You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Editor’s Choice
  • Article
  • Open Access

9 January 2022

Game Theory-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

,
,
and
1
School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China
2
School of Software Technology, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Networks in Smart Homes

Abstract

Energy efficiency is one of the critical challenges in wireless sensor networks (WSNs). WSNs collect and transmit data through sensor nodes. However, the energy carried by the sensor nodes is limited. The sensor nodes need to save energy as much as possible to prolong the network lifetime. This paper proposes a game theory-based energy-efficient clustering algorithm (GEC) for wireless sensor networks, where each sensor node is regarded as a player in the game. According to the length of idle listening time in the active state, the sensor node can adopt favorable strategies for itself, and then decide whether to sleep or not. In order to avoid the selfish behavior of sensor nodes, a penalty mechanism is introduced to force the sensor nodes to adopt cooperative strategies in future operations. The simulation results show that the use of game theory can effectively save the energy consumption of the sensor network and increase the amount of network data transmission, so as to achieve the purpose of prolonging the network lifetime.

1. Introduction

Wireless sensor networks are composed of a large number of sensor nodes deployed in a certain area, which provide feedback from information of the monitored area. As the connection between the physical environment and information environment, it is an important part of the Internet of things. At present, WSNs have been applied in the fields of ecological environment monitoring, military affairs, medical treatment, transportation, urban land use, and other fields [1,2,3]. Because of the wide application of WSNs, they have attracted the attention of many scholars in recent years. In WSNs, the sensor nodes perceive, transmit, and collect information in a cooperative way. This process will consume a certain amount of energy. However, the sensor nodes are powered by batteries, and the amount of power they carried is limited. Once the battery runs out, and the power supply cannot be replaced or supplemented in time, the transmission of monitoring information will be affected to a certain extent, and even the whole sensor network will be paralyzed [4,5]. Therefore, how to be as energy-efficient as possible in the case of limited energy, so as to extend the lifetime of the entire sensor network, has become a bottleneck problem in real applications of the sensor network.
In real applications, a battery with limited capacity is used to supply power for wireless sensor nodes, and the wireless sensor network is deployed in unattended outdoor or dangerous areas with a complex environment. The battery is used for power supply, and the monitoring area is uncontrollable, which is not conducive to energy supply or battery replacement of sensor nodes. To ensure the continuous work of WSNs, reducing the energy consumption of sensor nodes is the most effective way to prolong the lifetime of a sensor network [6]. Many experts and scholars have conducted several studies to optimize the energy consumption of sensor nodes to a certain extent [7,8,9,10,11]. After an extensive literature review, it was found that there has been little research on the energy consumption of sensor nodes in the idle listening stage. In fact, when a sensor node is in the active state, there will be substantial idle listening time, and the idle listening phase will also consume some energy [12,13]. If a large amount of energy is consumed at this stage, the energy used by the sensor node to collect and transmit information will be greatly reduced, thus shortening the lifetime of sensor nodes to a certain extent.
Moreover, the idle listening and sleep states of the sensor node in WSN have the characteristics of a game. Different strategies adopted by sensor nodes will bring different benefits and have different effects on the performance of sensor networks. On the one hand, sleeping of sensor nodes can minimize their energy consumption [14], but they will also consume a certain amount of energy when transitioning from the sleep state to the active state and from the active state to the sleep state [15]. If the energy consumed during state transition is too large, it will increase the energy consumption of the sensor nodes. On the other hand, the idle listening phase of sensor nodes will also consume a certain amount of energy. If the sensor nodes are idle listening for a long time, they will waste substantial unnecessary energy. In other words, the idle listening and the sleep states influence each other, which together determine the lifetime of the wireless sensor network.
To sum up, the main contributions of this work are as follows.
(1)
Taking into account several aspects that affect the energy consumption of sensor nodes, a game model is established.
(2)
According to the energy consumption between the idle listening of sensor nodes and the transition of sensor nodes from the sleep state to the active state, the threshold value of sensor nodes entering the sleep state is determined.
(3)
In order to avoid the selfish behavior of sensor nodes when they go to sleep, a penalty mechanism is introduced to force the sensor nodes to adopt cooperative strategies in future operations. The optimal number of penalty rounds for sensor nodes with selfish behavior is proven.
(4)
The simulation results show that using the games to control the transition between the sleep state and active state of the sensor nodes can reduce their energy consumption, thereby effectively prolonging the lifetime of the network.
The remainder of the paper is organized as follows: Section 2 reviews related work; Section 3 describes the materials and methods; the simulation details and result analysis are provided in Section 4; a discussion and an overview of future work are provided in Section 5; the conclusion is introduced in Section 6.

3. Materials and Methods

3.1. Study Object and WSN Deployment

In this paper, 100 sensor nodes with the same initial energy were randomly deployed in an area of 100 × 100 , and the sink node was located in the center of the deployment area, i.e., (50, 50). Once the sensor node was deployed, its location did not move. Sensor nodes needed to continuously monitor the deployment area, and energy was no longer supplied.

3.2. Network Model

A WSN is a network randomly composed of a certain number of sensor nodes, which together form multiple clusters, and each cluster includes a cluster head node and multiple cluster members (CMs). Each CM determines whether it belongs to a cluster according to its corresponding location. Furthermore, each CM has a certain sensing range, within which each node can collect data from the monitored object and send the collected data to the corresponding CH, which then sends the data to the sink node. The network diagram used in this paper is shown in Figure 1.
Figure 1. Schematic diagram of clustering algorithm.
When the sensor node is working, it is usually divided into two states: active state and sleep state. The sensor node in the active state can be divided into two stages: the working stages when the node needs to send and receive data, and the idle listening stages when there are no data to send and receive. When the sensor node is in sleep state, all functions are turned off to minimize energy consumption. In this state, the energy consumption of the sensor node can be considered as 0. In this paper, it is assumed that the sensor nodes are reasonable, while the energy is limited and distributed in harsh environments. For its own benefit, the sensor node should be as energy-efficient as possible to achieve the purpose of maximizing lifetime. Therefore, on the basis of ensuring network performance, when the sensor node is in the idle listening stage, it should enter a dormant state as much as possible, so as to reduce energy consumption and maximize the network lifetime.
Figure 2 shows the working schematic diagram of the sensor node, where Energy A–S represents the energy consumed by the sensor node in the transition from the active state to the sleep state, and Energy S–A represents the energy consumed by the sensor node in the transition from the sleep state to the active state.
Figure 2. Sensor node scheduling table.

3.3. Energy Model

The energy consumption of a sensor node is related to many factors. The main factors that directly influence the energy consumption of sensor nodes are discussed below. In order to calculate the residual energy of the sensor node, it is necessary to study various energy consumption factors of sensor nodes during the data processing. Therefore, the notations related to the energy consumption of sensor nodes are provided in Table 1.
Table 1. Notations of parameters and variables.

3.3.1. Energy Cost of Sensing

When the sensor works, it first senses the surrounding environment, and then acquires the sensing data from the environment [33]. In addition, the energy consumed by sensor nodes is related to the sensor itself. The sensing energy consumed by different sensors is different. Generally, the sensing energy consumption of sensor node S i is defined as
E s ( S i ) = L ( S i ) I ( S i ) T ( S i ) V s ,
where I ( S i ) is the needed amount of current, V s is the voltage supply, and T ( S i ) is the duration to detect and collect L ( S i ) bits of data.

3.3.2. Energy Cost for Processing

When the sensor node reads and stores data, it also consumes energy [34]; thus, the energy consumption can be expressed as:
E p ( S i ) = L ( S i ) V s 8 ( I W r i t e T W r i t e + I Re a d T Re a d ) ,
where T W r i t e and T Re a d indicate the durations taken by the sensor node in writing and reading L ( S i ) bits of data, and I W r i t e and I Re a d denote the current required for the sensor node to write and read per bit of data.

3.3.3. Energy Consumption for Communicating

The communication energy consumption of sensors mainly involves the energy consumption when sending and receiving information [15]. Hence, the energy consumed by the sensor node when sending information can be expressed as
E t ( S i ) = { L ( S i ) E e l e c + L ( S i ) E f s d 2 w h e n d < d 0 L ( S i ) E e l e c + L ( S i ) E m p d 4 w h e n d > d 0 ,
where E e l e c is the energy consumed to receive or transmit per bit message, whereas the constants E f s and E m p depend on the transmitter amplifier model, representing the free space model and the multipath model, respectively. d is the distance between two sensor nodes. d 0 is the threshold distance, which can be expressed as
d 0 = E f s / E m p .
The energy consumed by the sensor node when receiving information can be expressed as
E r ( S i ) = L ( S i ) E e l e c .

3.3.4. Energy Consumption in Transition from Sleep to Active Mode

When the sensor node is working, it will consume a certain amount of energy in the transition from the sleep state to the active state, and vice versa. However, the energy consumed for the switch from the active state to the sleep state is very small and, thus, negligible [15]. Therefore, the energy consumed by the sensor node to switch the working state is defined as
E w ( S i ) = V s 2 ( I a I s ) T a s ,
where I a is the current in the active state of the sensor node, I s is the current in the sleep state of the sensor node, and T a s is the time required for the sensor node to switch from the sleep state to the active state.

3.3.5. Total Energy Consumption for Sensor Node

According to Equations (1)–(6), the total energy consumption of the sensor node can be obtained as follows:
C i = E s ( S i ) + E p ( S i ) + E t ( S i ) + E r ( S i ) + E w ( S i ) .

3.4. Game Model

3.4.1. Establishment of Game Model

In order to prolong the lifetime of a WSN, the sensor nodes can switch reasonably between the active state and the sleep state; thus, the dynamic switching of sensor nodes can be regarded as a game problem. The model can be expressed as follows:
G T = { N , K , { u i } } ,
where N represents the player in the WSN. All sensor nodes in the network are involved in receiving and sending sensor information; hence, the game players include all sensor nodes in the network. In other words, the game player is sensor node S i , i = { 1 , 2 , , n } . K is the strategic space of players. In view of the reasonable preference of sensor nodes, in this paper, the sensor node can determine the strategic space of game player by weighing the energy consumption, i.e., the sensor node enters the sleep state from the active state, and the sensor node does not enter the sleep state from the active state. { u i } represents the utility function of i player,
u i ( s i , s i ) = U i ( s i , s i ) C i ( s i , s i ) ,
where s i is the strategy adopted by sensor node S i , s i is the strategy adopted by nodes other than sensor node S i , U i ( s i , s i ) is the revenue function of sensor node S i , and C i ( s i , s i ) is the cost function of sensor node S i .
The wireless sensor network communicates data packet forwarding in a multi-hop manner. On the basis of the rational analysis of sensor nodes, the revenue function of a sensor node is defined as the reward obtained by a sensor node for successfully forwarding the data packet to the next sensor node. Therefore, the revenue function is defined as
U ( s i , s i ) = G P ,
where G is the reward of a sensor node for successfully forwarding the data packet to the next sensor node, and P is the probability that the sensor node successfully forwards the data packet.
The sensor node has two working states, i.e., active state and sleep state. Therefore, x j ( S i ) is defined as the two working states of sensor node S i :
x j ( S i ) = { 1 A c t i v e             m o d e 0 S l e e p i n g         m o d e .
When the sensor node S i is in the sleep state, when it needs to forward data packets, it will adopt two different strategies, i.e., selfish and non-forwarding or cooperative and forwarding. Therefore, the two strategies adopted when the sensor node is in the dormant state are defined as
y j ( S i ) = { 1 F o r w a r d       d a t a         p a c k e t   0 D o       n o t     f o r w a r d       d a t a         p a c k e t   .
When the sensor node is working, the cost function is
C i ( s i , s i ) = { E s ( S i ) + E p ( S i ) + E t ( S i ) + E r ( S i ) x j ( S i ) = 1       a n d       y j ( S i ) = 1 E p ( S i ) + E t ( S i ) + E r ( S i ) + E w ( S i ) x j ( S i ) = 0       a n d       y j ( S i ) = 1 0 x j ( S i ) = 0       a n d       y j ( S i ) = 0 .

3.4.2. Determination of Sleep State Threshold

When the sensor node in the wireless sensor network is working, how to determine the transition between the sleep state and the active state differs as a function of the energy consumption of the sensor node. At the same time, it also brings different benefits to the players. In other words, the energy consumption of the sensor nodes can be reduced by switching to a sleep state at an appropriate idle listening time, thus prolonging the lifetime of the sensor network. In order to obtain the threshold of sleep state transition of the sensor node, the following definitions are established:
Definition 1.
Let   R = ( K s i j ) be a strategic section adopted by the sensor node   S i   in the wireless sensor network in the time period of j , ρ be the strategic section set of sensor nodes, and   U +   be the utility set obtained by sensor nodes. The utility obtained by the sensor node   S i   using the strategic section R is   u i   ( s i , s i ) U + , and the utility obtained by the sensor node   S i   using a different strategic section   R   is   u i ( s i , s i ) U + . If   u i ( s i , s i )   does not exist, make   u i ( s i , s i ) u i ( s i , s i ) ; this shows that the strategy R adopted by the sensor node   S i   is effective.
Definition 2.
In the wireless sensor network, the players who make decisions can only improve utility, denoting that the players are rational.
According to the personal rationality and strategic effectiveness of the players in the wireless sensor network, the following theorems can be drawn:
Theorem 1.
In the wireless sensor network, the sensor node is rational and the strategy is effective; thus, so the threshold of switching from an idle listening state to sleep state is T ( S i ) , i.e.,
T ( S i ) = ( I a I s ) T a s 2 L ( s i ) I ( s i ) .
Proof of Theorem 1.
In the wireless sensor network, the idle listening time of the sensor node will fluctuate; however, but for the energy efficiency of sensor nodes, they will not enter the sleep state during all idle listening periods when working. When the sensor node is in the sleep state, the energy consumed by the sensor node in idle listening must be greater than the energy consumed by the sensor node when switching working state, i.e.,
L ( S i ) I ( S i ) T ( S i ) V s V s 2 ( I a I s ) T a s
T ( S i ) ( I a I s ) T a s 2 L ( s i ) I ( s i ) ,
where T ( S i ) is the idle listening time of sensor node in the active state. The threshold of the sleep state T ( S i ) is the minimum idle listening time when the sensor node changes from the active state to the sleep state. □
The Nash equilibrium [16] is an important solution to the optimization problems in game theory. If each player S i in the game adopts a strategy to form a strategy combination ( D S 1 , D S 2 , , D S n ) , the strategy D S i of any player S i is the best strategy for the strategy combination ( D S 1 , D S 2 , D S i 1 , D S i + 1 , , D S n ) of the remaining players in the game. In other words, the utility function u i ( D S 1 , D S 2 , D S i 1 , D S i , D S i + 1 , , D S n ) u i ( D S 1 , D S 2 , D S i 1 , D S i , D S i + 1 , , D S n ) applies for any D S i K ; thus, ( D S 1 , D S 2 , , D S n ) is the Nash equilibrium of G T .
Theorem 1 gives the threshold for the sensor node to enter the sleep state. From the utility function, it can be seen that, in the process of a staged game, the sensor nodes gain more utility by adopting the sleep strategy. According to the self-interest of the sensor nodes, when the sensor nodes reach the sleep threshold, they will take selfish actions to save their own energy; thus, in a staged game, the sensor nodes adopt the sleep strategy as the Nash equilibrium of the game. However, when the sensor nodes are working, the game is a repetitive process. It is necessary to avoid sensor nodes using only a staged Nash equilibrium, as this will lead to the decline of the overall performance of the network. In this paper, a penalty mechanism is introduced to ensure the Nash equilibrium of the whole network.

3.4.3. Penalty Mechanism of Sensor Node

In WSN, sensor nodes lack knowledge of the whole network information, and sensor nodes often adopt noncooperative strategies. In other words, sensor nodes can only choose the optimal strategy according to their own benefit, but they are not optimal from the standpoint of the entire network [35,36]. Due to the rational preference, once the sensor node enters the sleep state, it may choose to stay asleep and stop receiving and forwarding data packets to save energy consumption. This selfish behavior of node will lead to a delay or failure of data packet transmission, which will directly affect the operation mechanism of the whole wireless sensor network. In order to prevent the sensor node from taking selfish behavior, a penalty mechanism is introduced to encourage sensor nodes to wake up actively to send and receive data packets in a sleep state.
In order to ensure the normal operation of the wireless sensor network, the specific measures of the punishment mechanism adopted in this paper are as follows: when the sensor node in the wireless sensor network takes selfish behavior, the network will immediately mark the node and locate its ID. In the subsequent M rounds, the node is forced to remain in an idle listening state even if the idle listening time is longer than the sleep state threshold. The sensor nodes pay a certain price for their previous selfish behavior before, which also has a certain deterrent effect on the sensor node, forcing it to wake up in time to receive the forwarding data packets in a future sleep state.
In the condition of ensuring a sufficient deterrent to selfish sensor nodes, the premature death of sensor nodes due to too many penalty rounds can be avoided, thus destroying the balance of strategy. Therefore, how to determine the penalty rounds for sensor nodes is very important to prolong the lifetime of the whole wireless sensor network.
In order to better determine the penalty rounds of sensor nodes, this paper first defines the different benefits of the active state, sleep state, and penalty state of sensor nodes in the sensor network, thereby obtaining the utility matrix U of the sensor node as follows:
U = [ u 11 u 12 u 21 u 22 u 31 u 32 ] .
In the matrix, u α β represents the utility obtained after the sensor node takes an action, where α = 1 means that the sensor node takes a wake up action, α = 2 means that the sensor node takes a sleep action, and α = 3 means that the sensor node is punished. β = 1 means that the sensor node will forward the data packets to the next sensor node or sink node, and β = 2 means that the sensor node will not forward the data packet to the next sensor node or sink node.
Since the sensor node is working, each data forwarding of the sensor node is a game process, and the sensor node will forward many times in its lifetime; therefore, we regard the forwarding process of the sensor nodes as a repeated game [37]. According to the principle of repeated game, in each game of the sensor node, the revenue obtained by the sensor node will have a discount factor δ   ( 0 < δ < 1 ) ; if the value is larger, it means that the sensor node pays more attention to the future long-term gains. According to the discount criterion, the cumulative revenue function U i of the sensor node can be obtained as follows:
U i = m = 1 M δ m 1 U i m ,
where U i m is the revenue obtained by the sensor node S i in the m round.
It is assumed that the sensor node S i adopts a noncooperative strategy when working. In other words, when the idle listening time of the sensor node exceeds its sleep threshold after a packet is forwarded, the node will take selfish behavior after entering the sleep state and will no longer forward packet. Then, the network will mark the ID of the sensor node and force the node to stay awake in the next M rounds. According to the revenue function and cost function of the game player, it can be concluded that the utility obtained by the sensor node in the previous round and the subsequent penalty M rounds is as follows:
u 22 + m = 1 M ( u 31 ) m = 0 + m = 1 M δ m 1 U i m m = 1 M [ E s m ( S i ) + E p m ( S i ) + E t m ( S i ) + E r m ( S i ) ] ,
where ( u 31 ) m represents the utility obtained by the sensor node S i when forwarding packets in the m round penalty state, E s m ( S i ) , E p m ( S i ) , E t m ( S i ) , and E r m ( S i ) are the energy costs of sensor node S i for sensing, processing, sending, and receiving data, respectively, in the m round.
It is assumed that the sensor node S i adopts a cooperative strategy when working. In other words, the sensor node can always ensure the forwarding of the data packet, whether it is in the active state or the sleep state. To simplify the discussion, it is assumed that the sensor node will go to sleep when it reaches the threshold T ( S i ) . Therefore, it can be concluded that the utility obtained by the node in the previous round and the subsequent M rounds is
u 21 + ( 1 p ) m = 1 M ( u 11 ) m + p m = 1 M ( u 21 ) m = G P [ E p ( S i ) + E t ( S i ) + E r ( S i ) + E w ( S i ) ] + ( 1 p ) [ ( m = 1 M δ m 1 U i m ) m = 1 M ( E s m ( S i ) + E p m ( S i ) + E t m ( S i ) + E r m ( S i ) ) ] , + p [ ( m = 1 M δ m 1 U i m ) m = 1 M ( E p m ( S i ) + E t m ( S i ) + E r m ( S i ) ) M E w ( S i ) ]
where ( u 11 ) m and ( u 21 ) m represent the utility of forwarding data packets of sensor nodes in the active state and sleep state, respectively; p is the proportion of the sensor node S i entering the sleep state in the M rounds. In this paper, we define the average distribution of actual idle listening time within the maximum idle listening time; therefore, the probability density function of idle listening time t is as follows:
f ( t ) = { 1 T max t ( 0 , T max ) 0 O t h e r ,
where T max is the maximum idle listening time of the sensor node in actual work. Therefore, it can be concluded that the probability of the sensor node S i entering the sleep state in the M round is as follows:
p = T ( S i ) T max ( S i ) 1 T max d t = 1 T ( S i ) T max ( S i ) .
In order to ensure the balance of strategies and avoid the premature death of sensor nodes caused by excessive punishment, which can not only deter selfish nodes, but also prolong the lifetime of sensor nodes to the maximum, the following relationship is established:
u 22 + m = 1 M ( u 31 ) m u 21 + ( 1 p ) m = 1 M ( u 11 ) m + p m = 1 M ( u 21 ) m .
Substituting Equations (18) and (19) into Equation (22), we can get
p M E w ( S i ) G P [ E p ( S i ) + E t ( S i ) + E r ( S i ) + E w ( S i ) ] + p m = 1 M E s m ( S i ) .
Since the idle listening time is evenly distributed, the average idle listening time without entering the sleep state is T ( S i ) 2 ; thus, the following relationship can be obtained:
m = 1 M E s m ( S i ) M T ( S i ) 2 L ( S i ) I ( S i ) V s .
Substituting Equation (24) into Equation (23), we can get
M 2 [ E p ( S i ) + E t ( S i ) + E r ( S i ) + E w ( S i ) ] 2 G P p [ 2 E w ( S i ) T ( S i ) L ( S i ) I ( S i ) V s ] .
Equation (25) gives the range of the number of rounds to punish the sensor node S i taking selfish behavior under the punishment mechanism. According to the definition of the Nash equilibrium, it can be determined that, when the number of penalty rounds M takes the minimum value, it is the Nash equilibrium of the whole network. In this case, it can not only ensure a sufficient deterrent effect on the sensor nodes, but also avoid premature energy depletion of the sensor node due to the excessive penalty rounds.

3.5. Algorithm Description

The sensor nodes are responsible for collecting and transmitting information in the wireless sensor network. In this paper, it is set that the sensor nodes can reasonably switch between idle listening and sleep states, thus reducing unnecessary energy consumption of sensor nodes during idle listening time, as well as avoiding the energy burden caused by frequent switching between idle listening and sleep states. Combining the game process of sensor nodes in idle listening and sleeping states, the steps of the proposed method for sensor nodes in the wireless sensor network are given in Algorithm 1.
Algorithm 1 Proposed Algorithm
1.Initialize:
2.N = total nodes
3.Dead = 0 //the number of dead nodes.
4.Begin
5.for i = 1:N
6.   if S ( i ) · E > 0     //If node is alive
7.    Cluster formation
8.    Record the ID of node
9.    if The sensor nodes need to forward the data
10.       The sensor nodes forward the data
11.    else
12.       Calculate the sleep threshold T ( S i )
13.       if  T ( S i ) T ( S i )
14.        The sensor node remains idle listen
15.       else
16.        The sensor node will enter the sleep state from idle listening
17.       end if
18.    end if
19.   else
20.    Dead = Dead +1
21.    if DeadN
22.       End of simulation
23.    end if
24.   end if
25.end for
The normal operation of a wireless sensor network is not only related to the number of dead sensor nodes, but also depends on the number of dormant nodes. In order to maintain the normal operation of the sensor network, a penalty mechanism is introduced to punish the sensor nodes in the sensor network for taking selfish behavior and force the sensor nodes to adopt cooperative strategies in future network operation. Therefore, according to the characteristics of the sensor network, the steps of the proposed method for the sensor network is given in Algorithm 2.
Algorithm 2 Proposed Algorithm
1.Initialize:
2.r = current round
3.Begin
4.for r = 1:max
5.   if the sensor network operating normally
6.    The sensors nodes are clustered
7.    if the sensor in the cluster adopt cooperative strategy
8.       The sensor node decides their own state according to the game strategy
9.    else
10.       Calculate the number of penalty rounds M
11.       Mark the ID of the nodes and punish M rounds
12.    end if
13.   else
14.    End of simulation
15.   end if
16.end for

4. Analysis

In order to verify the effectiveness of the algorithm for the lifetime of the sensor node, in this paper, MATLAB was used to simulate the low-energy adaptive clustering hierarchy (LEACH) [38,39,40,41,42], distributed energy efficient clustering (DEEC) [43,44,45,46], improved LEACH-centralized (LEACH-C) [47,48], localized game theoretical clustering algorithm (LGCA) [24,27], and our algorithm. The advantages of WSN sensor nodes in terms of lifetime, data transmission, and node survival state are then evaluated. In this paper, 100 sensor nodes were randomly distributed in an area of 100 × 100 , and the sink node was set at (50, 50). Once the sensor nodes were arranged, energy was no longer supplied. The specific parameter settings during simulation are shown in Table 2.
Table 2. Simulation parameters.
Figure 3 shows the dead node comparison among LEACH, DEEC, LEACH-C, LGCA, and the game theory-based energy-efficient clustering algorithm (GEC) proposed in this article. The slope of the death node change curve of the GEC algorithm was obviously lower than that of LEACH, DEEC, LEACH-C, and LGCA. After the first node death in the GEC algorithm, the sensor nodes across a large area began to die. After 3500 rounds, the speed of node death was significantly reduced, and the lifetime of the network was better extended.
Figure 3. The network dead node comparison.
Figure 4 shows a histogram of the five algorithms in terms of the number of rounds after which the first node dies (FND), the tenth node dies (TND), half of the nodes die (HND), and the last node dies (LND) in the sensor network. LEACH, DEEC, LEACH-C, LGCA, and GEC exhibited FND after 1576, 1611, 1795, 1808, and 1888 rounds, respectively. Compared with LEACH, DEEC, LEACH-C, and LGCA, the number of FND rounds in GEC was extended by 19.80%, 17.19%, 5.18%, and 4.42% respectively. LEACH, DEEC, LEACH-C, LGCA, and GEC exhibited TND after 1770, 1841, 1995, 2089, and 2154 rounds, respectively. Compared with LEACH, DEEC, LEACH-C and LGCA, the number of TND rounds in GEC was extended by 21.69%, 17.00%, 7.97%, and 3.11%, respectively. LEACH, DEEC, LEACH-C, LGCA, and GEC exhibited HND after 2299, 2242, 2664, 2787, and 2855 rounds, respectively. Compared with LEACH, DEEC, LEACH-C, and LGCA, the number of HND rounds in GEC was extended by 24.18%, 27.34%, 7.17%, and 2.44% respectively. LEACH, DEEC, LEACH-C, LGCA, and GEC exhibited LND after 3417, 3379, 3817, 3952, and 4343 rounds, respectively. Compared with LEACH, DEEC, LEACH-C, and LGCA, the number of LND rounds in GEC was extended by 27.10%, 28.53%, 13.78%, and 9.89% respectively. In this paper, GEC had an advantage in terms of the emergence of FND, TND, HND, and LND in the sensor network, thus prolonging the network lifetime and better ensuring the normal operation of the network.
Figure 4. The network lifetime comparison.
Figure 5 shows the amount of data transmitted by the sensor network in its lifetime, i.e., the amount of data received by the sink node. Compared with LEACH, DEEC LEACH-C, and LGCA, the data transmission capacity of the GEC was increased by 482.52%, 172.20%, 10.27%, and 5.71%, respectively. To address the problem of limited energy in a WSN, the GEC in this paper can not only prolong the service life of the network, but also greatly increase the data transmission volume of the network.
Figure 5. The network data transmission comparison.
Figure 6 shows the change in residual energy of the sensor network with network rounds for the five different algorithms. It can be clearly seen from the figure that the GEC algorithm used in this paper was obviously better than the other four algorithms under the same number of rounds. In addition, the slope of the GEC algorithm was the smallest among the five curves, indicating that the energy consumption of the GEC algorithm was also the lowest. For example, as shown in Figure 7, compared with LEACH, DEEC, LEACH-C, and LGCA, the energy savings of GEC in the 1000th round were 12.33%, 12.36%, 4.14%, and 1.51% respectively. Compared with LEACH, DEEC, LEACH-C, and LGCA, GEC saved 29.52%, 29.46%, 9.01%, and 3.23% energy, respectively, in the 1500th round. After 2000 rounds, compared with LEACH, DEEC, LEACH-C, and LGCA, GEC could save 70.53%, 79.05%, 20.14%, and 6.43% energy, respectively. In addition, GEC could save 185.09%, 188.37%, 32.05%, and 10.27% energy, respectively, after 2500 rounds compared to LEACH, DEEC, LEACH-C, and LGCA.
Figure 6. The residual energy of network.
Figure 7. Comparison of residual energy of the network running different rounds.
In addition, the FND, TND, HND, and LND with variation in nodes are provided in Figure 8 in stacked form. When deploying a different number of sensor nodes in the same area, i.e., a different number of sensor nodes were distributed in a network cross-section of 100 × 100, the algorithm adopted in this paper was still superior to the other four algorithms. Figure 9 shows the stacked bar chart of FND, TND, HND, and LND with the same number of sensor nodes ( n = 100 ) distributed in different cross-sections. As the deployment cross-section increased, the performance of the sensor network gradually declined. This is because the range of the deployment cross-section increased, and the distance for sensor nodes to transmit information increased; hence, the energy consumed by the sensor node to send information increased, while the lifetime of the sensor network decreased. However, under the same situation, the performance of this algorithm was better than the other four algorithms.
Figure 8. Network lifetime vs. node variation.
Figure 9. Network lifetime vs. network cross-section variation.
Figure 10 shows the change in network throughput when different numbers of sensor nodes were deployed in the same network cross-section (100 × 100). With the increase in the number of deployed sensor nodes, i.e., an increase in throughput, the GEC algorithm adopted in this paper always outperformed the other four algorithms. Figure 11 shows the change in network throughput when the same sensor nodes ( n = 100 ) were deployed in different network cross-sections. With the increase in network cross-section, the network throughput decreased, but the GEC algorithm adopted in this paper was always better than the existing protocols.
Figure 10. Throughput vs. node variation.
Figure 11. Throughput vs. network cross-section variation.

5. Discussion

In the same area, the same number of sensor nodes was deployed. Compared with the existing LEACH, DEEC, LEACH-C, and LGCA algorithms, the GEC algorithm adopted in this paper could effectively prolong the life cycle of the network (Section 4, Figure 3) and greatly improve the stability of the network (Section 4, Figure 4). The data throughput of the network was also increased (Section 4, Figure 5), and the energy of the sensor network could be effectively saved (Section 4, Figure 6 and Figure 7). When different numbers of sensor nodes were deployed in the same network cross-section, the GEC algorithm could still effectively improve the stability of the network and greatly increase the data throughput of the network (Section 4, Figure 8 and Figure 10). Similarly, when the same number of sensor nodes was deployed in different network cross-sections, the performance of the GEC algorithm in WSN was still better than the other four algorithms (Section 4, Figure 9 and Figure 11). This is because the sensor nodes could rationally enter the sleep state during idle listening time by using game theory, thereby reducing the energy consumption of sensor nodes and effectively improving the WSN performance.
The development of the Internet of things (IoT) has already had a great impact on people’s lives [49]. The IoT consists of three parts, sensor network, transmission network, and application network, and the sensor network composed of wireless sensor nodes is an important part of the IoT. Its function is to sense, collect, process, and transmit the information in the area covered by the network in a cooperative way, relaying the information to the users. Therefore, the sensor network plays a vital role in the development and application of the IoT. Because of the low cost, low power consumption, and fault tolerance of the wireless sensor network, even if some nodes are damaged, the whole network will not be paralyzed. This ensures that the sensor network can still provide accurate and reliable information in a harsh environment. Therefore, WSNs can be widely used in many areas such as the military field, forest environment monitoring, and intelligent transportation.
Energy is the basis of a node working, and the energy saving problem is an important factor that limits the development of WSNs and the IoT. Therefore, this paper proposed a game theory-based energy-efficient clustering algorithm, which can effectively reduce the energy consumption of sensor nodes in idle listening time and greatly improve the performance of the WSN. In future work, we will try to build a dynamic game model in a heterogeneous environment, so that the game model can be more widely used to improve the lifetime of WSNs and provide an energy guarantee for the application and development of WSNs and IoT.

6. Conclusions

In the condition of limited energy, in order to prolong the service life of sensor nodes in a WSN, a model based on repeated games was established, and the strategy adopted by sensor nodes was determined by studying the length of the idle listening stage. When the idle listening time is longer than the sleep threshold, the sensor node enters the sleep state to save energy consumption. When the idle listening time is less than the threshold of the sleep state, the sensor node remains in an idle listening state, which reduces the energy consumption caused by the transition between the sleep state and the active state of the sensor node. In order to prevent the sensor node from adopting a noncooperative strategy after going to sleep, this paper also proposed a punishment mechanism for the sensor node. This not only ensures strategic balance, but also acts as a deterrent to selfish nodes, forcing them to adopt cooperative strategies in future operations. The simulation results show that the game theory-based energy-efficient clustering algorithm is effective in saving energy consumption of the sensor network, increasing the data transmission of sensor nodes, and extending the lifetime of sensor nodes.

Author Contributions

Conceptualization, C.H.; methodology, X.Y., X.W., J.G., and C.H.; software, X.Y.; validation, X.Y., X.W., J.G. and C.H.; formal analysis, X.W.; writing—original draft preparation, X.Y.; writing—review and editing, X.Y. and C.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (NSFC) (61702251 and 52062038), Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX21_0313).

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Institutional Review Board.

Data Availability Statement

The study did not report any data.

Acknowledgments

The authors would like to thank all the editors and anonymous reviews for their professional comments and suggestions, which greatly improved the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. A Survey on Sensor Networks. IEEE Commun. Mag. 2002, 40, 102–114. [Google Scholar] [CrossRef] [Green Version]
  2. Fernandezlozano, J.; Martinguzman, M.; Martinavila, J.; Garciacerezo, A. A wireless sensor network for urban traffic characterization and trend monitoring. Sensors 2015, 15, 26143–26169. [Google Scholar] [CrossRef] [PubMed]
  3. Muduli, L.; Mishra, D.P.; Jana, P.K. Application of wireless sensor network for environmental monitoring in underground coal mines: A systematic review. J. Netw. Comput. Appl. 2018, 106, 87–97. [Google Scholar] [CrossRef]
  4. Yong, Q.D.; Chen, Y.; Ye, X.W. Lifetime of WSN research based on energy balance. Appl. Mech. Mater. 2013, 303, 231–235. [Google Scholar] [CrossRef]
  5. Teng, Z.J.; Lu, J.L.; Zhang, L.; Guo, L.W. Based on game theory algorithm in nodes power control of WSN. Control Theor. Appl. 2018, 35, 717–721. [Google Scholar]
  6. Liu, Z.L.; Song, S.H. A Awakening Scheduling Approach for Wireless Sensor Networks Partial Coverage. Chin. J. Sens. Actuat. 2018, 31, 786–791. [Google Scholar]
  7. Chen, S.; Wang, M.J. A new clustering optimization slgorithm for multi-level energy heterogeneous wireless sensor networks. Microelectron. Comput. 2016, 33, 42–46. [Google Scholar]
  8. Huan, X.T.; Kim, K.S.; Lee, S.; Lim, E.G.; Marshall, A. A beaconless asymmetric energy-efficient time synchronization scheme for resource-constrained multi-hop wireless sensor networks. IEEE Trans. Commun. 2020, 68, 1716–1730. [Google Scholar] [CrossRef] [Green Version]
  9. Chamanian, S.; Baghaee, S.; Ulusan, H.; Zorlu, O.; Uysalbiyikoglu, E.; Kulah, H. Implementation of energy-neutral operation on vibration energy harvesting WSN. IEEE Sens. J. 2019, 19, 3092–3099. [Google Scholar] [CrossRef]
  10. Ashween, R.; Ramakrishnan, B.; Joe, M.M. Energy efficient data gathering technique based on optimal mobile sink node selection for improved network life time in wireless sensor network (WSN). Wirel. Pers. Commun. 2020, 113, 2107–2126. [Google Scholar] [CrossRef]
  11. Zhang, S.Q.; Tao, Y.; Dai, J.J. Multi-hop clustering routing protocol for energy harvesting wireless sensor networks. Comput. Eng. Des. 2019, 40, 611–616, 622. [Google Scholar]
  12. Abrardo, A.; Balucanti, L.; Mecocci, A. Optimized dual low power listening for extending network’s lifetime in multi-hops wireless sensor networks. In Proceedings of the 2011 Wireless Telecommunications Symposium (WTS), New York, NY, USA, 13–15 April 2011; pp. 1–7. [Google Scholar]
  13. Feng, X.; Chong, S.; Zhang, K.; Li, H.; Gao, Q.; Wang, C. Optimization of T-MAC Protocol in WSN Based on Minimum Contention Window. DEStech T. Comput. Sci. Eng. 2018, 142–147. [Google Scholar] [CrossRef]
  14. Wang, Z.L.; Zheng, X. k-Cover Based-Sleep Scheduling Algorithm for Redundant Node in Heterogeneous WSNs. Chin. J. Sens. Actuat. 2017, 30, 1422–1426. [Google Scholar]
  15. Kassan, S.; Gaber, J.; Lorenz, P. Game theory based distributed clustering approach to maximize wireless sensors network lifetime. J. Netw. Comput. Appl. 2018, 123, 80–88. [Google Scholar] [CrossRef] [Green Version]
  16. AlSkaif, T.; Zapata, M.G.; Bellalta, B. Game theory for energy efficiency in wireless sensor networks: Latest trends. J. Netw. Comput. Appl. 2015, 54, 33–61. [Google Scholar] [CrossRef]
  17. Shen, S.; Ma, H.; Fan, E.; Hu, K.; Yu, S.; Liu, J.; Cao, Q. A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion. J. Netw. Comput. Appl. 2017, 91, 26–35. [Google Scholar] [CrossRef]
  18. Shi, H.Y.; Wang, W.L.; Kwok, N.M.; Chen, S.Y. Game theory for wireless sensor networks: A survey. Sensors 2012, 12, 9055–9097. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Bhuiyan, B.A. An overview of game theory and some applications. Philos. Prog. 2018, 59, 111–128. [Google Scholar] [CrossRef]
  20. Habib, M.A.; Moh, S. Game theory-based routing for wireless sensor networks: A comparative survey. Appl. Sci. 2019, 9, 2896. [Google Scholar] [CrossRef] [Green Version]
  21. Wu, D.; Cai, Y.M.; Zhou, L.; Wang, J.L. A cooperative communication scheme based on coalition formation game in clustered wireless sensor networks. IEEE Trans. Wirel. Commun. 2012, 11, 1190–1200. [Google Scholar] [CrossRef]
  22. Lin, D.Y.; Wang, Q. An energy-efficient clustering algorithm combined game theory and dual-cluster-head mechanism for WSNs. IEEE Access. 2019, 7, 49894–49905. [Google Scholar] [CrossRef]
  23. Hendrarini, N.; Asvial, M.; Sari, R.F. Optimization of heterogeneous sensor networks with clustering mechanism using game theory algorithm. In Proceedings of the 2nd International Conference on Software Engineering and Information Management, New York, NY, USA, 10–13 January 2019; pp. 25–29. [Google Scholar]
  24. Liu, Q.W.; Liu, M.D. Energy-efficient clustering algorithm based on game theory for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717743701. [Google Scholar]
  25. Yang, L.; Lu, Y.Z.; Zhong, Y.C.; Wu, X.G.; Xing, S.J. A hybrid, game theory based, and distributed clustering protocol for wireless sensor networks. Wirel. Netw. 2016, 22, 1007–1021. [Google Scholar] [CrossRef]
  26. Truong, C.D.; Khan, M.A.; Sivrikaya, F.; Albayrak, S. Cooperative game theoretic approach to energy-efficient coverage in wireless sensor networks. In Proceedings of the 2010 Seventh International Conference on Networked Sensing Systems (INSS), Kassel, Germany, 15–18 June 2010; pp. 73–76. [Google Scholar]
  27. Yang, L.; Lu, Y.Z.; Xiong, L.; Tao, Y.; Zhong, Y.C. A game theoretic approach for balancing energy consumption in clustered wireless sensor networks. Sensors 2017, 17, 2654. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Kim, S. A better-performing Q-learning game-theoretic distributed routing for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718754728. [Google Scholar] [CrossRef]
  29. Thandapani, P.; Arunachalam, M.; Sundarraj, D. An energy-efficient clustering and multipath routing for mobile wireless sensor network using game theory. Int. J. Commun. Syst. 2020, 33, e4336. [Google Scholar] [CrossRef]
  30. Raj, P.; Khedr, A.M.; Aghbari, Z.A. Data gathering via mobile sink in WSNs using game theory and enhanced ant colony optimization. Wirel. Netw. 2020, 26, 2983–2998. [Google Scholar] [CrossRef]
  31. Hu, S.; Wang, X. Game Theory on Power Control in Wireless Sensor Networks Based on Successive Interference Cancellation. Wirel. Pers. Commun. 2020, 111, 33–45. [Google Scholar] [CrossRef]
  32. Zhang, J.; Yin, J.; Xu, T.; Gao, Z.; Qi, H.; Yin, H. The optimal game model of energy consumption for nodes cooperation in WSN. J. Amb. Intel. Hum. Comp. 2020, 11, 589–599. [Google Scholar] [CrossRef]
  33. Halgamuge, M.N.; Zukerman, M.; Ramamohanarao, K.; Vu, H.L. An estimation of sensor energy consumption. Prog. Electromag. Res. B. 2009, 12, 259–295. [Google Scholar] [CrossRef] [Green Version]
  34. Pati, B.; Sarkar, J.L.; Panigrahi, C.R. Ecs: An energy-efficient approach to select cluster-head in wireless sensor networks. Arab. J. Sci. Eng. 2017, 42, 669–676. [Google Scholar] [CrossRef]
  35. Banerjee, A.; Gauthier, V.; Labiod, H.; Afifi, H. Cooperation optimized design for information dissemination in vehicular networks using evolutionary game theory. arXiv 2013, arXiv:1301.1268. [Google Scholar]
  36. Zhang, J.; Gauthier, V.; Labiod, H.; Banerjee, A.; Afifi, H. Information dissemination in vehicular networks via evolutionary game theory. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 124–129. [Google Scholar]
  37. Zhang, C.; Dong, Y.; Lv, Y.; Su, Z.Z. Cooperative research of WSN nodes based on repeated game theory. J. Cent. South Univ. 2017, 48, 1762–1768. [Google Scholar]
  38. Singh, K. WSN LEACH based protocols: A structural analysis. In Proceedings of the 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, Canada, 15–17 October 2015; pp. 1–7. [Google Scholar]
  39. Pasha, M.A.; Khan, J.H.; Masud, S. I-leach: Energy-efficient routing protocol for monitoring of irrigation canals. Simul.-Trans. Soc. Mod. Sim. 2015, 91, 750–764. [Google Scholar] [CrossRef]
  40. Tang, G.M.; Li, L.Y.; Gao, J.P. IR-LEACH: An improved LEACH protocol for WSN. Appl. Mech. Mater. 2013, 373, 388–392. [Google Scholar] [CrossRef]
  41. Felicia, E.; Apietu, K.F.; Jamal-Deen, A.; Sarpong, A.M.K.; Kataka, B.F. Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques. Wirel. Commun. Mob. Com. 2018, 2018, 8035065. [Google Scholar]
  42. Sinde, R.; Begum, F.; Njau, K.; Kaijage, S. Lifetime improved WSN using enhanced-LEACH and angle sector-based energy-aware TDMA scheduling. Cogent. Eng. 2020, 7, 1795049. [Google Scholar] [CrossRef]
  43. Nugraha, F.A.; Sudiharto, D.W.; Karimah, S.A. The comparative analysis Between LEACH and DEEC based on the number of nodes and the range of coverage area. In Proceedings of the 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 21–22 September 2019; pp. 440–445. [Google Scholar]
  44. Nehra, V.; Sharma, A.K.; Tripathi, R.K. I-DEEC: Improved DEEC for blanket coverage in heterogeneous wireless sensor networks. J. Amb. Intel. Hum. Comp. 2019, 11, 3687–3698. [Google Scholar] [CrossRef]
  45. Verma, A.; Kumar, S.; Gautam, P.R.; Rashid, T.; Kumar, A. Fuzzy logic based effective clustering of homogeneous wireless sensor networks for mobile sink. IEEE Sens. J. 2020, 20, 5615–5623. [Google Scholar] [CrossRef]
  46. Murugan, K.; Pathan, A.S.K. Prolonging the lifetime of wireless sensor networks using secondary sink nodes. Telecommun. Syst. 2016, 62, 347–361. [Google Scholar] [CrossRef]
  47. Mechta, D.; Harous, S. Improving LEACH-C using sink mobility. In Proceedings of the 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 20–22 October 2016; pp. 1–6. [Google Scholar]
  48. Sivakumar, P.; Radhika, M. Performance analysis of LEACH-GA over LEACH and LEACH-C in WSN. Proced. Comput. Sci. 2018, 125, 248–256. [Google Scholar] [CrossRef]
  49. Fizza, K.; Banerjee, A.; Mitra, K.; Jayaraman, P.P.; Ranjan, R.; Patel, P.; Georgakopoulos, D. QoE in IoT: A vision, survey and future directions. Discov. Internet Things 2021, 1, 4. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.