You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 January 2021

Energy-Efficient Wireless Sensor Network with an Unequal Clustering Protocol Based on a Balanced Energy Method (EEUCB)

,
,
,
,
and
1
Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
2
Center for Research in Mobile Cloud Computing, University of Malaya, Kuala Lumpur 50603, Malaysia
3
Electrical and Computer Systems Engineering, School of Engineering, Monash University Malaysia, Subang Jaya 47500, Malaysia
4
Faculty of Electrical Engineering, University Technology MARA (UiTM), Shah Alam 40450, Malaysia
This article belongs to the Section Sensor Networks

Abstract

A hot spot problem is a problem where cluster nodes near to the base station (BS) tend to drain their energy much faster than other nodes due to the need to perform more communication. Unequal clustering methods such as unequal clustering routing (UDCH) and energy-efficient fuzzy logic for unequal clustering (EEFUC) have been proposed to address this problem. However, these methods only concentrate on utilizing residual energy and the distance of sensor nodes to the base station, while limited attention is given to enhancing the data transmission process. Therefore, this paper proposes an energy-efficient unequal clustering scheme based on a balanced energy method (EEUCB) that utilizes minimum and maximum distance to reduce energy wastage. Apart from that, the proposed EEUCB also utilizes the maximum capacity of node energy and double cluster head technique with a sleep-awake mechanism. Furthermore, EEUCB has devised a clustering rotation strategy based on two sub-phases, namely intra- and inter-clustering techniques, that considers the average energy threshold, average distance threshold, and BS layering node. The performance of the proposed EEUCB protocol is then compared with various prior techniques. From the result, it can be observed that the proposed EEUCB protocol shows lifetime improvements of 57.75%, 19.63%, 14.7%, and 13.06% against low-energy adaptive clustering hierarchy (LEACH), factor-based LEACH FLEACH, EEFUC, and UDCH, respectively.

1. Introduction

Wireless sensor networks (WSNs) comprise a large number of sensor nodes and sub-nodes with a restricted battery power supply. Generally, the sensor nodes are randomly distributed in the monitoring region to aggregate the collected data and transmit information to the base station (BS) or sink node by a single-hop or multi-hop [,,]. The data are transferred to the terminal system through a communication link such as a satellite or the internet by the BS [,]. In the final stage, users will collect the data from the terminal system and manage the operation through it. The architecture of WSNs is shown in Figure 1. However, there are a few disadvantages in using WSNs, including a shorter network lifetime, higher energy consumption, instability, complicated network management if run on a large scale, and additional network overheads [,]. Due to their low-cost implementation, WSNs are widely employed in various applications such as industry, transportation, agriculture, the medical industry, environmental monitoring, and smart home systems [] etc. However, the battery-powered sensor node has limited energy, and a complicated battery might change procedure, which affects the quality, performance, and lifetime of WSNs. Due to these factors, controlling energy consumption is one of the major problems concerning WSNs. An important fact to note when attempting to reduce this problem is also that data transmission of wireless communication consumes more energy compared to data processing.
Figure 1. Wireless sensor networks (WSNs) architecture.
In the original methods, the initial idea was for the sensor nodes to collect the data and channel it directly to the BS node. When the process occurs, it leads to long-distance communication and results in higher energy consumption. Traffic and collisions will occur when sensors are transmitting data within the same period of time; this scenario will also result in data re-transmission and higher energy consumption. In order to solve this and to increase network lifetime, a reconsideration of routing and clustering [,] is required. In a clustering mechanism, the sensor nodes are divided into several clusters. Each cluster contains a central cluster known as the cluster head (CH) and several nodes of the cluster called cluster members (CM) [,,]. The CMs receive data from an environment and send them to the CH. Once the CH receives the data, it will aggregate them in order to avoid data redundancy; the data will then be sent over to the BS via single-hop or multi-hop [,]. The clustering method has many advantages, including balanced energy consumption, scalability, and an improved network lifetime. The benefits and classifications of the clustering method have been widely described and defined [,,]. However, the clustering protocols have some problems, such as transmission data to the sink, sometimes increasing energy consumption in WSNs [] because the farthest distance CH will consume more energy to send data to BS. Multi-hop communication is usually adopted to save energy [].
However, in the multi-hop communication method, the CH, which is closer to the BS, will take on more forwarding tasks. This will result in a massive overhead of the CH, and these CHs will run out of power sooner than the others. This causes a breakdown of the cluster and a loss of communication between CHs in a breakdown called the hot spots problem. Furthermore, as the CH is responsible for the aggregating and transmission process, when the CH receives data from the CM, the CH will aggregate data and forward them to the BS. As the CHs consume more energy than the CM, this also leads to unbalanced energy distribution in the overall network. If the CHs are not in close proximity, the furthest one from the BS node will dissipate more energy and increase the overhead.
In addition, the clustering protocols are divided into “static, dynamic, and hybrid” classes. In static clustering, clusters remain the same throughout the network’s lifetime once they are formed. The advantage of this method is that the overhead of clustering will be reduced. However, the static method may not perform correctly as some nodes may lose their energy and be terminated earlier than the other nodes. By contrast, dynamic clustering differs from the static method in that it will perform new clustering at each instance. Nevertheless, it has the disadvantage of high overhead, but it will not result in traffic that will pressure the nodes. Lastly, hybrid clustering improves energy consumption and network lifetime while reducing the communication overhead [].
The clustering size approach can be classified into equal and unequal size clusters. In equal clustering, the size of the clusters is consistent throughout the network. Conversely, in unequal clustering, the size of clusters differs throughout the network based on the distance to the BS [].
The hot spots problem arises when the cluster nodes are located closer to the BS node, where it takes more energy to receive data and forward it to the BS or server. Some of the possible solutions include using an unequal clustering-based routing in WSN, such as an energy-efficient unequal clustering routing (UDCH) and energy-efficient fuzzy logic for unequal clustering (EEFUC) protocols. These protocols are proposed in order to solve the hot spots problem and reduce energy consumption. However, these schemes do not utilize minimum and maximum distance to reduce energy wastage, and not much attention is given to enhance the data transmission in the network, which can lead to energy wastage across the network and a reduced network lifetime [].
Moreover, these schemes do not have a sleep-awake mechanism, which can lead to network lifetime reduction. UDCH proposes an unequal clustering mechanism based on the competition radius. The calculation of the competition radius for each node depends on the residual energy of sensor nodes and the distance from the cluster nodes to the BS; however, it does not consider the fact that the minimum distance is the closest distance of a node from the BS, and that the maximum distance is the farthest distance of the node from the BS, which leads to an increase in energy consumption. Moreover, UDCH proposes a double cluster head in order to reduce the load on the primary CH. The selection process of the primary CH is determined based on computing the delay time of each node. The second CH is determined based on the distance from the sensor nodes to the primary CH.
However, in UDCH, not much attention is given to enhance the data transmission process between sensor nodes and CH nodes in the network. To enhance data transmission among sensor nodes, the factor-based LEACH (FLEACH) is proposed. FLEACH avoids the selection of secondary cluster head (2CH) with low residual energy to achieve load balance between CH nodes. However, FLEACH does not address the hot spots problem []. The FLEACH protocol proposes a double cluster head in order to reduce energy consumption and prolong the network lifetime. The primary CH is randomly and alternately selected among the network nodes based on probability, which leads to an increase in energy consumption and the selection of 2CHs based on the highest residual energy of nodes.
This paper proposes an energy-efficient routing protocol with an unequal clustering scheme based on a balanced energy method (EEUCB). The EEUCB protocol is focused on improving energy consumption, network lifetime and solving the hot spots problem by adopting unequal clustering technology. The size of the cluster depends on the distance between the cluster nodes and the BS. The CH that is closer to the BS nodes takes more energy to receive data and forward them to the BS. To resolve this problem, the EEUCB protocol is proposed to reduce the size of the CH, thus reducing its overhead. Meanwhile, EEUCB considers the energy of the CH as another metric in cluster size decisions, besides the distance. The CHs with more residual energy will form more massive clusters.
On the other hand, we propose a double cluster head to reduce the overhead and energy consumption of the CH node. In this method, each cluster has two CHs. The primary CH is responsible for aggregating and forwarding data to the BS node if its distance is greater than the distance threshold and the energy consumption is less than the energy threshold. The 2CH is responsible for receiving and aggregating data within each cluster and sending them to the primary CH if the distance of the 2CH is less than the distance threshold and the energy is greater than the energy threshold. EEUCB proposes a different election mechanism for both the CH and 2CH. Calculating the delay-time for each CH node improves the election mechanism of the primary CH. As for the 2CH election mechanism, we consider the highest residual energy and the distance between nodes and the BS. The minimum distance between non-CHs and CHs can reduce the delay, improve energy consumption, and reduce transmission time.
To balance the energy consumption among CMs and the CH, a clustering rotation strategy based on the average energy threshold, average distance threshold, and performance of layering by the BS node is proposed; this can increase network lifetime and the efficiency of energy consumption. Two techniques are proposed for transmission: (i) intra-cluster transmission for head clusters to share the data between them; and (ii) the inter-clustering transmission is proposed when the CH is placed at a great distance from the BS. These two techniques will reduce the overhead and avoid delays in the network. The contributions of this paper are as follows:
  • We propose an energy-efficient routing protocol with an unequal clustering scheme based on the balanced energy EEUCB method.
  • We improve the selection of 2CH to reduce the load and overhead on the primary cluster head by calculating the highest residual energy.
  • To preserve the energy, we apply the sleep-awake mechanism based on the distance from sensor nodes to CH and the energy levels of sensor nodes to reduce energy consumption and prolong the network lifetime.
  • To avoid the long distances among nodes, we propose distributing the nodes depending on the divided network layers by calculating the furthest and closest node to the base station.
  • We enhance the transmission round between CMs, CHs, and BS by utilizing the average distance threshold and average energy threshold to prolong the lifetime of nodes in the network via intra-cluster transmission. Meanwhile, it utilizes the layer implementation and residual energy of clusters to construct a path to BS via inter-cluster transmission.
The rest of this study is organized as follows. Section 2 presents a number of routing protocols proposed for WSNs to be described in section related work. Section 3 and Section 4 describe the methodology of the proposed approach and evaluation metrics. Section 5 and Section 6 present the simulation setup, results, and discussion. Finally, Section 7 summarizes this study and outlines future work.

3. The Proposed Energy-Efficient Unequal Clustering Scheme Based on a Balanced Energy Method (EEUCB) Protocol

This section presents the details of our proposed energy-efficient routing protocol with an unequal clustering scheme based on a balanced energy method (EEUCB) for WSN. Before explaining the details of our protocol, we will first describe the network model and the energy model in the following sub-sections.

3.1. Network Model

In this sub-section, sensor nodes are randomly distributed in an environment of M*M square area, BS node has unlimited power, and outside of the monitoring area, each node can be adjusted as a CM or a CH. All nodes and BS are stationary and can adjust transmission power in order to estimate the distance and communication range; each sensor node has limited power, a unique ID, and is aware of each of the locations in the network. Each cluster has two CHs, the primary cluster head CH and the second cluster head 2CH. The primary CH is responsible for receiving data from nodes and sending multi-hop to BS, while 2CH is responsible for receiving data from nodes, aggregating the data, and sending it to primary CH. The energy consumption of setting up the network can be described as follows:
  • The BS sends a broadcast Hello message to all sensor nodes.
  • Each sensor node calculates its distance to the BS based on the signal strength indicator (RSSI) mechanism.
  • The intermediate neighbor nodes that forward information to other intermediate neighbor nodes until they reach the BS.
  • The BS then calculates the distance difference among the sensor nodes from the BS and empirically divides it into four layers to transmit data from the CHs to the BS.
  • The sensor nodes can send data to the CHs based on the distance and energy thresholds.
  • The CHs forward the data aggregated to the BS via single or multi-hops based on the location of CHs in the network.

3.2. Energy Model

To evaluate the performance of the proposed EEUCB scheme, we use the energy model that is similarly described in the LEACH protocol []. The communication between nodes consumes the vast majority of energy, so the energy consumption is neglected for sensing and processing in this work. In the process of communication, the transmission and receiving processes consume more energy than monitoring. Therefore, we consider the energy of transmitting and the energy of receiving as energy consumption for communication. The energy consumed by transmitting l-bit data over distance d meters can be calculated as:
E T X =   { k . E e l e c + k . e f s × d 2               w h e n   d   d 0 k . E e l e c + k . e m p × d 4           w h e n   d d 0              
where   E T X is the energy consumption of transmitter,   k is the length of transmission data, E e l e c is the energy consumption of the receiver circuit or sender circuit for 1-bit data, e f s is the data energy consumption of 1-bit in free space mode ( d 2   power   loss ), e m p is the data energy consumption of a 1-bit in multi-path attention mode ( d 4 power loss), d is the communication distance, and d 0 is the threshold distance value, if the node distance is less than the distance threshold, it will send data via free space, while if the node distance is greater than the distance threshold, it will send data via multi-path to avoid the high energy consumption during the transmission or receiving data. The threshold distance value d 0 can be calculated as:
d 0 = e f s e m p
Moreover, to receive this message, the radio expends energy:
E R X ( i ) = k . E e l e c    
where E R X is the energy consumption of the receiver, and E e l e c is the energy consumption of receiver circuit or sender circuit for 1-bit data.

3.3. Proposed EEUCB Protocol

The hot spots problem is one of the most critical challenges in WSNs. It is the primary reason for unbalanced energy consumption when multi-hop transmission between clusters with BS is performed. CHs closest to the BS will consume more energy than other CHs due to the receiving of more forwarding tasks. In order to solve this problem, EEUCB is proposed. Our goal is to reduce energy consumption in order to increase the network lifetime. In EEUCB, cluster member nodes have different sizes and different regions. The sizes of CHs will be smaller than others if the cluster nodes are closer to the BS. This can eventually help us to avoid the node dying early when more than CHs share the data relay task in these areas. Moreover, the sleep-awake mechanism is utilized in our protocol based on the distance range from sensor nodes to CH as well as to the energy level, so it will prolong the network lifetime and preserve energy consumption. Secondly, in order to reduce the load and responsibility of CHs, the secondary CH (2CH) mechanism is proposed. The primary CH is responsible for forwarding data between the clusters, and 2CH is responsible for receiving and aggregating data within each cluster.
To balance the energy consumption among CMs and the CH, a clustering rotation strategy based on the average energy threshold, average distance threshold, and performance of layering by the BS node is proposed. The network system architecture design based on the EEUCB protocol is shown in Figure 3.
Figure 3. The network system design.
The EEUCB protocol contains four phases: the processing phase, initialization phase, cluster setup phase, and transmission phase. The processing phase is responsible for estimating the distance length with the base station node and calculating the average residual energy of neighbor nodes. The responsibility of the initialization phase is to calculate the radius of clustering to generate unequal cluster in the network. The cluster setup phase is responsible for calculating the delay time for the election of the primary cluster head node. Lastly, the transmission phase is responsible for transmitting data between the cluster member and base station node and balancing energy consumption between the sensor nodes and cluster head nodes. These phases are explained in the following sections. To better understand the protocol, Figure 4 shows the EEUCB flowchart. The detail of notations and descriptions can be found in Table 2.
Figure 4. Flowchart of energy-efficient unequal clustering scheme based on a balanced energy method (EEUCB) protocol.
Table 2. Notation and description.

3.3.1. Processing Phase

The processing phase function estimates the distance between cluster nodes and neighbor nodes and checks the number of neighbor nodes. First, after the sensor nodes are deployed in the network, the BS broadcasts a message in the network, after which each sensor node calculates its distance to the BS based on the RSSI mechanism to identify the location of the sensor nodes []. The sensor nodes then send their location information to the BS. In this case, to be more realistic, our proposed method does not assume that all the sensor nodes can reach the BS through their own signal strength. Instead, we utilized intermediate neighbor nodes that forward information to other intermediate neighbor nodes until they reach the BS. The BS then calculates the distance difference among the sensor nodes from the BS and empirically divides it into four layers to transmit data from the cluster head to the BS. In this research, we do not focus on the number of layers, but the goal of these four layers is to identify the distance of each node from the BS and help the multi-hop communication between clusters to reduce energy consumption [].
In addition, the place of cluster nodes is distributed in the network based on the layering mechanism. After dividing the sensor nodes into various layers according to their distance from the BS, the BS notifies each node as to which layer it belongs to. In our method, four layers, as shown in Figure 3, are proposed. The nodes are in the first layer (which is close to the BS), and the data is transmitted to the BS in a single hop. On the other hand, nodes in the second, third, and fourth layers utilize a multi-hop mechanism. The first layer has the smallest cluster size (with more clusters), followed by the second, third, and finally the fourth with the greatest cluster size (with fewer clusters). Unlike the prior equal clustering method, the relay tasks in the proposed method can be shared among cluster heads within the same layer. Nodes closer to the sink tend to drain their energy at a faster rate when compared to other nodes as they have to perform more communication. Therefore, sharing relay tasks can avoid a single cluster head needing to handle all incoming data from the higher layer (i.e., the hot spots problem). Besides this, the sleep-awake mechanism is also utilized in our proposed protocol. This mechanism relies on two criteria, namely the distance from the sensor nodes to the CH and the energy level.
To make the BS determine the clustering strategy and perform layering, each node calculates the distance length of each layer. The distance length d L   can be calculated as:
d L = ( d m a x d m i n ) / 4
where d m a x is the farthest distance of the node from the BS, and d m i n is the closest distance of a node from the BS. The clustering is performed independently by each of the layerings. Equation (4) improved to avoid the long-distance, so this will lead to an extension of the network’s lifetime and improvement of network stability. In addition, we propose an unequal clustering routing protocol; therefore, the location of the BS node will be outside the sensing area as described by []. If the location of the BS is inside the sensing area, the network lifetime will increase because more nodes will share the high energy consumption around BS. Therefore, we located the BS outside the sensing area to verify the network lifetime of our protocol. On the other hand, if the location of the base station is inside the sensing area and the sensor nodes are opposite the base station, the Pythagorean theorem can be used to verify the difference between the farthest and closest distance of nodes from the BS. Therefore, in this case, the BS will distribute nodes in the network based on the competition radius ( R c ( i ) ) such as in Equation (6), if the R c ( i ) is greater than the maximum competition radius R L m a x , the location of nodes will be either in the second, third, or fourth layer in the network. The clustering layers algorithm is described in Algorithm 1. The input and output parameters (Node(i), d m i n , d m a x , BS, d L ) of the algorithm are specified in 1–2. The sending and receiving of broadcast messages between nodes and BS are specified in steps 3–5. Step 6 calculates the distance length ( d L ) . Each node evaluates the layer with the BS in step 7. In steps 8–17, each node compares the layer depending on the maximum and minimum distance with BS.
Algorithm 1 The Clustering Layers of EEUCB
1. Input (Node(i), d m i n , d m a x , BS)
2. Output (Node(i). layers)
3. BS broadcast message to all nodes
4. Nodes receive a message from BS
5. Nodes send a status message to BS
6. Calculate the distance length according to Equation (4)
7. For all of the nodes, BS do
8.  If the distance node (i) to BS < d m i n + d L then
9.      Node(i). layer = L1;
10.    Else
11.    If the distance node (i) to BS > d m i n + d L && distance node (i) to BS < d m i n   + (L2 × d L ) then
12.     Node(i). layer = L2;
13.   Else
14.   If the distance node (i) to BS > d m i n +(L2 × d L ) && distance node (i) to BS < d m i n +(L3 × d L ) then
15.     Node(i). layer = L3;
16.   Else
17.     Node(i). layer = L4;
18.   End
19. End

3.3.2. Initialization Phase

If the sensor nodes are closer to the BS and are forwarding more data to it, the node will be heavier and consume more energy. To balance out the energy in the whole network, the initialization phase proposes generating unequal clustering in the network and electing the main CH by calculating the delay time of the nodes. An unequal algorithm could balance the energy among the sensor nodes. Hence, the size of the cluster nodes should be smaller than others if the cluster nodes are closer to the BS. The initialization phase is divided into three parts, namely unequal clustering generation, competition radius calculation, and delay time.
Unequal Clustering Generation and Clustering Competition Radius
In this sub-phase, the generation of unequal clusters is based on the competition radius. The competition radius is responsible for generating unequal clustering for each node and determining the size of the cluster with a BS node. Existing unequal clustering, such as in UDCH, utilizes the residual energy of sensor nodes and the distance from all the sensor nodes to the BS node. However, this method does not consider the length of the distance between CMs and the BS node, which leads to energy wastage across the network nodes and a reduced network lifetime. Apart from residual energy and the distance from all sensor nodes to the BS as in the prior method, our proposed EEUCB method also considers the minimum distance of the closest node from the BS and the maximum distance of the furthest node from the BS. These two criteria were considered to avoid long-distance; this will extend network lifetime and improve network stability. Furthermore, our protocol utilizes the maximum capacity of node energy to improve the existing method. The calculation of the competition radius ( R c ) of the prior method (UDCH) is shown below:
R c ( i ) = a E r e m ( i , r ) E i n i t + b d i , B S D m a x   R L m a x
The calculation of competition radius ( R c ) of our proposed EEUCB protocol is shown below:
R c ( i ) = [ 1 a ( D m a x d i , B S d m a x d m i n ) b ( 1 E r e m ( i , r ) E m a x ) ]   R L m a x
where R c ( i ) is the radius of node i, D m a x is the maximum distance from nodes to BS, d i , B S is the distance from node i to BS, E r e m ( i , r ) is the residual energy of node i at round r,   E i n i t is the initial energy of node i, E m a x is the maximum capacity of node energy,   R L m a x is the maximum competition radius for becoming CH, and (a) and (b) is the weighted factor between [0,1] to adjust the scope of R c ( i ) . Moreover, it determines the impact of the energy and distance on the competition radius. When (a) and (b) increases, the range of competition radius value decreases; conversely, when (a) and (b) decrease, the range of competition radius value increases, also including the effect of competition radius value on the energy.
Delay Time
After calculating the competition radius R c ( i ) , the sensor nodes then calculate the delay time D t ( i ) to announce being a CH; the delay time is computed in Equation (8). The delay time scheme in this paper used timestamp synchronization. It provides internal synchronization by request. The calculation of the said process depends on the residual energy of neighbor nodes E r e m ( j , r ) , the number of neighbor nodes N N ( i , r ) , and the average residual energy of neighbor nodes E a v g ( i ) such as in Equation (7). Therefore, the sensor nodes will send a broadcast packet to the neighbors. The content of the packet includes the node ID, residual energy, location of the node, packet size, and the type of packet (packet type_1) because different types of broadcast packet are sent in the network to calculate the average energy of the neighbor nodes. Each node records the information of neighbor nodes when they receive the packet, and the nodes are identified by the neighbors; the nodes will then calculate the average energy of neighbor nodes as defined in []. The average energy of neighbor nodes can be calculated as:
E a v g ( i ) =   j ϵ N N ( i , r ) E r e m ( j , r ) max ( N N ( i , r ) , σ )
where E a v g ( i )   is the average energy of neighboring node i, N N ( i , r ) is the set of neighbor nodes, N N ( i , r ) is the number of neighbors, j is the neighbor node of node i, a n d   σ is a tiny number which has no effect on the Equation (8) if the result becoming zero. When many nodes have the same number of neighbors, σ plays a role in obtaining a different number of neighbors for each node. The delay time of each node can be calculated as:
D t ( i ) = ( 1 E r e m ( i ) E a v g ( i ) ) W t + R v
where     D t ( i ) is the delay time of node i, E r e m ( i ) is the residual energy of node i, W t is the competition time of primary CH, and R v is the random value. The random value can play a role in reducing communication conflicts when the nodes have the same residual energy. The format of the (packet type_1) is shown in Figure 5.
Figure 5. Format of data packet type_1.

3.3.3. Cluster Setup Phase

In this section, the clustering setup phase will elect the nodes to become CH; the election of CH depends on the delay time processing. This section contains three sub-sections: primary CH selection and sleep-awake mechanism, cluster formation, and secondary CH selection.
Primary Cluster Head (CH) Selection and Sleep Awake Mechanism
The Primary CH selection method for the proposed EEUCB is similar to the UDCH []. However, in EEUCB, further improvement is made by taking into account the sleep-awake mechanism. The method starts with the calculation of the delay time, as in Equation (8). When the delay time closes in on zero, the primary CH will be elected. If a node is calculated to have a shorter delay time, it will have a higher chance to become a CH and send a broadcast packet. The content of the packet includes the packet size, node ID, location of the node, residual energy, and the type of packet (packet type_2). The format of the packet type_2 is shown in Figure 6.
Figure 6. Format of data packet type_2.
Each node should wait until the delay time process ends. If a node [i] receives packet type_2 from nodes before the delay time process ends, the node [i] will become normal nodes “N.”
In addition, if the other nodes broadcast the packet type_2 and the candidate CH receives the packet before the end of the competition time   W t , it will compare the residual energy of node   S i , and node   S j . If the node S i is greater than node   S j , it will become primary CH; otherwise, it becomes a normal node “N.” Furthermore, the candidate CH will broadcast messages to sensor nodes. The sensor nodes will verify the messages from the CH. If the CH have limited residual energy and might die sooner, the nodes will inform neighbor nodes in the network to change the path and send data to another CH.
Since nodes with a shorter distance to the CH consume less energy, we propose a round-robin sleep-awake rotation method to select nodes to transmit data to the CH based on two stages. This method is illustrated in Figure 7. Let it be assumed that node A and node B are 3m and 5m away from the CH, respectively. In the first stage (Figure 7a), the round-robin-based selection depends only on the node distance to the CH. Since node A has the shortest distance to the CH, it is the first selected (awake) to transmit data to the CH (Round_1). The non-selected nodes will remain asleep. In the next round (Round_2), node B—which has the second shortest distance to the CH—is then selected to be awake and sends data to the CH. The process will continue until all nodes have transmitted their data to the CH. In the second stage (Figure 7b), the selection is not based on distance alone; the energy level becomes the additional criterion that is included in the rule.
Figure 7. Sleep-awake rotation.
Apart from that, the utilization of distance, R, in the second stage, is modified based on Equation (9). Starting from Round_ 3, the distance, R, is used to calculate the variable Z as follows:
Z =   R n
where Z is the name of each node, R is the radius, and n is the variable increment if Z has the lowest value.
From the example in Figure 7 (i.e., Round_3), node A is selected to be awake to transmit its data to the CH since it has the lowest Z value (i.e., ZA = RAx1 = 3 × 1 = 3). Node B (and others, if any), on the other hand, will remain asleep. Following the awake selection, the selected node A will then update its Z value (i.e., ZA = RAx2 = 3 × 2 = 6) in Round_4, while the Z value for the other nodes (which were not selected) remains as before. In round_4, the lowest Z value (i.e., Node B with ZB = RBx1 = 5 × 1 = 5) is selected to be awake once again. The selected node will update its Z value in the 5th Round; in this example, it can be seen that ZB is updated to ZB = 10 (i.e., ZB = RBx2 = 5 × 2 = 10). The process continues in the next round.
Besides utilizing the Z value, the sleep-awake mechanism in the second stage also depends on the energy level according to the threshold value, as shown in Equation (10). Assuming that the T h v is equal to 0.02j, the current awake node—as long as it remains awake and continues to transmit data to the CH—should have residual energy greater than the threshold value. From the example in Figure 7 (i.e., Round_6), node A will remain awake and transmit its data to the CH since it has the lowest Z value and its residual energy is greater than the threshold value. Node B, on the other hand, will remain asleep.
In addition, if the two nodes have the same Z value in the cluster, the node with the higher residual energy is chosen. From the example in Figure 7 (i.e., Round_9), nodes A and B have the same Z value, whereas node A will have higher residual energy than node B. Therefore, node A will remain awake and continue to transmit data to the CH, while node B remains asleep.
The threshold value of the node in the cluster is calculated as below:
T h v = T E N
where T E is the total energy of sensor nodes in the cluster, and N is the total number of sensor nodes.
After the sleep-awake mechanism, the primary CH will broadcast a message within the maximum competition radius R L m a x at the end of competition time W t . It consists of a packet, which includes node ID, residual energy, location of the node, packet size, distance to BS, and the type of this packet (packet type_3). The format of the packet type_3 is shown in Figure 8.
Figure 8. Format of data packet type_3.
The primary CH algorithm is described in Algorithm 2. The input and output parameters ( S i ,   W t , A, B, T h v , R L m a x , a, b, R v ,   R c ( i ) , D t ( i ) , CH) of the algorithm is specified in 1–2. In steps 3–6, calculate the clustering radius R c ( i )   and broadcasting to all neighbor nodes. The number of neighbor nodes   N N ( i , r )   and the average energy of neighbor nodes E a v g ( i )   are calculated in steps 7–8. In step 9, the delay time is calculated for each node   D t ( i ) . In steps 10–20, the processing of nodes to select the primary CH is conducted, as explained in the above section. The residual energy between nodes in steps 21–30. The sleep-awake mechanism in steps 31–44. Finally, the primary CH broadcast type_3 packet within the competition time W t in steps 45–48.
Algorithm 2 Primary CH Selection and Sleep Awake Mechanism
1. Input ( S i ,   W t , A, B, T h v , R L m a x , a, b, R v )
2. Output (primary CH and mode)
3. For each node S i     do
4. Calculate R c ( i ) according to Equation (6)
5. Broadcast packet type_1
6. The nodes identified their neighbors
7. Calculate the number of neighbor nodes         N N ( i , r )
8. Calculate the average energy of neighbor nodes E a v g ( i )
9. Each node calculates the delay time D t ( i ) according to Equation (8)
10.       S i . Type = “N.”
11.   If S i .   D t ( i ) = close to 0
12.    CountCH= countCH +1
13.    S i . Type = “CH.”
14.   Broadcast packet type_2
15.  End
16.  While S i .   D t ( i ) close to   0
17.   If     S i . D t   > S j . D t  
18.     S i . Type = “N.”
19.   End
20.  End
21. While    S i . W t 0
22.  If     S i . D t   < S j . D t  
23.   If   S i . Type = “CH.”
24.    If S i . E < S j . E
25.      S i . Type = “N.”
26.    Else S i . Type = “CH.”
27.    End if
28.   End if
29.   End if
30.  End while
31.   If     S i . Type = “CH.”
32.    While all nodes send data once to CH
33.  Calculate the distance from nodes to CH
34. If     S i ( A ) .   distance   to   CH   < S i ( B ) .   distance   to   CH
35.   S i ( A ) .   mode = “Awake.”
36.   S i ( B ) . mode = “Sleep.”
37.  End if
38.   If S i ( A )   A w a k e   & &     S i ( A ) . E > T h v
39.     S i ( A ) . mode = “Awake.”
40.     S i ( B ) . mode = “Sleep.”
41.  Else   S i ( A ) . mode = “Sleep” &&
      S i ( B ) . mode = “Awake.”
42.  End if
43.  End while
44. Endif
45. If S i . Type = “CH.”
46.   Broadcast packet type_3 to BS
47. Endif
48. Endfor
Cluster Formation
The cluster formation function selects the optimal non-CH to become a member of the CH. After the primary CH selection in this sub-section, the CH will broadcast packet type_3 and the node S i as it awaits receipt of the packet. If the node   S i   receives   the   message   from   node   S j , it will add and store it to the list of candidate nodes for the CH (CH_list) and change it into a non-CH state. On the other hand, the node S i may possibly receive more messages from different CHs. In this case, it will choose the optimal nodes as its CH by calculating the distance from non-CHs to the CH. The optimal selection of the CH is dependent on the minimum distance, high residual energy, and a smaller number of neighbor nodes. In addition, the maximum number of nodes in each cluster will affect the performance of the network. Therefore, to balance the distribution of nodes among the cluster heads and to achieve balanced energy consumption, in this paper we define the maximum number of each cluster as calculated by = N T C H , where the N is the total number of sensor nodes, and T C H is the total number of CH in the network. At the time when sensor nodes join the cluster, the cluster head will compare the number of nodes with the t value. If the value is less than the t value, it will accept the node; otherwise, it will reject the request.
Algorithm 3, the input and output parameters ( S i , S j ,   CH _ list ) of the algorithm is specified in 1–2. Explains the procedure of cluster formation that chooses the optimal CHs in steps 3–11.
Algorithm 3 Cluster Formation
1. Input ( S i , S j )
2. Output (CH_list)
3. For each node S i    do
4. If    S i . Type = “N” && S i . E > 0 && S i . Type = “Awake.”
5.    If S i .   H e a d = S j .   H e a d
6.        Compute the minimum distance from non-CH to CHs
7.     If     S i . E > av_energy && S i . Neighbor < S j . Neighbor
8.        S i . Type = “CH.”
9.     Broadcast packet type_3
10.       CH_list store S i
11.     Else if S j . Type = “CH.”
12.  End if
13. End if
14. End for
To reduce the overhead and processing load and to save energy by minimizing the energy consumption of primary CH, we propose to elect the secondary cluster head 2CH. The primary cluster head CH is responsible for aggregating data and forwarding it to the BS node if the primary CH distance is lower than the distance threshold, and the residual energy is greater than the energy threshold. Meanwhile, the 2CH is responsible for receiving and aggregating data within each cluster and sending the aggregated data to primary CH if the distance from the primary CH is greater than the distance threshold and the residual energy is less than the energy threshold. The Medium Access Control MAC algorithm between cluster members and CHs is based on time-division multiple access (TDMA). Whenever if the primary CH aggregates data from nodes, the primary CH creates the TDMA schedule for other normal nodes and broadcasts the schedule to all the cluster members. Otherwise, if the 2CH aggregates data from nodes, it will create the TDMA schedule for the normal nodes within the cluster. In this case, each node will send data to the 2CH based on the schedule.
In Algorithm 4, we assume that CH is represented by ‘j’; and ‘f’ represented the sensor nodes distributed in the cluster. The input and output parameters of the algorithm are specified in 1–2. In steps 3–6, we define the cluster-ID as ‘j’ and the energy of non-CH as ‘f’ in per round in the network. To select the 2CH, our EEUCB protocol proposes that the sensor nodes with the highest residual energy m a x E will become 2CH. If the N(f) belongs to the cluster N(j) and the N(f) is equal to N(j), each cluster will compute the energy temporarily and find the maximum residual energy in each cluster as described in steps 7–15. Steps 16–19 will check the residual energy of N(f). If it is high, it will be selected as 2CH; otherwise, it will become a normal cluster node.
Algorithm 4 Selection of Secondary Cluster Head 2CH
1. Input ( total number of nodes (n), the total number of CH ( n C H ))
2. Output (2CH)
3. for each n C H to f  do
4.    Cluster ID j = n (r + 1, f)
5.    Node ‘f ‘= E (r + 1, f) % energy per round
6. End
7.  if   n C H   1 1
8.  for each cluster head j   do
9.     m a x E = 0
10.   if N(f) ϵ j
11.    if N(f)= n C H     && N(f). E > 0
12.     energy_temp= Max ( m a x E , E (r + 1, f))
13.     if energy_temp > m a x E
14.       m a x E = energy_temp
15.    End
16.     if N(f). E == m a x E
17.       I = f    %% 2CH ID
18.     End
19.   End if
20.  End if
21.  End for
22. End if

3.3.4. Transmission Phase

The transmission phase is the process of data transmission between CHs and CMs through the network. The transmission phase consists of a CH rotation strategy and a layering implementation. The CH rotation strategy and the layered implementation scheme will be further described in the next sub-section. The process of the transmission is utilized after the selection of the primary CH, which sends a broadcast schedule to all CMs by creating a TDMA schedule. The CMs will send data to the primary CH, which aggregates data. Thereafter, aggregation operations will be sent to the BS.
CH Rotation Strategy and Layering Implementation
The CH rotation strategy and layering implementation scheme are proposed in our EEUCB protocol to balance the energy consumption between CMs, CHs, and the BS nodes. We proposed this CH rotation strategy as the unbalanced energy consumption between sensor nodes and CHs during data transmission in the network will affect the network lifetime and increase energy consumption throughout the network. The rotation strategy functions to balance energy consumption between sensor nodes and CHs so that each node in the network has a chance to become a CH.
A layering implementation is proposed in our EEUCB protocol in order to extend network lifetime and reduce energy consumption. The function of the layering implementation is to estimate the location of the primary CH in the network that was estimated on the basis of the distance to the BS. The layering implementation is performed, as shown in the processing phase Section 3.3.1.
Concerning the transmission phase of prior methods as in FLEACH and UDCH, the FLEACH utilizes average distance while UDCH utilizes the average energy threshold between CMs and CHs and constructs the path to the BS through the network. On the other hand, the proposed EEUCB utilizes both the average distance and energy threshold. The EEUCB also makes use of the layering implementation to reduce energy consumption and prolong the network lifetime.
In our proposed EEUCB protocol, the CH rotation strategy includes two sub-phases, namely the intra and inter clustering transmission. In the first sub-phase, the CH performs the intra-cluster transmission. The CH rotation strategy is utilized between CMs and CHs. If the distance from the primary CH is less than the distance threshold, such as in Equation (12), and the residual energy is greater than the energy threshold, such as in Equation (13), the nodes will send data directly via single-hop to the primary CH. The primary CH then receives the data and applies aggregate functions. These nodes help the CH to consume less energy in receiving data. However, if the distance from the primary CH is greater than the distance threshold, and the residual energy is less than the energy threshold, the system will use multi-hop routing to transfer data to the CH, which consumes more energy. As such, the nodes will send data to the 2CH, which will aggregate data to be sent to the primary CH. Finally, the primary CH receives the aggregated data from the 2CH and sends it to the BS. In addition, if the distance is greater than the distance threshold and residual energy is greater than the energy threshold, the sensor nodes will send data to the 2CH. Conversely, if the distance is less than the distance threshold and the residual energy is less than the energy threshold, the sensor nodes will send data directly to primary CH. As the transmission process depends on distance, the transmission of data from CMs to CHs will not consume more energy in the network.
The second sub-phase is constructing a path to BS via inter-cluster layering. In this sub-phase, the MAC algorithm between the CHs and BS of our EEUCB protocol uses the carrier-sense multiple access (CSMA) for transmission data to BS. With the data transmission in this sub-phase, the sensor nodes might change their state into sleep mode. Therefore, the energy status and the number of node members will change in the cluster. Hence, if the CH [i] is not located in the first layer (not close to BS), and the residual energy of the CH [i] is less than the residual energy of CH [j], the CH [i] will send aggregated data to CH [j], and the CH [j] will transmit the data to BS; otherwise, the CH [i] transmit aggregated data to BS directly. The intra and inter clustering transmission based on the EEUCB protocol is shown in Figure 9. The flowchart of the main CH rotation strategy is shown in Figure 10.
Figure 9. The intra- and inter-clustering transmission.
Figure 10. The flowchart of the main CH rotation strategy.
The distance threshold was considered because of the sensor node’s different distributions within the network area. So, if the primary CH distance is greater than the distance threshold, this means that the CH distance is farthest from the sensor nodes and will lead to more energy consumption in the data aggregation and transmission process. Therefore, the sensor nodes will send data to the 2CH, and the 2CH will then forward it to the primary CH. The distance threshold depends on the average distance. The average distance means the distance of all sensor nodes to BS, and the average distance can be written as:
a v g D = 1 N i = 1 N D i t o B S
where a v g D is the average distance, N is the set of sensor nodes, and D i t o B S is the distance of each node to the BS. The Equation of the distance threshold can be calculated as:
D t h =     a v g D
where D t h is the distance threshold and is the weight factor to determine the impact of the distance between the CMs and CHs. When the increases, the distance range of CHs is greater than the distance threshold. Hence, the 2CH will consume more energy for the receiving and transmission process, and data will not be aggregated.
The energy threshold was also considered in our protocol in order to extend the network lifetime and to reduce energy consumption. When the energy of the primary CH is less than the energy threshold, the CH node will die early and disconnect the communication between nodes. To avoid this problem, we elect the 2CH to help the primary CH to be “alive” by receiving the data from nodes and executing aggregated functions, and after that sending it to the primary CH. The computation of the energy threshold can be written as follows:
E t h =   β     E C H ( i )
where E t h is the energy threshold, E C H ( i ) is the initial energy of CH after each cluster selection, and β is the weight factor to determine the impact of the energy level on the energy threshold.

4. Evaluation Metrics

The proposed method has been presented in the previous section. To further test the reliability of the proposed method, four evaluation metrics are considered. These metrics measure the network lifetime, average energy consumption, average residual energy, and throughput. These metrics are explained in the following sub-sections.

4.1. Network Lifetime

The network lifetime is the time when the first sensor node in the network runs out of energy and dies. The measure network lifetime can be written as:
N l i f e t i m e = r = 1 r   m a x i = 1 N ( N o d e ( i ) . E     0 ,   ( d e a d = d e a d + 1 ;     I f   ( d e a d = = 1 ,   f i r s t _ d e a d = r ) ) )
where N l i f e t i m e is the network lifetime, r is the number of rounds, and d e a d = d e a d is the number of dead nodes around.

4.2. Average Energy Consumption

Efficient energy consumption is significant in cluster network technology. One goal of our proposed protocol is to reduce and preserve energy consumption in the network. The average energy consumption can be calculated as:
E a v g = i N   E i n i ( i ) / N
where E a v g is the average energy consumption, E i n i ( i ) is the initial energy of nodes (i), and N is the total number of sensor nodes.

4.3. Average Residual Energy

The residual energy is energy within the system that is not being used but which, when released, can execute work. The residual energy is calculated when each sensor node is transmitting and receiving the packets among them in the network. The average residual energy can be computed as:
E r e m =   i N   E r e m ( i ) / N
where E r e m is the average residual energy of nodes,   E r e m ( i ) is the remained energy of nodes (i), and N is the total number of sensor nodes.

4.4. End-to-End Delay

The end-to-end delay is defined as the time taken when the packets transfer from the sensor nodes to the base station node. The end-to-end delay can be computed as:
D = i + 1 P ( i ) P t ( i ) P r ( i ) T o t a l   p a c k e t s
where D is the end to end delay, P t ( i ) is the time when sending packets, and P r ( i ) is the time when the packets are received.

4.5. Throughput

Throughput is the number of data packets successfully transmitted to the destination in a period of time. The formula of throughput can be written as:
T p = T s   T r s e c
where T p is the throughput, T s is the total number of packets sent to BS and T r is the total number of packets received at BS.

5. Simulation Setup and Results

In this section, our simulation is to compare the performance of EEUCB with other protocols using a MATLAB 2019b. The network topologies of this paper were presented by IEEE 802.15.4/ZigBee because this protocol supported clustering technology and carrier-sense multiple access (CSMA). On top of this, we want to investigate the energy consumption efficiency and network lifetime extension of our proposed protocol. Table 3 presents the three different scenarios, such as a different number of nodes and area sizes. All the examined scenarios show similar results regardless of node numbers and network area sizes. The parameters used in the simulation are presented in Table 4.
Table 3. Scenarios for the proposed protocol.
Table 4. Parameters of simulations.
The simulation results show the performance of the proposed protocol successfully prolongs the network lifetime and reduces energy consumption. The aim is to balance the energy consumption among the cluster members and cluster head. The clustering rotation strategy is based on the average energy threshold and average distance threshold and performs layering by the base station node. This can ensure more efficient energy consumption and network lifetime increment. On the other hand, we estimate a double cluster head to considerably reduce the overhead and energy consumption of the cluster head node. In this method, each cluster has two CH. The primary cluster head CH is responsible for aggregating data and forwarding it to the BS node if the distance of primary CH is greater than the distance threshold and the energy is less than the energy threshold. Meanwhile, the secondary cluster head 2CH is responsible for receiving and aggregating data within each cluster and sends the aggregated data to primary CH if the distance 2CH is less than the distance threshold and the energy of the 2CH is greater than the energy threshold.
The performance comparison between the proposed protocol and the other three cluster protocols is presented in Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15.
Figure 11. The network lifetime with (a) 100 nodes, (b) 300 nodes, (c) 400 nodes, (d) 1000 nodes.
Figure 12. The average energy consumption.
Figure 13. The average residual energy.
Figure 14. The end-to-end Delay.
Figure 15. The throughput.
Figure 11 plots the network lifetime, including the first node die (FND), half node die (HND), and the last node die (LND) between the proposed EEUCB, LEACH, FLEACH, EEFUC, and UDCH protocols in the first, second, third, and fourth scenarios is performed. From the figure, it can be observed that the proposed EEUCB protocol has increased the network lifetime in all four different scenarios. In the first of these, we deployed 100 sensor nodes in a 200 × 200   m 2 area as shown in (Figure 11a). In (Figure 11b), we implemented the second scenario, the network area 300 × 300   m 2 with 300 sensor nodes. The third scenario, as shown in (Figure 11c), contains a 400 × 400   m 2 area, with 400 sensor nodes. Lastly, in (Figure 11d), we implemented the fourth scenario, the network area of 1000 × 1000 m 2 with 1000 sensor nodes, in order to check the scalability of the protocol. In addition, several different scenarios are generated to show the performance and to check the ability of the proposed protocol to reduce energy consumption and to prolong the network lifetime.
Figure 11a shows the LEACH protocol FND is at 600 rounds and HND at 1150 rounds. In the FLEACH, EEFUC, and UDCH protocols, the FND is 1280, 1290, and 1301 rounds, and HND is at 2250, 2388, and 2390, respectively. In our EEUCB protocol, the FND is at 1420 rounds, and HND is at 2600 rounds. Figure 11b shows that the FND of LEACH, FLEACH, EEFUC, and UDCH protocols appear at 670, 1320, 1395, and 1421 rounds, respectively, while the HND appeared at 1176, 2320, 2400, and 2485, while in the EEUCB FND is at 1620 rounds, and HND at 2800. In Figure 11c, the LEACH, FLEACH, EEFUC, and UDCH protocols, the FND is at 695, 1322, 1402, and 1430 rounds, HND is at 1200, 2350, 2420, and 2500, and LND at 3000, 3320, 3600, and 3679. The FND of our EEUCB protocol stands at 1645 rounds, while HND and LND are at 2810 and 3800 rounds, respectively. In Figure 11d, the LEACH, FLEACH, EEFUC, and UDCH protocols, the FND is at 750, 1400, 1490, and 1525 rounds, HND is at 1300, 2398, 2500, and 2580 rounds, and LND at 3200, 3620, 3765, and 3800 rounds. The FND of our EEUCB protocol stands at 1700 rounds, while the HND and LND are at 2925 and 3920 rounds, respectively.
The results show that our EEUCB protocol outperforms other protocols. The reason is that the proposed EEUCB protocol balances the energy consumption among the nodes in the network. This is achieved by an unequal clustering mechanism based on different competition radius calculation. The calculation of the competition radius for each node depends on a number of factors: the closest and farthest distance of the nodes from the BS, the distance from all the sensor nodes to the BS node, the residual energy of each node at each round, and the maximum capacity of the node energy compared to UDCH and the EEFUC protocol there are only calculating the distance form all nodes to BS, whereas the LEACH has not shown good performance in terms of the network lifetime because it did not propose an unequal clustering mechanism, instead the equal clustering mechanism was proposed. In addition, our EEUCB, UDCH, and FLEACH protocols utilize a double cluster head node in order to reduce the load on the primary CH. FLEACH has also not shown good performance in terms of the network lifetime due to the selection of the primary CH being randomly and alternately selected among the network nodes based on probability, whereas the selection of primary CH of EEUCB and UDCH is based on the minimum computing delay time of each node. However, EEUCB has shown an improved network lifetime because it utilizes the sleep-awake mechanism based on the distance from sensor nodes to CH and the energy level of the sensor nodes. The selection of 2CH of UDCH is based on the distance from the sensor nodes to the primary CH, so it has not shown an improved network lifetime, while our EEUCB protocol has shown an improved network lifetime because the selection of 2CH is based on calculating the highest residual energy of nodes, hence avoiding the selection of 2CH with low residual energy. Both the LEACH and EEFUC protocols have not shown an improved network lifetime because they only utilize one CH for aggregation and forward data transmission at the same time to the base station.
On the other hand, the transmission round also helps to reduce the energy consumption of nodes by reducing the communication overhead and prolonging network lifetime in the network. As an example, if the location of the CHs is far from the BS, and the residual energy of the CHs is low, the CH may not be able to transmit data to the BS. This will lead to increases in energy consumption and packet loss during the data transmission in the network, and the CH might die sooner. The transmission round of EEUCB uses the average distance threshold and average energy threshold between CMs and CHs. Use the layer implementation and residual energy for the construct of a path to BS. Therefore, it has shown good performance in terms of the network lifetime compared to UDCH, FLEACH, LEACH, and EEFUC. The FLEACH protocol has not shown an improved network lifetime because it utilizes distance threshold only for transmission round between CMs and CHs, and to construct a path to the BS in the network. The transmission round between CMs and CHs, and to construct a path to the BS of EEFUC protocol utilize residual energy of sensor node and distance from CH to BS. The UDCH utilized between CMs and CHs uses the average energy threshold and the average energy to construct a path to BS in the network.
In addition, we tested the statistical significance of the number of alive nodes (NOA) by using two-tailed T.TEST to draw a statistical inference as defined by [,]. A large sample consisting of pair of (NOA) in the proposed EEUCB protocol with other protocols such as LEACH, FLEACH, EEFUC, and UDCH are taken over different rounds behave like a normal co-related variable. Table 5 shows the results of two-tailed T.TEST for our proposed EEUCB protocol with other protocols. Our testing hypothesis has four cases that can be described as follows:
Table 5. Results of t-test.
Null Hypothesis H 0 : ( N O A E E U C B = N O A L E A C H ) . Alternative Hypothesis H 1 : ( N O A E E U C B > N O A L E A C H ) .
Null Hypothesis H 0 : ( N O A E E U C B = N O A F L E A C H ) . Alternative Hypothesis H 1 : ( N O A E E U C B > N O A F L E A C H ) .
Null Hypothesis H 0 : ( N O A E E U C B = N O A E E F U C ) . Alternative Hypothesis H 1 : ( N O A E E U C B > N O A E E F U C ) .
Null Hypothesis H 0 : ( N O A E E U C B = N O A U D C H ) . Alternative Hypothesis H 1 : ( N O A E E U C B > N O A U D C H ) .
The test statistic T with n-1 degrees of freedom can be computed as:
T   =   D a v g ÷   ( S d ÷   ( n 1 ) )
where D a v g and S d denote the mean and standard deviation of the difference of NOA in two equal-sized correlated large samples of size n. The 95% confidence limits for D a v g .
D a v g   ±   T 0.05 × ( S d ÷   ( n 1 ) )
where T 0.05 is the 5% point of t-distribution with n − 1 degrees of freedom.
Let p indicate the probability of the calculated value for our statistical t-test with n-1 degrees of freedom to obey the null hypothesis. A value of p < 0.05 indicates that the null hypothesis is rejected at 5% significance level, and the alternative hypothesis be accepted at 95% confidence level. Our results obtained by t-test of our proposed EEUCB protocol with LEACH, FLEACH, EEFUC, UDCH protocols. In all the cases, p < 0.05, so the null hypothesis is rejected at 5 % significance level, and the alternative hypothesis is accepted at 95% confidence level. The lower and upper limits for the 95% confidence interval for D a v g are shown in Table 5. Therefore, it can be observed that the proposed EEUCB protocol outperforms LEACH, FLEACH, EEFUC, and UDCH.
Energy consumption is an essential factor in clustering protocols. Figure 12 plots the average energy consumption in joules as a function of the process number of rounds. The average energy consumption of our EEUCB protocol is less than the other four protocols, namely LEACH, FLEACH, EEFUC, and UDCH. The reason for this is because we improved the selection of CHs algorithms, the competition radius calculation, and transmission data operations, which leads to the distribution of CHs being more sensible and the reduction in energy consumption of the sensor nodes. By contrast, the UDCH calculated the computation radius and the distance from nodes to the BS but did not calculate the maximum capacity of the node energy in leading to an increase in the energy consumption of nodes. The LEACH has larger results than other protocols due to the cluster distributed randomly in the network and did not utilize a double cluster head. Therefore, it increases the load on the main CH, while the FLEACH utilizes a double cluster head but did not address the hot spots problem and randomly selection primary CH, which leads to the consumption of more energy and unbalanced energy consumption for receiving and transmitting data to the BS. The EEFUC addressed the hot spots problem but did not utilize a double cluster head, therefore, increasing the load on the main CH in the network.
In addition, we tested the statistical significance of the energy consumption for a single round using a pair-wise t-test to draw a statistical inference as defined as shown in Table 6. The calculation of the t-test of the energy consumption process is the same as the t-test of (NOA), as in the Equations (19) and (20). In all the cases p < 0.05, so the null hypothesis is rejected at 5 % significance level, and the alternative hypothesis is accepted at 95% confidence level. Furthermore, we checked the impact of the network capacity of energy consumption per round by testing our protocol with different scenarios are shown in Table 7.
Table 6. Results of t-test of energy consumption for a single round.
Table 7. The energy consumption with different scenarios.
The average residual energy is calculated from the remaining energy after the packet’s transmission process between sensor nodes. Figure 13 shows the energy balance evaluation of EEUCB. To obtain an accurate evaluation, we run the simulation ten times, and average results are computed. Figure 13 shows the average residual energy consumption comparison of our proposed EEUCB protocol with four protocols; LEACH, FLEACH, EEFUC, and UDCH. From the result, the average residual energy of the four protocols is less than the proposed EEUCB protocol. The average residual energy starts to drop below the half initial energy from 1000 rounds in LEACH and FLEACH, and in EEFUC and UDCH from 1200 rounds. The residual energy of the proposed EEUCB protocol, on the other hand, only starts to drop at 1400 rounds. Table 8 presents the standard deviation of residual energy against a different number of rounds. Results show that our EEUCB protocol outperforms other protocols and that EEUCB has a better energy balance compared to other protocols. The EEUCB protocol reduces energy consumption by reducing the communication overhead and utilizes the sleep-awake mechanism based on the distance from sensor nodes to the CH and the energy level of the sensor nodes. The selection of CH methods used in the proposed EEUCB protocol enhances load balancing based on minimum delay time with the sleep-awake mechanism and the highest residual energy methods. In contrast, in UDCH, the selection of the CHs process focuses on the delay time for the primary CH and the distance from the nodes to the CH. This could lead to the selection of CH nodes with low residual energy that may die early.
Table 8. Standard deviation residual energy.
The selection of CH in LEACH FLEACH, and EEFUC are randomly selected based on probability, which leads to consuming more energy for the selection and transmission process. In addition, the transmission process is very important in clustering protocols due to more dissipated energy in the transmission process. Therefore, EEUCB has good results because we enhance the transmission process based on the energy and distance thresholds between the CMs and CHs and the layering implementation methods between the CHs and the BS node. For example, if the distance from the primary CH is less than the distance threshold and the residual energy is greater than the energy threshold, the nodes will send data directly via single-hop to the primary CH; the primary CH then receives the data and applies aggregate functions. These nodes help the CH to consume less energy in receiving data. However, if the distance from the primary CH is greater than the distance threshold, and the residual energy is less than the energy threshold, the system will use multi-hop routing to transfer data to the CH, which consumes more energy. On this basis, the nodes will send data to the 2CH, which will aggregate data to be sent to the primary CH, whereas the transmission between CHs and BS node beads on the layering process. If the CH [i] is not located in the first layer (not close to the BS), and the residual energy of the CH [i] is less than the residual energy of CH [j], the CH [i] will send aggregated data to the CH [j], and the CH [j] will transmit the data to BS; otherwise, the CH [i] transmit aggregated data to the BS directly. Therefore, these methods helped us to preserve energy consumption in the network. The transmission process between the CMs, CHs, and BS was based on the distance threshold in FLEACH. The distance threshold was perhaps insufficient to preserve the residual energy of nodes, which leads to a loss of residual energy for nodes. In EEFUC, the transmission was based on residual energy; however, the CH consumed more energy. Hence, it did not save much residual energy in sensor nodes, whereas UDCH uses only the average energy threshold for the transmission process.
Figure 14 shows the end-to-end delay results (in seconds). The end-to-end delay can be defined as the packets transfer from sensor nodes to the sink node. The maximum delay of our proposed EEUCB protocol was recorded at 0.04 seconds, whereas the prior protocols have higher latency between 0.05–0.07. The lower delay time obtained by the proposed EEUCB is due to the inclusion of distance information between the sensor node to the base station by calculating the minimum and maximum distance and also using a double cluster head in each cluster. The distance information helps in terms of the layers’ implementation method to estimate the distance between cluster nodes to the BS and dividing into four layers based on the furthest and closest distance to BS. The FLEACH and UDCH used a double cluster head without calculating the minimum and maximum distance. Therefore, the location of CHs may be furthest from the BS, generating a delay and increasing energy consumption, whereas the LEACH and EEFUC do not propose a double cluster head nor calculate the minimum and maximum distance in the network.
Figure 15 shows the throughput results, which can be defined as the number of data packets received at the BS in a period of time. We have tested the throughput with the 1000 number of nodes. Results show that the throughput of our proposed EEUCB protocol performed better than the other four protocols. In LEACH, the received data packets are about 350,000, FLEACH about 520,000, EEFUC about 550,000, and UDCH around 610,000, while the EEUCB received data packets at about 700,000. Table 9 shows the results of a paired t-test for our proposed EEUCB protocol with other protocols. The calculation of the t-test of the throughput process is the same as the t-test of (NOA), as in the Equations (19) and (20). A value of p < 0.05 indicates that the null hypothesis be rejected at 5% significance level, and the alternative be accepted at a 95% confidence level. In every case where p < 0.05 the null hypothesis is rejected at 5% significance level and the alternative hypothesis is accepted at 95% confidence level. The proposed EEUCB managed to obtain the highest throughput because it used the sleep-awake mechanism among nodes in the network. Therefore, the redundant data transmission among nodes is limited, restricted contrary to UDCH and EEFUC. Moreover, the EEUCB used the layering implementation method between CHs and BS. The LEACH has the lowest throughput because it did not consider the unequal clustering and sleep-awake mechanism. The proposed EEUCB protocol has shown an increase in throughput to the BS over other protocols.
Table 9. Results of t-test for throughput.

6. Discussion

The proposed EEUCB protocol is an improved version of the UDCH protocol. Both methods utilize the delay time method to select the CH in the network. However, further improvements are made in EEUCB by considering the sleep-awake mechanism. In addition, the proposed EEUCB protocol takes into account the highest residual energy for the selection of the 2CH and the distance between two nodes to check the node ID, location, neighbor nodes, and the number of neighbor nodes. In addition, the distance of cluster nodes is distributed in the network by layering calculations. In our protocol, the BS calculates the distance based on the closest and farthest nodes and divides this distance into four layers. The advantage of this method is that the nodes in the first layer can send the data to the BS through a single hop. If the nodes are in the second, third, or fourth layer, it will send the data to the CH through a multi-hop. This method helps to reduce and maintain energy consumption in a network. Besides that, the sleep-awake mode is utilized to maintain the energy of the node and to prolong the lifetime of the network. This is due to the fact that the active nodes furthest from the CH will reduce energy efficiency and will die early.
On the other hand, the selection of non-CHs is dependent on the minimum distance between non-CHs and the CH because the closest distance between the CM and the CH will not dissipate more energy. At the same time, the node can send data during long rounds rather than transmitting with a longer distance, which requires more energy and time. In addition, our protocol utilizes the energy and distance threshold to balance energy consumption within nodes; this allows the two CHs to be selected to reduce the overhead on the primary CH and to enable them to distribute the operations between them. The layering implementation and residual energy construct the path to the BS. These methods are proposed for the transmission of data from the CH to the BS node in a scenario where the primary CH is situated far from the BS node and is not located in the first layer. This will increase energy consumption and overhead. In order to resolve this, the primary CH will send the data to the other CH that is closest to the BS node. The comparison between our method and prior methods is listed in Table 10.
Table 10. Comparison between our method and prior methods.

7. Conclusions

In this paper, we investigate energy efficiency and solutions to the hot spots problem by proposing a method called EEUCB. Unlike prior unequal clustering methods such as UDCH, our protocol utilizes an unequal clustering mechanism based on a different competition radius calculation. The calculation of the competition radius for each node depends on a few factors: (i) the closest and farthest distance of the nodes from the BS; (ii) the distance from all the sensor nodes to the BS node; (iii) the residual energy of each node at each round; and (iv) the maximum capacity of the node energy. The utilization of the distance between nodes and the BS reduces and maintains energy consumption in a network.
Other than unequal clustering, the proposed EEUCB protocol also considers a double cluster head implementation. The EEUCB is different from the prior double CHs implementation in terms of the selection of 2CHs based on the highest residual energy of nodes. This would reduce the overheads on the primary CH and enable them to distribute the operations between them.
Moreover, to balance the energy consumption among CMs and the CH, a clustering rotation strategy based on a few factors is proposed, namely the average energy threshold, average distance threshold, and the use of the layering implementation to construct the path to the BS. This increases the efficiency of energy consumption and the network lifetime. The results of our proposed EEUCB protocol show lifetime improvements of 57.75%, 19.75%, 14.7%, and 13.06% against LEACH, FLEACH, EEFUC, and UDCH, respectively. In future works, we will optimize our work by using software-defined networking (SDN) to improve WSN energy efficiency.

Author Contributions

Conceptualization, A.A.J. and M.Y.I.I.; methodology, A.A.J., N.R.I.; software, A.A.J.; validation, A.A.J., M.Y.I.I., S.R.B.A. and N.R.I.; investigation, A.A.J. and S.R.B.A.; writing—original draft preparation, A.A.J., M.Y.I.I., M.T.R. and M.F.b.K.; writing—review and editing, M.Y.I.I., S.R.B.A., N.R.I., M.T.R. and M.F.b.K.; project administration, A.A.J. and M.Y.I.I. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This Research is Supported by Research Grant from the Faculty of Computer Science and the Information Technology University of Malaya and RU Grant (BK032-2018) and Impact Oriented Interdisciplinary Research Grant (IIRG) IIRG003(A, B, C)-19IISS.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, Y.; Liu, M.; Liu, Q. An Energy-Balanced Clustering Protocol Based on an Improved CFSFDP Algorithm for Wireless Sensor Networks. Sensors 2018, 18, 881. [Google Scholar] [CrossRef] [PubMed]
  2. Akyildiz, I.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. A survey on sensor networks. IEEE Commun. Mag. 2002, 40, 102–114. [Google Scholar] [CrossRef]
  3. Jasim, A.A.; Bin Idris, M.Y.I.; Azzuhri, S.R.; Issa, N.R.; Noor, N.B.M.; Kakarla, J.; Amiri, I.S. Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model. IEEE Access 2019, 7, 164327–164343. [Google Scholar] [CrossRef]
  4. Zhu, F.; Wei, J. An energy-efficient unequal clustering routing protocol for wireless sensor networks. Int. J. Distrib. Sens. Networks 2019, 15, 1550147719879384. [Google Scholar] [CrossRef]
  5. Kim, B.-S.; Kim, K.-I.; Shah, B.; Chow, F.; Kim, K.H. Wireless Sensor Networks for Big Data Systems. Sensors 2019, 19, 1565. [Google Scholar] [CrossRef]
  6. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  7. Sarkar, A.; Murugan, T.S. Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel. Netw. 2019, 25, 303–320. [Google Scholar] [CrossRef]
  8. Xu, G.; Shen, W.; Wang, X. Applications of Wireless Sensor Networks in Marine Environment Monitoring: A Survey. Sensors 2014, 14, 16932–16954. [Google Scholar] [CrossRef]
  9. Jafarizadeh, V.; Keshavarzi, A.; Derikvand, T. Efficient cluster head selection using Naïve Bayes classifier for wireless sensor networks. Wirel. Netw. 2017, 23, 779–785. [Google Scholar] [CrossRef]
  10. Tamandani, Y.K.; Bokhari, M.U. SEPFL routing protocol based on fuzzy logic control to extend the lifetime and throughput of the wireless sensor network. Wirel. Netw. 2015, 22, 647–653. [Google Scholar] [CrossRef]
  11. Shagari, N.M.; Bin Idris, M.Y.I.; Bin Salleh, R.; Ahmedy, I.; Murtaza, G.; Shehadeh, H.A. Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network. IEEE Access 2020, 8, 12232–12252. [Google Scholar] [CrossRef]
  12. Bozorgi, S.M.; Bidgoli, A.M. HEEC: A hybrid unequal energy efficient clustering for wireless sensor networks. Wirel. Netw. 2018, 25, 4751–4772. [Google Scholar] [CrossRef]
  13. Liu, X. A Survey on Clustering Routing Protocols in Wireless Sensor Networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef]
  14. Yang, L.; Lu, Y.-Z.; Zhong, Y.-C.; Wu, X.; Xing, S.-J. A hybrid, game theory based, and distributed clustering protocol for wireless sensor networks. Wirel. Netw. 2015, 22, 1007–1021. [Google Scholar] [CrossRef]
  15. Logambigai, R.; Kannan, A. Fuzzy logic based unequal clustering for wireless sensor networks. Wirel. Netw. 2016, 22, 945–957. [Google Scholar] [CrossRef]
  16. Lee, J.-S.; Cheng, W.-L. Fuzzy-Logic-Based Clustering Approach for Wireless Sensor Networks Using Energy Predication. IEEE Sens. J. 2012, 12, 2891–2897. [Google Scholar] [CrossRef]
  17. Afsar, M.M.; Tayarani-N, M.-H. Clustering in sensor networks: A literature survey. J. Netw. Comput. Appl. 2014, 46, 198–226. [Google Scholar] [CrossRef]
  18. Amodu, O.A.; Mahmood, R.A.R. Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime. Wirel. Netw. 2016, 24, 1379–1402. [Google Scholar] [CrossRef]
  19. Phoemphon, S.; So-In, C.; Aimtongkham, P.; Nguyen, T.G. An energy-efficient fuzzy-based scheme for unequal multihop clustering in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 2020, 1–23. [Google Scholar] [CrossRef]
  20. Chandrashekar, G.; Sahin, F. A survey on feature selection methods. Comput. Electr. Eng. 2014, 40, 16–28. [Google Scholar] [CrossRef]
  21. Arjunan, S.; Pothula, S. A survey on unequal clustering protocols in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 2019, 31, 304–317. [Google Scholar] [CrossRef]
  22. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2005; p. 8020.
  23. Younis, O.; Fahmy, S. HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef]
  24. Akkari, W.; Bouhdid, B.; Belghith, A. LEATCH: Low Energy Adaptive Tier Clustering Hierarchy. Procedia Comput. Sci. 2015, 52, 365–372. [Google Scholar] [CrossRef]
  25. Zhao, L.; Qu, S.; Yi, Y. A modified cluster-head selection algorithm in wireless sensor networks based on LEACH. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 287. [Google Scholar] [CrossRef]
  26. Qing, L.; Zhu, Q.; Wang, M. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks. Comput. Commun. 2006, 29, 2230–2237. [Google Scholar] [CrossRef]
  27. Li, C.; Ye, M.; Chen, G.; Wu, J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7 November 2005. [Google Scholar]
  28. El Assari, Y. Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor Networks. Int. J. Comput. Netw. Commun. (IJCNC) 2020, 12. [Google Scholar] [CrossRef]
  29. Gupta, V.; Pandey, R. An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks. Eng. Sci. Technol. Int. J. 2016, 19, 1050–1058. [Google Scholar] [CrossRef]
  30. Bagci, H.; Yazici, A. An energy aware fuzzy approach to unequal clustering in wireless sensor networks. Appl. Soft Comput. 2013, 13, 1741–1749. [Google Scholar] [CrossRef]
  31. Sivakumar, N.R. Stabilizing Energy Consumption in Unequal Clusters of Wireless Sensor Networks. Comput. Mater. Contin. 2020, 64, 81–96. [Google Scholar] [CrossRef]
  32. Sert, S.A.; Alchihabi, A.; Yazici, A. A Two-Tier Distributed Fuzzy Logic Based Protocol for Efficient Data Aggregation in Multihop Wireless Sensor Networks. IEEE Trans. Fuzzy Syst. 2018, 26, 3615–3629. [Google Scholar] [CrossRef]
  33. Ren, Q.; Yao, G. An Energy-Efficient Cluster Head Selection Scheme for Energy-Harvesting Wireless Sensor Networks. Sensors 2019, 20, 187. [Google Scholar] [CrossRef] [PubMed]
  34. Sundaran, K.; Ganapathy, V.; Sudhakara, P. Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption. In Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Chennai, India, 23–24 February 2017; pp. 304–309. [Google Scholar]
  35. Yuste-Delgado, A.J.; Cuevas-Martinez, J.C.; Trivino-Cabrera, A. A Distributed Clustering Algorithm Guided by the Base Station to Extend the Lifetime of Wireless Sensor Networks. Sensors 2020, 20, 2312. [Google Scholar] [CrossRef]
  36. Mirzaie, M.; Mazinani, S.M. MCFL: An energy efficient multi-clustering algorithm using fuzzy logic in wireless sensor network. Wirel. Netw. 2017, 24, 2251–2266. [Google Scholar] [CrossRef]
  37. Sert, S.A.; Bagci, H.; Yazici, A. MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks. Appl. Soft Comput. 2015, 30, 151–165. [Google Scholar] [CrossRef]
  38. Bozorgi, S.M.; Rostami, A.S.; Hosseinabadi, A.A.R.; Balas, V.E. A new clustering protocol for energy harvesting-wireless sensor networks. Comput. Electr. Eng. 2017, 64, 233–247. [Google Scholar] [CrossRef]
  39. Mondal, S.; Ghosh, S.; Biswas, U. ACOHC: Ant colony optimization based hierarchical clustering in wireless sensor network. In Proceedings of the 2016 International Conference on Emerging Technological Trends (ICETT), Kollam, India, 21–22 October 2016; pp. 1–7. [Google Scholar]
  40. Mondal, S.; Dutta, P.; Ghosh, S.; Biswas, U. Energy efficient rough fuzzy set based clustering and cluster head selection for WSN. In Proceedings of the 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 14–16 October 2017; pp. 439–444. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.