3. First, parameter k (the desired number of nodes to select by the BS) is calculated based on the estimation presented in [4], as it was previously commented in Section 2. Finally, parameter R n o C H t h was set to 20 based on the value of p and taking into account the amount of nodes in the network. Thus it is assumed that a node should be elected as CH in no more than 20 consecutive rounds (see Equation (2)). In addition the length of the control and the data packets, l c o n t r o l and l d a t a , are 200 bits and 4000 bits respectively. These are common values in most of the research papers about clustering in WSN.
Table 3. Parameter configuration for s k i p estimation.
To effectively calculate the value of the parameter s k i p , it is necessary to estimate the energy spent by normal nodes and by the CHs during that period. Consequently, two equations were developed to model both processes. The energy consumed by a normal node (not elected as CH) during s k i p rounds is modelled by Equation (7):
E s e n s o r = E R x ( l c o n t r o l ) + E T x ( l d a t a , d ) × s k i p ;
It includes the energy cost due to the reception of a control packet (in which the BS informs which nodes are CHs) and the energy cost of sending a data packet multiplied by the number of times that this process must be repeated (the value of the s k i p parameter). After the node joins a CH, it adjusts the transmission power according to the distance to the CH. In this case, we suppose that the distance d is small because normal nodes send the information to their closest CH, not to the BS.
The energy consumed by a node selected as CH is higher as can be noticed in Equation (8). To compute this consumption, we consider that the distance from the CH to the BS is usually greater than the distance to its contributing nodes.
E C H = E R x ( l c o n t r o l ) + E R x D A ( l d a t a ) × X + E T x ( l d a t a , d S B ) × s k i p ;
Apart from the energy cost of the control message from the BS as in Equation (7), it includes the cost of reception and aggregation of X data packets from its contributing nodes, plus the message that must send to the BS each round with the aggregated data. It must be taken into account that the distance to the BS from the CH could be considerable, which converts that factor into the main energy cost.
It is evident that for high values of s k i p , a CH could spend enough energy to deplete its battery, even in the first rounds. This would eventually lead to a really low FND. Therefore, the present approach is based on the best balance between the number of CHs and the s k i p parameter because nodes that are not CH spend much less energy during skipped rounds. The evolution of the average energy spent by the nodes, acting as a normal node and as a CH can be studied in Figure 6. As can be noticed, the effect of being CH is clearly worse in terms of energy consumption when compared with a normal node. Consequently, the election of the value for the s k i p parameter is of paramount importance in CSBA.
Figure 6. Energy consumed by CH and nodes.
As was commented above, to estimate the most appropriate value for the s k i p parameter, an empirical method, based on the simulation of three different scenarios of a wireless sensor network, was applied. All the scenarios are composed of 150 nodes randomly deployed over a deployment field of 100 m × 100 m and the initial energy of each node is set to 0.5 J. The difference among them is the location of the BS which was deployed as follows:
  • Scenario 1. The BS is in position (100, 0) m, that means that it is in the border of the sensing area.
  • Scenario 2. The BS is in position (150, 50) m, that means that it is outside the sensing area.
  • Scenario 3. The BS is in position (50, 50) m, that means that it is in the centre of the sensing area.
To achieve a statistically consistent result for the s k i p value a set of 30 different networks were simulated for any of the scenarios above. The average value of F N D , H N D and L N D obtained for s k i p values from 0 to 140 are shown in Figure 7, Figure 8 and Figure 9.
Figure 7. Round when the first node dies ( F N D ) versus skip.
Figure 8. Round where half of the nodes are dead ( H N D ) versus skip.
Figure 9. Round when at least 90% nodes are dead ( L N D ) versus skip.
The values for F N D , shown in Figure 7 reveals that for the initial increments in the value of the s k i p , an improvement in this metric is achieved. Hence, this behaviour validates the first hypothesis exposed in the introduction. However, for higher values of the s k i p (over 10), this behaviour does not hold and the F N D dramatically deteriorates. This second type of behaviour was also predicted by the second hypothesis mentioned previously.
The values obtained for H N D can be seen in Figure 8. Here it can be observed that, when the s k i p value increases, H N D values also increase, as predicted by the first hypothesis. This improvement is kept nearly constant when skip gets to 100 rounds. This behaviour is coherent with the second hypothesis with which we have been working.
The values obtained for L N D are presented in Figure 9. L N D increases almost linearly as the value of s k i p does, but when the skip gets to 100, L N D is also kept almost unaltered. Consequently, the performance of the metrics confirms the hypothesis exposed in our introduction Section.
As a result, from the analysis of Figure 7, Figure 8 and Figure 9 it can be concluded that the effects of the increase of the skip value is inverse for F N D than for H N D and L N D . This occurs because the energy cost of being CH is much higher than being a contributing node as is depicted in Figure 6. Thus, when the skip value is high, the CHs selected in the initial stages deplete their battery faster than any other node, which eventually drives to a premature F N D value. However, if the CHs are selected more often (low values of skip), the balance of energy is better, but better nodes will die sooner than in other scenarios with higher skip values. Hence, a trade off between a high value of F N D (reliability) and both H N D and L N D (network lifetime) is necessary in order to achieve the best performance of the network and its application.
Therefore, considering reliable applications to be deployed in the WSN, we take into account those three metrics when choosing the value of the skip parameter. Analysing the three metrics altogether, we focus on Figure 7, because F N D is the most restrictive metric. From the simulations results, we set the skip parameter to 7 as the F N D starts to deteriorate for higher values. The behaviour is similar for the three scenarios.

4. Results

The validity of the skip setting is verified with three different configurations related to BS positions corresponding to the scenarios described in the previous section. With these configurations, the algorithm is tested in the three modes commonly evaluated in the literature. The initial energy of each node is 0.5 J.
To check the performance of the proposed Centralized Skip Based Algorithm (CSBA), it is compared with other relevant proposals widely used in the literature. The evaluated algorithms are:
  • A distributed stochastic algorithm referred to as LEACH [4]. In this well-known technique, the nodes have a probability of converting into CH. This probability increases with the number of rounds in which the nodes has not been selected as CH (see Section 2 for further detail).
  • A centralized Type-2 fuzzy system algorithm known as Clustering Routing Protocol for Wireless Sensor Networks Based on Type-2 Fuzzy Logic and ACO (CRT2FLACO) [21]. The nodes that will be CH are selected with a fuzzy system in which the input variables are residual energy, distances to the BS and the number of neighbours. Later, the routers between CH are found using ACO to save energy sending data to the BS from the nodes.
  • A centralized Type-1 fuzzy algorithm known as Cluster Head Election mechanism using Fuzzy logic (CHEF) [11]. A group of nodes is selected that are converted into CH from the output of the fuzzy system, that has residual energy, centrality and the number of near nodes, as inputs.
  • A distributed Type-1 fuzzy system known as EEDCF [12]. In this case, the close nodes coordinate among them to decide the CH. For that operation, they exchange information about the output of the fuzzy system based on the residual energy, the number of close nodes and the average energy of those nodes. These last parameters constitute the inputs of the fuzzy system. The node with the higher output value becomes the CH for the close nodes.
  • A distributed Type-2 Fuzzy system algorithm presented in [5]. The Enhanced Unequal Distributed Type-2 Fuzzy Clustering Algorithm (EUDCF) uses the residual energy, BS distance, the average number of nodes connected to the CH and the number of rounds without being CH as input variables.
These algorithms were implemented in Matlab according to their specifications described in the corresponding papers. The simulations are all run with the same energy model (see Equations (3)–(6)). In order to allow a statistically significant comparison, 30 simulations were made for each of the mentioned algorithms to obtain the average values for F N D , H N D and L N D .
For the first set of simulations, the wireless sensor network corresponds to the Scenario 1. The results are shown in Figure 10. As it is observed, centralized methods get better metrics than the distributed ones. Moreover, the methods based on Type-2 fuzzy logic outperform their counterparts of Type-1. The results obtained by our proposal, CSBA, are the best in terms of F N D , H N D and L N D when compared with all the other methods. Moreover, the result of F N D in CSBA is greater than the L N D value obtained with most methods. This implies that the network performance was improved in terms of reliability and durability when CSBA was applied.
Figure 10. FND, HND and LND for 150 nodes in a 100 m × 100 m area with BS at (100, 0) m.
The simulations performed with the BS outside the covered area, that is, when the BS is at (150, 50) m, are in Figure 11. From these results, we can conclude that the centralized fuzzy systems outperfom the centralized ones. In addition, the Type-2 Fuzzy systems achieve a better performance than the type-I fuzzy systems. We can highlight that CSBA still gets the best results. A similar behaviour is reflected when the BS is at position (50, 50) m. The obtained metrics are in Figure 12.
Figure 11. FND, HND and LND for 150 nodes in a 100 m × 100 m area with BS at (150, 50) m.
Figure 12. FND, HND and LND for 150 nodes in a 100 m × 100 m area with BS at (50, 50) m.

5. Conclusions

In the present paper, we propose a new centralized clustering algorithm based on a Type-2 Fuzzy system. This method schedules the CH selection in a round manner, so that the control message exchange is reduced (executed every ’skip’ rounds) but the data transmission is not compromised. The most appropriate value for the skip parameter was judiciously determined according to the reliability and durability of the network. It was demonstrated that the proposed algorithm outperforms the other tested algorithms (including centralized and distributed methods). The results depicted in Figure 10, Figure 11 and Figure 12 also show that algorithms based on Type-2 Fuzzy system are more capable of adapting to different network layouts when compared with the algorithms that use Type-1 fuzzy systems. Moreover, the centralized clustering algorithms obtained better results than the distributed ones due to the common knowledge that the base station has about the whole network. However, as can be observed in Figure 7, Figure 8 and Figure 9 when achieving higher values of HND and LND with CSBA, FND will suffer a serious decrease. This will impact on the reliability of the network. The value chosen for the skip parameter may not suit other network layouts with a different amount of nodes or field dimensions (even when the selected skip value was valid for the three tested scenarios). In addition, CSBA does not take into account nodes which die during skip intervals. If those nodes are CHs, the reliability of the system could be seriously compromised and some information collected by those CHs could be lost.
Therefore, as future work, we will address the dynamic determination of the skip value with an additional intelligence-based system in order to achieve a better adaptability for different network layout, number of nodes and network dynamics. That new intelligent system, hosted in the BS, would monitor the evolution of the network (e.g., number of node deaths, average energy in network areas or concentration of alive nodes), to adapt the skip value in order to increase the network lifetime. Moreover, the BS could take into account events, such as the death of a CH during the skip interval or new thresholds and variables to elect CHs dynamically (even during a skip). From the behaviour observed in the input variables of the T2FIS, a new design of those fuzzy variables would be necessary in order to tune the design of the fuzzy sets and their fuzzification.

Author Contributions

Conceptualization, A.-J.Y.-D., J.-C.C.-M., A.T.-C. and A.-J.L.-S.; methodology, A.-J.Y.-D., J.-C.C.-M. and A.-J.L.-S.; software, A.-J.Y.-D., J.-C.C.-M. and A.-J.L.-S.; validation, A.-J.Y.-D., J.-C.C.-M., A.T.-C. and A.-J.S.-C.; formal analysis, A.-J.Y.-D. and A.-J.S.-C.; investigation, A.-J.Y.-D., J.-C.C.-M., and A.T.-C.; resources, A.-J.Y.-D. and J.-C.C.-M.; data curation, A.-J.Y.-D. and J.-C.C.-M.; writing–original draft preparation, A.-J.Y.-D., A.-J.L.-S. and J.-C.C.-M.; writing–review and editing, J.-C.C.-M., and A.T.-C.

Funding

This research was partially funded by Plan Propio de Investigación de la Universidad de Málaga (Spain).

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Cuevas-Martinez, J.C.; Gadeo-Martos, M.A.; Fernandez-Prieto, J.A.; Canada-Bago, J.; Yuste-Delgado, A.J. Wireless Intelligent Sensors Management Application Protocol-WISMAP. Sensors 2010, 10, 8827–8849. [Google Scholar] [CrossRef] [PubMed]
  2. Liu, X. A Survey on Clustering Routing Protocols in Wireless Sensor Networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef] [PubMed]
  3. Cenedese, A.; Luvisotto, M.; Michieletto, G. Distributed Clustering Strategies in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inf. 2017, 13, 228–237. [Google Scholar] [CrossRef]
  4. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000; Volume 2, p. 10. [Google Scholar] [CrossRef]
  5. Yuste-Delgado, A.J.; Cuevas-Martinez, J.C.; Triviño-Cabrera, A. EUDFC - Enhanced Unequal Distributed Type-2 Fuzzy Clustering Algorithm. IEEE Sens. J. 2019, 19, 4705–4716. [Google Scholar] [CrossRef]
  6. Singh, S.P.; Sharma, S. A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput. Sci. 2015, 45, 687–695. [Google Scholar] [CrossRef]
  7. Afsar, M.M.; Tayarani-N, M.H. Clustering in sensor networks: A literature survey. J. Netw. Comput. Appl. 2014, 46, 198–226. [Google Scholar] [CrossRef]
  8. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  9. Muruganathan, S.D.; Ma, D.C.F.; Bhasin, R.I.; Fapojuwo, A.O. A centralized energy-efficient routing protocol for wireless sensor networks. IEEE Commun. Mag. 2005, 43, S8–S13. [Google Scholar] [CrossRef]
  10. Kia, G.; Hassanzadeh, A. A multi-threshold long life time protocol with consistent performance for wireless sensor networks. AEU-Int. J. Electron. Commun. 2019, 101, 114–127. [Google Scholar] [CrossRef]
  11. Indranil, G.; Riordan, D.; Srinivas, S. Cluster-head election using fuzzy logic for wireless sensor networks. In Proceedings of the 3rd Annual Communication Networks and Services Research Conference (CNSR’05), Halifax, NS, Canada, 16–18 May 2005; pp. 255–260. [Google Scholar] [CrossRef]
  12. Zhang, Y.; Wang, J.; Han, D.; Wu, H.; Zhou, R. Fuzzy-logic based distributed energy-efficient clustering algorithm for wireless sensor networks. Sensors 2017, 17, 1554. [Google Scholar] [CrossRef] [PubMed]
  13. Nayak, P.; Vathasavai, B. Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic. IEEE Sens. J. 2017, 17, 4492–4499. [Google Scholar] [CrossRef]
  14. Zhang, Q.; Sun, Z.; Zhang, F. A clustering routing protocol for wireless sensor networks based on type-2 fuzzy logic and ACO. In Proceedings of the 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Beijing, China, 6–11 July 2014; pp. 1060–1067. [Google Scholar] [CrossRef]
  15. Cuevas-Martinez, J.C.; Yuste-Delgado, A.J.; Triviño-Cabrera, A. Cluster Head Enhanced Election Type-2 Fuzzy Algorithm for Wireless Sensor Networks. IEEE Commun. Lett. 2017, 21, 2069–2072. [Google Scholar] [CrossRef]
  16. Neamatollahi, P.; Naghibzadeh, M.; Abrishami, S. Fuzzy-Based Clustering-Task Scheduling for Lifetime Enhancement in Wireless Sensor Networks. IEEE Sens. J. 2017, 17, 6837–6844. [Google Scholar] [CrossRef]
  17. Yuste, A.J.; Trivino, A.; Casilari, E. Type-2 fuzzy decision support system to optimise MANET integration into infrastructure-based wireless systems. Expert Syst. Appl. 2013, 40, 2552–2567. [Google Scholar] [CrossRef]
  18. Bahrebar, S.; Blaabjerg, F.; Wang, H.; Vafamand, N.; Khooban, M.H.; Rastayesh, S.; Zhou, D. A novel type-2 fuzzy logic for improved risk analysis of proton exchange membrane fuel cells in marine power systems application. Energies 2018, 11, 721. [Google Scholar] [CrossRef]
  19. AL-Madani, B.; Orujov, F.; Maskeliūnas, R.; Damaševičius, R.; Venčkauskas, A. Fuzzy Logic Type-2 Based Wireless Indoor Localization System for Navigation of Visually Impaired People in Buildings. Sensors 2019, 19, 2114. [Google Scholar] [CrossRef] [PubMed]
  20. Kumar, A.; Kumar, V. Evolving an interval type-2 fuzzy PID controller for the redundant robotic manipulator. Expert Syst. Appl. 2017, 73, 161–177. [Google Scholar] [CrossRef]
  21. Xie, W.X.; Zhang, Q.Y.; Sun, Z.M.; Zhang, F. A Clustering Routing Protocol for WSN Based on Type-2 Fuzzy Logic and Ant Colony Optimization. Wirel. Pers. Commun. 2015, 84, 1165–1196. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.