A Robust and Energy-Efficient Weighted Clustering Algorithm on Mobile Ad Hoc Sensor Networks †

In an Ad hoc sensor network, nodes have characteristics of limited battery energy, self-organization and low mobility. Due to the mobility and heterogeneity of the energy consumption in the hierarchical network, the cluster head and topology are changed dynamically. Therefore, topology control and energy consumption are growing to be critical in enhancing the stability and prolonging the lifetime of the network. In order to improve the survivability of Ad hoc network effectively, this paper proposes a new algorithm named the robust, energy-efficient weighted clustering algorithm (RE2WCA). For the homogeneous of the energy consumption; the proposed clustering algorithm takes the residual energy and group mobility into consideration by restricting minimum iteration times. In addition, a distributed fault detection algorithm and cluster head backup mechanism are presented to achieve the periodic and real-time topology maintenance to enhance the robustness of the network. The network is analyzed and the simulations are performed to compare the performance of this new clustering algorithm with the similar algorithms in terms of cluster characteristics, lifetime, throughput and energy consumption of the network. The result shows that the proposed algorithm provides better performance than others.


Introduction
A collection of mobile nodes can make up mobile Ad hoc sensor networks, which are not intervened on by any centralized access point [1,2].In order to assist other nodes in the network to build information links, nodes can be used as router or terminal or both of them [3,4].Mobile Ad hoc sensor network can be utilized in these scenarios, such as military and habitat monitoring [5,6], target tracking network [7,8].For example, in the animal tracking system, sensor nodes are loaded on the body of animals in order to observing animal behavior.Generally, the animals (such as zebras, elephants etc.) have the low group mobility.Additionally, the sensor nodes cannot be charged in this situation.Hence, the energy consumption is a vital problem for the limitation of the energy.Moreover, since the animals live in a relatively bad environment, the fault node will be a necessary part needed to be considered.Therefore, our proposed protocol is motivated by this kind of applications.
It has been proved that clustering in hierarchical structure is an effective scheme to improve the network survivability [9,10].In [9], it is introduced that the clustering method of fuzzy logic theory in the ECPF protocol.At the same time, in order to solve the problem of clustering non-uniformity, LEACH-C algorithm is proposed in [10] and the residual energy and location of the cluster node are decided by the base station.However, how to elect the optimal cluster heads (CHs) and how can the optimal number of nodes be assigned become the bottleneck [11][12][13].The structure of cluster is especially more significant in large scale network.Instead of using gateways to exchange data packet, nodes in the network are distributed and confined within each cluster.The cluster members only need to collect data and transmit packet to CHs.
Though the process of clustering will consume a little of energy, the overhead of routing control can be reduced a lot.Apart from above, the measurement will cause some difficulties due to the high mobility of nodes.In this paper, a high density network is considered, so we adopt the specific group mobility model [14][15][16].In order to reduce the re-clustering times and save more energy, the novel mobility measurement is adopted.Nodes with similar motion pattern will form into a group or a cluster.The linear displacement of nodes is based on the record of history movement.The displacement index of each node will be calculated only when their displacement goes beyond the cluster range.
Consequently, robustness of network is becoming a hotspot because the network has characteristics of dynamic topology, limited energy and mobility.Currently, a number of researches on robustness have been done in the mobile Ad hoc network.Reasonable fault management framework can enhance work efficiency of nodes, which can improve the robustness [17,18].A strong robust network will be utilized in different scenarios.
Currently, the proposed algorithms have taken fault tolerance and energy-efficiency into consideration and make some progress on fault detection and CH election.However, to some degree, only consideration of fault detection and energy-efficiency is unilateral to network, which neglected the mobility of nodes.Therefore, in order to render the energy consumption more homogenized, a robust and energy-efficient weighted clustering algorithm is adopted, which considers the group mobility and the residual energy.Meanwhile, for the purpose of enhancing the robustness of the network, a topology maintenance algorithm is proposed to control when the topology need be maintained.Our algorithm, A Robust, Energy-efficient Weighted Clustering Algorithm (RE 2 WCA), achieves the tradeoff of energy-efficiency and robustness and the following goals of our algorithm is demonstrated as below: (1) For purpose of achieving load balance of cluster head, the clustering algorithm we proposed takes group mobility and residual energy into account to adapt to the change of network.Clustering times will be dramatically reduced due to the group mobility.(2) Design a periodic fault detection protocol to exclude the fault node otherwise leading to paralysis of the network.The protocol is based on a clustering structure which integrates the advantages of centralized and distributed scheme.(3) Combine topology protocol and clustering algorithm systematically to enhance lifespan and robustness of mobile Ad hoc network.
The structure of this paper is organized as followed: An overview of related work is given in Section 2. A fault detection algorithm and RE 2 WCA algorithm are described in detail in Section 3. The topology maintenance process is demonstrated in Section 4.1 and the inter-cluster and intra-cluster communication is demonstrated in Section 4.2; Simulation results and discussion are provided in Section 5; Section 6 concludes the paper.

Related Work
There are various clustering algorithms for mobile Ad hoc network.Among them, lowest relative mobility clustering algorithm (MOBIC) based on mobility is proposed [19].The algorithm regards the relative mobility between nodes as the criterion of cluster header selection.WCA and DWCA are put forward in terms of weight clustering [20,21].Although both of them take the mobility, the limited energy and the degree of nodes into consideration, it is also not involved in how to enhance the robustness and anti-attacks ability.Based on energy-efficiency of network, HEED forms clusters through a distributed scheme to render the energy consumption of network communication minimized [22].The algorithm elects the cluster heads based on the residual energy of nodes, which means that the nodes with high residual energy are more possible to be elected as cluster head than other nodes.Based on fuzzy c-means clustering, an energy efficient CH selection is put forward [22].
The cluster structure is optimized to consume less energy.However, in order to make a right decision, the fuzzy c-means protocol has to collect more information, which actually needs more energy and shortens the lifespan of network.So, the performance of the algorithm is not better due to the optimized structure.In [23], based on residual energy and trust value, a cluster head selection is put forward.The trust value according to the interactive history and residual energy of each node are calculated to be used as the criterion of selecting cluster head.
In [24], a distributed fault tolerant topology control scheme based on cooperative communication is proposed.In the literature, the author first defined the k-connectivity and constructed a t-spanner with k-connectivity of an arbitrary communication network.The scheme enhances the fault tolerance ability and also takes the advantages of the cooperative communication to reduce the power consumption.Other algorithms also have their concentration on how to construct redundant backbone and k-connected graph network [25][26][27].In addition, in order to overcome the malicious attack, trust model through the weighted method with direct trust and recommendation trust is proposed [28].In the literature, author builds a trust model to measure whether a node is a malicious node or not.However, since the multi-hop recommendation messages forwarding, each node consumed much energy although the security of the network and fault tolerance is enhanced.Especially when the route is long, the transmission delay and throughput of the whole network are seriously decreased.
In the literature [29], the author adopts a voting scheme in sparse sensor network to obtain each statue of fault node.However, this scheme based on crowd-sourcing will increase the complexity of algorithm and decrease the network lifetime.Additionally, the algorithm is based on a flat structure and the routing overhead will be amplified.Besides many high complexity algorithms are presented to solve the problem of fault node with a flat structure instead of clustering [30][31][32], however, it also results in energy depletion of the sensors nodes.In [33], a full 2-connectivity restoration (F2CRA) algorithm and partial 3-connectivity restoration algorithm (P3CRA) algorithm for connectivity restoration are put forward.The topology quality and network coverage are taken into consideration when enhancing the fault tolerance and restoration.Unfortunately, the algorithm is executed in a flat structure so that when the network scale becomes large, the complexity of the calculation is increasing dramatically.Consequently, the P3CRA algorithm is not suitable for the large scale wireless sensor networks.In summary, these above algorithms sacrifice the validity for the sake of reliability.Therefore, a method and protocol which does not increase the connectivity of the network but enhances the fault tolerance ability with a hierarchical structure are motivated.

Energy Consumption Model
The battery power of each nodes in network are assigned identically.Equations ( 1) is adopted to calculate the energy consumption of sending data and Equation (2) for receiving data [15]: In Equations ( 1) and ( 2), E elec is required energy for activating the electronic circuits; if the transmission distance is less than the threshold d 0 , the consumption of energy amplification adopts the free space model.If the transmission range is greater than the threshold d 0 , the energy amplification adopts the multipath attenuation model.ε fs and ε amp are required energy for amplification of transmitted signal to transmit one bit in open space and multipath models respectively; l denotes the number of bits of data; d is the distance between two nodes; E t (d,l) is the energy consumption of the sending end; E r (l) is the energy consumption of the receiving end.The residual energy [6] of each node is calculated by Equation ( 3): In Equation ( 3), E initial i is the initial or max energy of each node i; E residual i demonstrates the residual energy of each node i after transmitting data.
When each node begins to send data packets, the summation of energy in each cluster can be calculated.In this paper, one of the significant threshold is topology maintenance energy threshold value.When the average of CHs' energy lower than this value, the re-clustering process will be implemented.
Taking the difference of energy of each cluster into account, the average energy within cluster is implied as the inner cluster average energy.Only when the residual energy of cluster head is lower than the value, the process of new cluster head selection will start.Therefore, Equation ( 4) is adopted to calculate the inner cluster average energy.In Equation ( 4), C k represents each cluster and if a node belongs to one of the clusters, then j ∈ C k .

Mobility Measurement
MOBIC [19] is a mobility-aware clustering scheme.Instead of using the node's ID, MOBIC adopts the relative metric to measure the mobility of the nodes.However, if mobile nodes move in an arbitrary manner, the diversity with other nodes is dominant.Even if some nodes have similar motion but a few others move differently.It still results in dramatic increase in the variance.It shows the variance is greatly influenced by the diverse motion.
In the paper, a group mobility protocol is adopted to measure whether a node has possibility to be elected as cluster head.The higher group mobility of one node implies it has the similar mobility pattern with the majority of its neighbors [14].Thus, it suits to be elected as CH. Figure 1 shows the derivation process and motion model of the nodes.
Based on record of last movement, the linear displacement of each node can be calculated in real time.The linear displacement of each node will be figured out as soon as nodes move in the network.
Then, the relative direction and speed ratio are considered to calculated the spatial dependency between nodes.In addition, the history cache can be updated.
As is shown in Figure 1, the displacement of node i is lower than D thr and consequently this record will not be updated into the history cache.From moment T to t', the displacement D' of node j is greater than D thr and consequently the history cache is updated.In addition, from moment t' to t, movement of node j D is still greater than the D thr , hence the record will be entered into the history cache.
Hence, only when node moves, the calculation process will be implement and not all nodes need to save their record into cache due to the cluster radius threshold.Nodes which have the frequent and great displacement will consume more energy for their mobility.Therefore, it is small probability of these nodes to be elected as CHs.Within a cluster or a group, the CH needs to be rotated for the homogenization of energy.Here, we define the spatial dependency with CH as CHSD which demonstrates that each round cluster members need to calculate the spatial dependency with current CH.In order to describe the spatial dependency with CH (CHSD), the following measurements will be demonstrated.Table 1 gives the detailed explanation of parameters used in Figure 1.Table 1 gives the detailed explanation of parameters used in Figure 1.According to Algorithm 1, relative direction (RD) and speed radio (SR) at one moment t between one node i and cluster head are measured respectively as Algorithm 1 Group mobility computing process dx Ti = x ti − x Ti dy Ti = y ti − y Ti where t is the current time and x ti , x Ti , y ti , y Ti are the coordinates of the node i from time T to t, respectively.Hence the displacement and angle can be calculated by: If D ≥ D thr , the most recent record of speed and direction that will be saved into the history cache are: • sgn(dy Ti ) dx Ti < 0 where T = Ti be the moment when the last record was saved for node i and θi ∈ (−π, π).The time Ti , the speed Ŝi , the direction θi and the present location of node i will be recorded into the history cache with x Ti = x ti , y Ti = y ti , Ti = t.RD(i, ch, t) = cos θi (t) − θch (t) (5) Hence, the CHSD can be calculated by: The range of CHSD is between [-1, 1].If CHSD is very close to 1, it indicates the nearly same motion with CH otherwise the less similarity with CH.CH has the feature of maximum similarity and lower mobility and it is elected in the last round.However, in the current round, CH is a very ordinary node and it still needs to calculate the speed, the angle.But nodes now will not compare with each other, instead, with CH.It is the improvement compared with original measurement.It dramatically decreases the complexity of calculation and reduces great energy consumption.Additionally, the maximum of CHSD will be appropriate to be elected as CH.Therefore, in order to describe the stability of one cluster, it only needs to calculate the summation of CHSD.

Weight Model and Hybrid Clustering Algorithm
After the initialization of the network, one node within cluster announces the information of its cluster head.The cluster head needs to be rotated to prolong the survivability and lifespan of the network.Therefore, we put forward the weight probability average.The high weight value of node implies it has more possibility to be selected as cluster head.Hence, a weight model is proposed and its measurement is given by Equation (8): where a and b are weighted coefficient index of residual energy and group mobility feature respectively; CHSD map (i) is the spatial dependency with CH at one moment after linear mapping from [-1, 1] to [0, 1]; weight(i) denotes one node probability to be CH; C prob is an initial iteration probability.
It is obvious that the range of weight(i) value is limited with (0, 1).Additionally, the summation of a and b is set as 1.Generally, a > b is rendered.The adequate residual energy of the node implies that it can manage a cluster better than other nodes.In addition, the high group mobility of CHSD demonstrates that one of node within cluster has a high correlation with its cluster head.Hence, in order to make the times of re-clustering due to nodes' mobility, the node with a high CHSD value is elected as the cluster head in the group.In addition, we use C prob to limit the announcement of cluster head.Through calculating the weight value above, it is concluded that the nodes with high group mobility and residual energy is more suitable to be the cluster head.
Through limiting iteration of cluster head, a CH selection protocol is put forward.In order to prolong the lifetime of the network, we regard average minimum reachability power (AMRP) as the cost of election.Compared with the other types of cost, such as node degree or 1/node degree, the AMRP is a compromise between network density and load balancing.It has been proved that HEED has fewer iterations than General Cluster (GC) Scheme [34].In this paper, we consider a greater minimum iteration threshold p thr .Due to the mobility, the radius of cluster or group will be greater.However, with the increase of the radius, the iterations of GC are dramatically increased but HEED has to stop iterating for the p thr .Considering mobility of nodes, increasing p thr appropriately will reduce the iterations so that save energy.Equation (9) demonstrates the calculation: where CH prob represents the probability of each node to be CH.Through a limited iteration, CH will be elected.In every iteration, the CH prob will be doubled and until the cluster formation accomplished or finished beyond the threshold.The iteration times can be calculated: Therefore, N iter ≈ O(1).If p thr sets to 10 −4 , there is 15 iterations to end up.Actually, the greater number of iterations will consume much energy, thus it is necessary to select an appropriate iteration threshold.We define the ratio of residual energy of CH and average energy of cluster is ER (energy ratio) as Equation ( 11) described: In addition, p min = max {ER, p thr } is chosen.For Equation (11), if residual energy of cluster head is equal to the average energy of cluster approximately, ER is about 1.Therefore, the times of iteration is limited within 2. Considering an extreme case, if when the residual energy of CH is close to 10 −3 J (a totally unsuitable residual energy) and cluster average energy is 1 J, then ER = 10 −3 .Thus, if we set initial p thr = 10 −2 , then the iteration times will be limited within 7 rather than 10.Therefore, if initial p thr is greater than ER, p thr will be chosen as the iteration threshold.Considering energy efficiency, if the residual energy of cluster head is enough, the iteration times of cluster head can be reduced.On the contrary, if the energy of cluster head is not adequate, the network will need more iteration times to update the perfect cluster head.In conclusion, according to Algorithm 2, the process of cluster head election is demonstrated as follows: Algorithm 2 CH election algorithm (each round for all nodes within the network) The sending end radio energy consumption is E t if d < d 0 , the free space model is used, otherwise, multi-path attenuation model is used 3.
The receiving end radio energy consumption is E r (l) = lE elec 4.
Start CH selection protocol to implement CH election.8. End.

The Process of Cluster Establishment
In mobile Ad hoc sensor network, this stage constitutes the final step of our novel weight algorithm and represents the construction of the cluster members' set.Each cluster defines its neighbors at one hop maximum, which forms the member of the cluster.Firstly, all nodes are distributed in a network range and assigned with typically identical energy.In the network, each node broadcasts Hello messages packets which will consume a little of energy.Nodes will move towards different direction with different velocity, which will also cost various energy.When nodes are stable in first round, it is time to cluster through calculating the weight value of each node.Those nodes with large weight value will be elected as CH.Since the cluster is only restricted to manage its one hop neighbor, the process of cluster establishment will be accomplished quickly.Eventually, when all CHs connect with each other, the network is initialized.In order to display the process clearly, we give an explanatory example to clarify the clustering process.
Firstly, we give some relevant parameters.For example, we render a = 0.7, b = 0.3.It implies that the residual energy attaches more significance than mobility.Actually, the mobility will not very large in sensor network.It is only a small range of displacement; therefore, the history cache operations will not be very frequent.More clearly and directly, only those displacements of nodes beyond D thr , the record will be entered into cache and is used to calculate the next moment displacement.Additionally, the CH is typically identical with cluster members.Hence, it also needs same computing with cluster members.Then, CHSD of one node will be calculated by Equations ( 5)-( 7).This process actually need no data transmission except for the computing of CHSD.The data transmission needs only n times (if the number of cluster members is n).Of course, the weighted value can be adjusted according to different needs in application.For example, if the protocol is used in VANET, b can be adjusted larger since the energy is not a vital factor for sensor network.When the initialization of the network, the ratio of residual energy to average energy is equal and speed, directions are same, hence the weighted summation of CHSD and ratio of energy is 1.By Equation ( 8), we assume C prob is an appropriate value that can reduce the iterations as much as possible.Then all nodes start to announce to form a cluster.Since we consider the cost of AMRP, therefore, each node need to broadcast a packet {ID, CH prob , cost (AMRP)}.According to the cost of broadcasting, the left nodes join in a cluster according to the minimum cost.
In Figure 2a, nodes (A, B, C, D) announce their tentative CH and display their connection with nodes in the first iteration.In Figure 2b, tentative CHs (B, C) quit the job of CH and join in cluster because the cost (AMRP) or CH prob is not suitable.Tentative CH (A, D) is still keeping their job for the group mobility feature (CHSD) is relatively greater.In Figure 2c, more tentative CHs are announced.Actually, AMRP will control the hops minimized in order to energy efficiency.After the first iteration, the CH prob will double.Therefore, if CH prob of one tentative CH is greater than 1 or greater, this CH will be the formal CH and does not participate the iteration process but allows another node to join in.This example shows three iterations in CH selection.Actually in the next round, the process will keep longer and will even trigger p thr to finish the iteration forcibly.
Algorithms 2018, 11, x FOR PEER REVIEW 8 of 21 one hop neighbor, the process of cluster establishment will be accomplished quickly.Eventually, when all CHs connect with each other, the network is initialized.In order to display the process clearly, we give an explanatory example to clarify the clustering process.Firstly, we give some relevant parameters.For example, we render a = 0.7, b = 0.3.It implies that the residual energy attaches more significance than mobility.Actually, the mobility will not very large in sensor network.It is only a small range of displacement; therefore, the history cache operations will not be very frequent.More clearly and directly, only those displacements of nodes beyond Dthr, the record will be entered into cache and is used to calculate the next moment displacement.Additionally, the CH is typically identical with cluster members.Hence, it also needs same computing with cluster members.Then, CHSD of one node will be calculated by Equations ( 5)- (7).This process actually need no data transmission except for the computing of CHSD.The data transmission needs only n times (if the number of cluster members is n).Of course, the weighted value can be adjusted according to different needs in application.For example, if the protocol is used in VANET, b can be adjusted larger since the energy is not a vital factor for sensor network.When the initialization of the network, the ratio of residual energy to average energy is equal and speed, directions are same, hence the weighted summation of CHSD and ratio of energy is 1.By Equation ( 8), we assume Cprob is an appropriate value that can reduce the iterations as much as possible.Then all nodes start to announce to form a cluster.Since we consider the cost of AMRP, therefore, each node need to broadcast a packet {ID, CHprob, cost (AMRP)}.According to the cost of broadcasting, the left nodes join in a cluster according to the minimum cost.
In Figure 2a, nodes (A, B, C, D) announce their tentative CH and display their connection with nodes in the first iteration.In Figure 2b, tentative CHs (B, C) quit the job of CH and join in cluster because the cost (AMRP) or CHprob is not suitable.Tentative CH (A, D) is still keeping their job for the group mobility feature (CHSD) is relatively greater.In Figure 2c, more tentative CHs are announced.Actually, AMRP will control the hops minimized in order to energy efficiency.After the first iteration, the CHprob will double.Therefore, if CHprob of one tentative CH is greater than 1 or greater, this CH will be the formal CH and does not participate the iteration process but allows another node to join in.This example shows three iterations in CH selection.Actually in the next round, the process will keep longer and will even trigger pthr to finish the iteration forcibly.

Fault Detection Algorithm
Currently, mobile Ad hoc sensor network is widely utilized and obtains extensive applications for its rapid development, which results in the large quantities of problems emerged for the bad working condition [35][36][37].For example, nodes in the network are likely to suffer from battery out of charge for the increasing power consuming rate and the link failure in the network.In Figure 3, the network is stablished when the clustering algorithm finished.All nodes have its unique cluster and CH.CH is responsible for the intra-cluster communication and inter-cluster packet transmission.Currently, there are mainly two kinds of methods in fault detection for wireless sensor network, which are centralized method and distributed method.In centralized fault detection approach, the central node, commonly sink node, is responsible for the faulty nodes in network.Apparently, these approaches are not suitable for large scale network because huge message forwarding will consume considerable energy and this will surely shorten the lifetime of the network.Therefore, distributed approach is proposed to overcome the problem of centralized approach.In distributed approach, faulty nodes are identified by local decision-making.In our network, the distributed fault detection managers are CHs and fault detection responsibility is subsequently distributed among each individual cluster.Further, if a failure is detected locally, the failure can be propagated to all other clusters.Hence, we propose a distributed approach to construct a fault detection framework to render the network more robust and fault tolerant.

Fault Detection Algorithm
Currently, mobile Ad hoc sensor network is widely utilized and obtains extensive applications for its rapid development, which results in the large quantities of problems emerged for the bad working condition [35][36][37].For example, nodes in the network are likely to suffer from battery out of charge for the increasing power consuming rate and the link failure in the network.In Figure 3, the network is stablished when the clustering algorithm finished.All nodes have its unique cluster and CH.CH is responsible for the intra-cluster communication and inter-cluster packet transmission.Currently, there are mainly two kinds of methods in fault detection for wireless sensor network, which are centralized method and distributed method.In centralized fault detection approach, the central node, commonly sink node, is responsible for the faulty nodes in network.Apparently, these approaches are not suitable for large scale network because huge message forwarding will consume considerable energy and this will surely shorten the lifetime of the network.Therefore, distributed approach is proposed to overcome the problem of centralized approach.In distributed approach, faulty nodes are identified by local decision-making.In our network, the distributed fault detection managers are CHs and fault detection responsibility is subsequently distributed among each individual cluster.Further, if a failure is detected locally, the failure can be propagated to all other clusters.Hence, we propose a distributed approach to construct a fault detection framework to render the network more robust and fault tolerant.Through this hierarchical structure, the management framework is more efficient.CHs need to find a path to forward packets to the sink node.Thus, the optimal path is also vital for the sake of energy efficiency.Consequently, in order to reduce the cases of network paralysis caused by the nodes failures or CH, we propose a fault-detection and CH backup mechanism for the network.A periodic fault detection protocol is considered, which can detect the failures of nodes and CHs efficiently.Additionally, most topology control strategy is centralized [38][39][40], which consumes amounts of energy and increases the overhead for broadcasting global messages.Therefore, we adopt a distributed fault tolerance control method to avoid the drawbacks of centralized strategy.When the process of cluster establishment is accomplished, the proposed fault detection algorithm is as followed: The following example figures the process of this algorithm within each cluster under different cases.Among them, Figure 4 gives the practical example of fault node detection.Meanwhile, Figure 5 shows the practical process of Backup CH mechanism.We consider a low group mobility since actually most nodes have the similar movement characteristics.Through this hierarchical structure, the management framework is more efficient.CHs need to find a path to forward packets to the sink node.Thus, the optimal path is also vital for the sake of energy efficiency.Consequently, in order to reduce the cases of network paralysis caused by the nodes failures or CH, we propose a fault-detection and CH backup mechanism for the network.A periodic fault detection protocol is considered, which can detect the failures of nodes and CHs efficiently.Additionally, most topology control strategy is centralized [38][39][40], which consumes amounts of energy and increases the overhead for broadcasting global messages.Therefore, we adopt a distributed fault tolerance control method to avoid the drawbacks of centralized strategy.When the process of cluster establishment is accomplished, the proposed fault detection algorithm is as followed: The following example figures the process of this algorithm within each cluster under different cases.Among them, Figure 4 gives the practical example of fault node detection.Meanwhile, Figure 5 shows the practical process of Backup CH mechanism.We consider a low group mobility since actually most nodes have the similar movement characteristics.The above two processes are periodic.The period of detecting the fault node is time_fn1.Actually, the period is equal with the time when the last cluster member finish sending packets for the purpose of not influencing the normal communication of nodes.Thus, every time the last cluster member nodes finish sending packets, the network will run the fault detection algorithm.Similarly, the period of CH detection time_fn2 is equal with the time which consists of time_fn1 and the data processing time.Backup CH broadcasts sensing messages to cluster member and neighbor cluster nodes periodically.If finds CH cannot work, then execute the algorithm of Backup CH to make the network work.When the network cannot work normally, it needs to trigger the topology maintenance.In Algorithm 3, the detailed description of fault detection algorithm is shown.

Algorithm 3 Fault detection algorithm description (run between inner-cluster and intra-cluster)
After the packet transmission is finished, the fault detection begins.CH is elected and the degree (dvj) of each CH is ensured.
mark (vi → ID) for each cluster The above two processes are periodic.The period of detecting the fault node is time_fn1.Actually, the period is equal with the time when the last cluster member finish sending packets for the purpose of not influencing the normal communication of nodes.Thus, every time the last cluster member nodes finish sending packets, the network will run the fault detection algorithm.Similarly, the period of CH detection time_fn2 is equal with the time which consists of time_fn1 and the data processing time.Backup CH broadcasts sensing messages to cluster member and neighbor cluster nodes periodically.If finds CH cannot work, then execute the algorithm of Backup CH to make the network work.When the network cannot work normally, it needs to trigger the topology maintenance.In Algorithm 3, the detailed description of fault detection algorithm is shown.

Algorithm 3 Fault detection algorithm description (run between inner-cluster and intra-cluster)
After the packet transmission is finished, the fault detection begins.CH is elected and the degree (dvj) of each CH is ensured.
mark (vi → ID) for each cluster The above two processes are periodic.The period of detecting the fault node is time_fn1.Actually, the period is equal with the time when the last cluster member finish sending packets for the purpose of not influencing the normal communication of nodes.Thus, every time the last cluster member nodes finish sending packets, the network will run the fault detection algorithm.Similarly, the period of CH detection time_fn2 is equal with the time which consists of time_fn1 and the data processing time.Backup CH broadcasts sensing messages to cluster member and neighbor cluster nodes periodically.If finds CH cannot work, then execute the algorithm of Backup CH to make the network work.When the network cannot work normally, it needs to trigger the topology maintenance.In Algorithm 3, the detailed description of fault detection algorithm is shown.

Algorithm 3 Fault detection algorithm description (run between inner-cluster and intra-cluster)
After the packet transmission is finished, the fault detection begins.CH is elected and the degree (dv j ) of each CH is ensured.Initialization: k i = 0, ∑i = N, ∑j = H, S fault = φ, S prob_fault = φ, S prob_fault (j) = φ.#Round m (period time_fn1) 1.
whi(v i ∈ Cluster j and j <= H and i = N)

Complexity
The time complexity of CH election algorithm is O(MN), in which M is the rounds number and N is the total number of nodes.When each round goes on, every node within the network will calculate its value of CHSD in order to compete with other nodes to be the next CH.So, when the times of rotation is M, the time complexity is O(MN).The most complex operation in the Fault detection algorithm is the rotation computation and it runs in O(Nlog(N)).This operation is performed for each cluster, which gives O(KNlog(N)), in which K is the number of clusters.Then, the time complexity of our proposed algorithm is O(MN) + O(KNlog(N)).

Topology Maintenance
Topology maintenance is based on the fault nodes detection and CHs backup mechanism.Once finds fault nodes or failure CH nodes, then it needs to cluster again.From this perspective, the network of clustering is not periodic but on demand.However, because of node's mobility, if the network is normal after a certain period of time, the topology maintenance process is automatically conducted.The timing sequence of our protocol is presented as Figure 6 shows.
In set up phrase, cluster formation process is to be conducted, that is, our proposed protocol is executed at this period.Actually, the time consumed is relied on the moment that the cluster formation accomplishes.If the energy of the whole network is extremely little and all nodes are going to die, the clustering formation will be longer for the greater times of iteration.In steady phrase, nodes are occupied with collecting data and transmission.Apparently, in this time phrase CH will consume much energy for the routing of nodes' message.Due to the mobility of nodes, the routing is a hard problem.However, after the cluster formation considering group mobility, the topology will relatively stable.Therefore, the overhead of routing will be reduced.During the period of time_fn1, fault detection algorithm will be implemented.In time_fn2, topology maintenance is executed.The time overhead is not stable which is dependent on the different application.If network is deployed in a well environment, the lifetime of each node will be longer than those malicious or bad environment.The fault detection algorithm can exclude "dead" node form the network.Here, "dead" nodes are relatively fewer.We mainly consider how to reduce the network partition and nodes failure.This consideration is also a way of topology maintenance.A stable topology will benefit decreasing overhead of routing and clustering.Of course, our proposed clustering algorithm mainly focuses on the clustering algorithm, however, in order to demonstrate routing problem with our protocol, we also need to clarify the reasonability of the proposed algorithm in routing finding aspects.

Complexity
The time complexity of CH election algorithm is O(MN), in which M is the rounds number and N is the total number of nodes.When each round goes on, every node within the network will calculate its value of CHSD in order to compete with other nodes to be the next CH.So, when the times of rotation is M, the time complexity is O(MN).The most complex operation in the Fault detection algorithm is the rotation computation and it runs in O(Nlog(N)).This operation is performed for each cluster, which gives O(KNlog(N)), in which K is the number of clusters.Then, the time complexity of our proposed algorithm is O(MN) + O(KNlog(N)).

Topology Maintenance
Topology maintenance is based on the fault nodes detection and CHs backup mechanism.Once finds fault nodes or failure CH nodes, then it needs to cluster again.From this perspective, the network of clustering is not periodic but on demand.However, because of node's mobility, if the network is normal after a certain period of time, the topology maintenance process is automatically conducted.The timing sequence of our protocol is presented as Figure 6 shows.In set up phrase, cluster formation process is to be conducted, that is, our proposed protocol is executed at this period.Actually, the time consumed is relied on the moment that the cluster formation accomplishes.If the energy of the whole network is extremely little and all nodes are going to die, the clustering formation will be longer for the greater times of iteration.In steady phrase, nodes are occupied with collecting data and transmission.Apparently, in this time phrase CH will consume much energy for the routing of nodes' message.Due to the mobility of nodes, the routing is a hard problem.However, after the cluster formation considering group mobility, the topology will relatively stable.Therefore, the overhead of routing will be reduced.During the period of time_fn1, fault detection algorithm will be implemented.In time_fn2, topology maintenance is executed.The time overhead is not stable which is dependent on the different application.If network is deployed Algorithm 4 gives the detailed process description of cluster maintenance algorithm.Through topology maintenance process, the cluster topology is relatively stable and the performance of the whole network can be guaranteed, such as throughput, lifespan and so forth.The network does not paralyze for the CH fault or nodes failure.The QoS of the network can be enhanced through a robust CH and stable topology.Actually, the fault detection can extend into a secure field for the similarity of the trust value of nodes.Currently, the trust value computing is a common method to estimate whether a node is good or bad.The realization of this kind of trust estimation, which can enhance the security of the network, is implemented through sensing among nodes or interception [24,28,41].

Algorithm 4 Cluster Maintenance Algorithm
Step 1: When cluster members finish sending packets, network fault detection process begins, if cannot detect any problems, then go to step 5; otherwise execute sequentially.
Step 2: If finds the CH failure, then go to step 4; otherwise execute sequentially.
Step 3: The RE 2 WCA algorithm is conducted according to the information of all cluster members.If fault node is backup CH, backup CH is obliged to be elected again according to weight value among cluster members.Then jump to step 5.
Step 4: Backup CH takes over the duty of CH firstly and broadcasts messages overall the network.If CH is permanent fault node, the ID will be deleted from the network; otherwise to be cluster member.Then, the RE 2 WCA algorithm is conducted to make sure the network re-cluster again.Then, jump to step 5.
Step 5: Withdraw from topology maintenance process.
The robustness of the network is enhanced when the fault detection and backup CH mechanism are introduced.These two algorithms are not confronted within a special circumstance.As long as it detects the fault node, the network can be fixed up through the topology maintenance algorithm.In RE 2 WCA, based on nodes' residual energy and group mobility, the CHs are elected and rotated more reasonably which renders the load balanced and the lifetime prolonged.On the other hand, in a totally distributed clustering approach, nodes do not need to broadcast global messages to reach the target of local topology maintenance.It certainly decreases the overhead so that can adapt to the network well.

Inter-Cluster and Intra-Cluster Communication
In the description of RE 2 WCA, we assume single-hop communication among CHs and their registered cluster members.This is desirable in source-driven networks, where reports are periodically transmitted by nodes.Hence, a Time Discrete Multiple Address (TDMA) frame may be constructed at each CH to eliminate interference within a cluster.Obviously, constructing TDMA frames need well synchronization and in a lightly-loaded network, adopting TDMA frames may waste frequent resources.Therefore, a better way is to use channel contention.Multipath routing can increase channel capacity in this case.In intra-cluster communication, in order to reduce the collisions of data, each CH will create a TDMA scheme for its nodes and broadcasts it among cluster members.Every node sends its data to its CH according to specified TDMA schedule.In order to avoid the interference caused by signals from a nearby cluster, CH can set the Code Discrete Multiple Address (CDMA) code of all nodes within the cluster.The CDMA code, along with the TDMA, are sent at scheduled times [2,3,19,34].However, in intra-cluster communication, for example if two nodes from different cluster need to communication, then the multi-path routing may work better.Clearly, the collisions caused by data forwarding are nearly unavoidable, therefore the capacity and throughput will decrease dramatically.Additionally, if it adopts a way of saving stable routing table, the great communication overhead will degrade the network performance.In order to solve this problem, some routing protocols are proposed, such as Directed Diffusion or Dynamic Sourcing Routing (DSR) [31,36].The protocols are mainly to reduce communication overhead through increasing the computing cost since computing cost is relatively much less compared with communication overhead.As is shown in Figure 7, TDMA schemes are adopted for the intra-cluster communication.Meanwhile, as is shown in Figure 8, the inter-cluster communication adopts the CDMA schemes.
Algorithms 2018, 11, x FOR PEER REVIEW 13 of 21 collisions caused by data forwarding are nearly unavoidable, therefore the capacity and throughput will decrease dramatically.Additionally, if it adopts a way of saving stable routing table, the great communication overhead will degrade the network performance.In order to solve this problem, some routing protocols are proposed, such as Directed Diffusion or Dynamic Sourcing Routing (DSR) [31,36].The protocols are mainly to reduce communication overhead through increasing the computing cost since computing cost is relatively much less compared with communication overhead.
As is shown in Figure 7, TDMA schemes are adopted for the intra-cluster communication.Meanwhile, as is shown in Figure 8, the inter-cluster communication adopts the CDMA schemes.In RE 2 WCA, the proposed two fault tolerant algorithms which are fault detection algorithm and CH backup algorithm respectively need to consider the synchronization.When CH find fault node, it needs to transmit data to sink node through inter-cluster communication.If some clusters failed to accomplish the process of fault detection, then the data forwarding cannot succeed.In Figure 6, only when all nodes finish the detection process during time_fn2, the topology maintenance will be triggered.Hence, a suitable way is to send Hello message packets among all CHs to ensure every node is in a waiting state (in fact has nothing to do).Actually, the waiting of other CHs will degrade collisions caused by data forwarding are nearly unavoidable, therefore the capacity and throughput will decrease dramatically.Additionally, if it adopts a way of saving stable routing table, the great communication overhead will degrade the network performance.In order to solve this problem, some routing protocols are proposed, such as Directed Diffusion or Dynamic Sourcing Routing (DSR) [31,36].The protocols are mainly to reduce communication overhead through increasing the computing cost since computing cost is relatively much less compared with communication overhead.
As is shown in Figure 7, TDMA schemes are adopted for the intra-cluster communication.Meanwhile, as is shown in Figure 8, the inter-cluster communication adopts the CDMA schemes.In RE 2 WCA, the proposed two fault tolerant algorithms which are fault detection algorithm and CH backup algorithm respectively need to consider the synchronization.When CH find fault node, it needs to transmit data to sink node through inter-cluster communication.If some clusters failed to accomplish the process of fault detection, then the data forwarding cannot succeed.In Figure 6, only when all nodes finish the detection process during time_fn2, the topology maintenance will be triggered.Hence, a suitable way is to send Hello message packets among all CHs to ensure every In RE 2 WCA, the proposed two fault tolerant algorithms which are fault detection algorithm and CH backup algorithm respectively need to consider the synchronization.When CH find fault node, it needs to transmit data to sink node through inter-cluster communication.If some clusters failed to accomplish the process of fault detection, then the data forwarding cannot succeed.In Figure 6, only when all nodes finish the detection process during time_fn2, the topology maintenance will be triggered.Hence, a suitable way is to send Hello message packets among all CHs to ensure every node is in a waiting state (in fact has nothing to do).Actually, the waiting of other CHs will degrade the instantaneity of the network because if just one CH has not implemented the fault detection, all nodes need to wait.But if a cognitive routing algorithm is adopted, the synchronization will be solved.The CH can find a best dynamic route to transmit the data.However, whatever the routing protocol has been adopted, the synchronization should not be a hard problem.On the one hand, the time waiting is not worthy of paying much attention because when CH are in waiting state, the energy consumption is nearly limited to zero.Actually, this is a tradeoff between instantaneity and reliability.On the other hand, the great difference among clusters is not common in real situations.After sink node receiving the fault data CHs forward, the topology maintenance process will be triggered.Sink node collects the fault information of nodes so that upload to higher class network.Meanwhile, sink node will broadcast packets to relevant clusters to tell them re-clustering.

Simulation Results and Discussion
Firstly, the performance of RE 2 WCA algorithm is evaluated.For purpose of generality, it is assumed that one thousand nodes are placed into a filed which ranges 2000 m × 2000 m.In addition, the iteration threshold is set to 0.0005 [10,11,13].Equation (10) implies that the max iteration times of RE 2 WCA protocol is 12.In the process of initialization, CH prob = C prob = 5% is set for all nodes in the network, where only in sixth iteration, nodes with high energy will exit RE 2 WCA protocol.It means that if the residual energy of nodes is higher, they will terminate RE 2 WCA more earlier.The performance of DWCA and EDWCA are evaluated to demonstrate more straightforward and convincing.Therefore, from the aspects [3,10]  Figure 9a shows that both in three algorithms, when the radius of cluster increases, the percentage of cluster heads decrease respectively.When the radius of cluster reaches 400 m, it is not surprised that only one cluster head exists in the mobile network.With cluster radius increasing, the percentage of cluster heads of RE 2 WCA is larger than DWCA and EDWCA algorithms.Because group mobility is considered where the nodes with similar motion pattern can maintain the original structure of cluster when the network topology changes.Thus, the number of cluster heads can be decreased a little slowly in RE 2 WCA protocol.In Figure 9b, RE 2 WCA protocol does not perform very well compared with DWCA and EMDWCA.When the radius of cluster reaches 25 m, the average residual energy of three protocols are nearly same.Figure 9b implies that with the radius of cluster increasing, the average residual energy increases.However, the residual energy of DWCA and EDWCA protocols is higher than RE 2 WCA.The difference between RE 2 WCA and EMDWCA is about 13%.Compared with DWCA is approximately 10%.It demonstrates that the CH residual energy selected by RE 2 WCA is high and is not far lower than the EMDWCA and DWCA.
Application requirement meets different types of cost function when selecting CH.If the protocol needs to be utilized in high node density network, the standard deviation will larger.If considering load balance, the standard deviation will be much smaller.In EMDWCA, the protocol considers the 1/node degree.Clearly, the maximum degree cost will increase the standard deviation.However, DWCA considers the minimum degree cost, that is, node degree, which demonstrates the standard deviation is relatively smaller.In RE 2 WCA, we consider a compromise between two extremes which is load balancing and cluster density respectively.
group mobility is considered where the nodes with similar motion pattern can maintain the original structure of cluster when the network topology changes.Thus, the number of cluster heads can be decreased a little slowly in RE 2 WCA protocol.In Figure 9b, RE 2 WCA protocol does not perform very well compared with DWCA and EMDWCA.When the radius of cluster reaches 25 m, the average residual energy of three protocols are nearly same.Figure 9b implies that with the radius of cluster increasing, the average residual energy increases.However, the residual energy of DWCA and EDWCA protocols is higher than RE 2 WCA.The difference between RE 2 WCA and EMDWCA is about 13%.Compared with DWCA is approximately 10%.It demonstrates that the CH residual energy selected by RE 2 WCA is high and is not far lower than the EMDWCA and DWCA.Another vital property of cluster is percentage of non-single node clusters.It demonstrates the feature of minimize the node into a cluster.In Figure 10b, the percentage of non-single nodes of three protocols increase with the radius of cluster becomes larger.Theoretically, if the radius of cluster is large enough, the percentage of non-single nodes nearly reaches to 100% with all nodes forming into one cluster.It also implies that the percentage non-single nodes of RE 2 WCA is much higher compared with two other protocols.From Figure 1c, we can see the ratio of maximum number of nodes RE 2 WCA to EMDWCA is lower than other two types of cost.The number of nodes will surely larger than minimum node degree and AMRP.In fact, this figure shows similar facts with Figure 10a.They all demonstrates the different types of cost will form into various clusters.More requirements need considering in the actual application.Figure 10d illustrates that when the node speed increases, the rate of CH change goes high since the topology of network changes dramatically.Considering group mobility of network, the performance of RE 2 WCA is better than DWCA and EDWCA protocols.The rate of CH changes in RE 2 WCA is nearly lower 7.5% than DWCA, 2.5% than EDWCA.
In addition, our protocol can be used into a cluster structure routing protocols, in which higher tier nodes should have more residual energy.Our approach can also be effective for sensor applications requiring efficient data aggregation and prolonged network lifetime.In the simulations, most of parameters are similar to those in [2,19,20,34].Additionally, the mobility speed of nodes is 10m/s which is also similar with Ref [14,42,43].The parameters are listed in Table 2.The energy consumption computing of sensor nodes is on the basis of Equations ( 1)-(3).Except for the above parameters, without loss of generality, the application parameters are as followed: data packet size of 100 bytes, broadcast packet size of 25 bytes and packet header size of 25 bytes [3,10,34].Additionally, we assume a = 0.7, b = 0.3 as the weighted average index.The reasonability has been discussed before.Firstly, all network has to solve the problem of throughput.For the purpose of increasing the throughput of the network, clustering method for nodes is adopted.
than minimum node degree and AMRP.In fact, this figure shows similar facts with Figure 10a.They all demonstrates the different types of cost will form into various clusters.More requirements need considering in the actual application.Figure 10d illustrates that when the node speed increases, the rate of CH change goes high since the topology of network changes dramatically.Considering group mobility of network, the performance of RE 2 WCA is better than DWCA and EDWCA protocols.The rate of CH changes in RE 2 WCA is nearly lower 7.5% than DWCA, 2.5% than EDWCA.In Figure 11, the first node of the DWCA algorithm failed at 196 rounds and the first node of the EMDWCA algorithm failed at 331 rounds, while the first node of the RE 2 WCA algorithm failed at 398 rounds; the nodes that survive with the RE 2 WCA algorithm is 103% higher than that of the DWCA algorithm and 20% higher than that of the EMDWCA algorithm.We also know that, when using the DWCA algorithm, all nodes are dead after 721 rounds of cluster head election.By applying the EMDWCA algorithm the life cycle of the node is 1270 rounds, however, by using RE 2 WCA algorithm the surviving nodes remain to exist after 1410 rounds.This is because the algorithm proposed in this paper not only considers the residual energy and the mobility of the node but also takes the maximal capability of cluster head handling into account, which makes the nodes' energy consumption more homogeneous and protects the cluster heads from excessive consumption.So, the RE 2 WCA algorithm improves the stability of the network topology and the survivability of the overall network.Figure 12 demonstrates the average network throughput varies with the distance of nodes.Within a short distance, the RE 2 WCA is similar to the DWCA and EMDWCA, however, in the long distance, the throughput of RE 2 WCA is obviously greater than the DWCA and EMDWCA since the proposed algorithm can elect the optimal CH, which can accelerate the message forwarding.The throughput is nearly 10% greater than the EMDWCA and nearly 15% greater than DWCA respectively.
In Figure 12, with the number of fault nodes increasing, the throughput of DWCA is decreased rapidly.On the meanwhile, the throughput of EMDWCA and RE 2 WCA decreased slowly since in order to increase robustness of network, both of them introduce fault nodes detection algorithm.In RE 2 WCA, the redundancy of the network is not increased but a mechanism of fault detection is introduced.The EMDWCA increases the redundant links of the nodes, which increases the routing overhead and consume more energy to construct links.Therefore, the throughput will be degraded.When the proportion of fault nodes reaches to 16%, the throughput of three types protocols decreased dramatically since many clusters cannot work normally.Actually, the proportion of fault node cannot reach so highly, thus, RE 2 WCA remains to maintain a better throughput than DWCA and EDWCA protocols.Figure 12 demonstrates the average network throughput varies with the distance of nodes.Within a short distance, the RE 2 WCA is similar to the DWCA and EMDWCA, however, in the long distance, the throughput of RE 2 WCA is obviously greater than the DWCA and EMDWCA since the proposed algorithm can elect the optimal CH, which can accelerate the message forwarding.The throughput is nearly 10% greater than the EMDWCA and nearly 15% greater than DWCA respectively.Figure 12 demonstrates the average network throughput varies with the distance of nodes.Within a short distance, the RE 2 WCA is similar to the DWCA and EMDWCA, however, in the long distance, the throughput of RE 2 WCA is obviously greater than the DWCA and EMDWCA since the proposed algorithm can elect the optimal CH, which can accelerate the message forwarding.The throughput is nearly 10% greater than the EMDWCA and nearly 15% greater than DWCA respectively.
In Figure 12, with the number of fault nodes increasing, the throughput of DWCA is decreased rapidly.On the meanwhile, the throughput of EMDWCA and RE 2 WCA decreased slowly since in order to increase robustness of network, both of them introduce fault nodes detection algorithm.In RE 2 WCA, the redundancy of the network is not increased but a mechanism of fault detection is introduced.The EMDWCA increases the redundant links of the nodes, which increases the routing overhead and consume more energy to construct links.Therefore, the throughput will be degraded.When the proportion of fault nodes reaches to 16%, the throughput of three types protocols decreased dramatically since many clusters cannot work normally.Actually, the proportion of fault node cannot reach so highly, thus, RE 2 WCA remains to maintain a better throughput than DWCA and EDWCA protocols.Figure 13 displays the effect of mobility on the packet drop rate.With increasing in the mobility of nodes, link failures occur causing more packets to be dropped on way.This decrease is less in RE 2 WCA algorithm because of the use of mobility thresholds as well as group mobility.In Figure 12, with the number of fault nodes increasing, the throughput of DWCA is decreased rapidly.On the meanwhile, the throughput of EMDWCA and RE 2 WCA decreased slowly since in order to increase robustness of network, both of them introduce fault nodes detection algorithm.In RE 2 WCA, the redundancy of the network is not increased but a mechanism of fault detection is introduced.The EMDWCA increases the redundant links of the nodes, which increases the routing overhead and consume more energy to construct links.Therefore, the throughput will be degraded.When the proportion of fault nodes reaches to 16%, the throughput of three types protocols decreased dramatically since many clusters cannot work normally.Actually, the proportion of fault node cannot reach so highly, thus, RE 2 WCA remains to maintain a better throughput than DWCA and EDWCA protocols.
Figure 13 displays the effect of mobility on the packet drop rate.With increasing in the mobility of nodes, link failures occur causing more packets to be dropped on way.This decrease is less in RE 2 WCA algorithm because of the use of mobility thresholds as well as group mobility.Figure 14 shows the energy consumption of the whole network.We can conclude that DWCA consumes energy fastest, EMDWCA second and RE 2 WCA slowest.The energy consumption is vital in sensor network, however, DWCA fails to control the energy consumption reasonably, therefore when the round number is nearly 700 rounds, the network is paralyzed.In EMDWCA, the lifetime of the network is relatively longer because the CH election considers the residual energy.Unfortunately, since the increased routing overhead and constructed redundancy link, the energy still consumes fast, therefore when the round number is nearly 1100 rounds, the network is paralyzed.However, the proposed algorithm can reach 1220 rounds, because we not only consider the residual energy but also exclude the fault nodes so that network can proceed the topology maintenance which can save amount of energy caused by the times of failed routing.The energy consumption of network which is conducted in RE 2 WCA protocol is 50% less than DWCA and 15% for EMDWCA respectively.In conclusion, we discuss the cluster application from different aspects which are throughput and network energy consumption.The throughput actually reflects the lifespan of the network and data transmission ability.Network energy consumption however, demonstrates the energy-efficiency, which indirectly implies the lifetime of network.From the simulations results, we can conclude that our protocol, RE 2 WCA, is superior to original two protocols, EMDWCA and DWCA respectively Figure 14 shows the energy consumption of the whole network.We can conclude that DWCA consumes energy fastest, EMDWCA second and RE 2 WCA slowest.The energy consumption is vital in sensor network, however, DWCA fails to control the energy consumption reasonably, therefore when the round number is nearly 700 rounds, the network is paralyzed.In EMDWCA, the lifetime of the network is relatively longer because the CH election considers the residual energy.Unfortunately, since the increased routing overhead and constructed redundancy link, the energy still consumes fast, therefore when the round number is nearly 1100 rounds, the network is paralyzed.However, the proposed algorithm can reach 1220 rounds, because we not only consider the residual energy but also exclude the fault nodes so that network can proceed the topology maintenance which can save amount of energy caused by the times of failed routing.The energy consumption of network which is conducted in RE 2 WCA protocol is 50% less than DWCA and 15% for EMDWCA respectively.In conclusion, we discuss the cluster application from different aspects which are throughput and network energy consumption.The throughput actually reflects the lifespan of the network and data transmission ability.Network energy consumption however, demonstrates the energy-efficiency, which indirectly implies the lifetime of network.From the simulations results, we can conclude that our protocol, RE 2 WCA, is superior to original two protocols, EMDWCA and DWCA respectively which is conducted in RE 2 WCA protocol is 50% less than DWCA and 15% for EMDWCA respectively.In conclusion, we discuss the cluster application from different aspects which are throughput and network energy consumption.The throughput actually reflects the lifespan of the network and data transmission ability.Network energy consumption however, demonstrates the energy-efficiency, which indirectly implies the lifetime of network.From the simulations results, we can conclude that our protocol, RE 2 WCA, is superior to original two protocols, EMDWCA and DWCA respectively

Conclusions
A robust and energy-efficient weighted clustering algorithm on mobile Ad hoc sensor networks is put forward in this paper.Taking group mobility and residual energy into account, the algorithm focuses on the weight of nodes.In addition, the iteration times are decreased dramatically in the protocol, which can guarantee the energy-efficiency in the mobile networks.This protocol renders the nodes consuming energy more homogeneously and prolongs the network lifetime.In addition, we propose a periodic fault detection algorithm to enhance the fault tolerance and robustness of network.The topology maintenance is executed when fault nodes are detected or the average energy of all nodes is below a predetermined threshold value.Thus, the fault tolerance ability is enhanced and the throughput of network is more stable.The results of simulation also illustrate that the performance of throughput, lifetime and robustness of the network is much better than the other protocols.
Our future work will be focusing on the robustness and trust estimation of the network.Currently, the security of the network is a hotspot.However, most of security authentications are trust value estimation through a frequent data aggregation.But clearly the energy consumption of data transmission is greater than the data computing.Therefore, we will consider a kind of trust estimation through minimum data transmission.We believe this field and direction will be made a big progress.
p min ← max{ER, pthr}; Input: a, b ← weight(i) factors satisfy a > b and a + b = 1; C prob ← assuming value; d ← distance between sending end and receiving end;

Figure 2 .
Figure 2. The CH selection process in RE 2 WCA.(a) Tentative CHs (A, B, C, D, E) form.There are some nodes fail to join a cluster.(b) The tentative CHs (A, D, E, F, G, H, I) are updated and increased, so only a few nodes are at free state.(c) All nodes have their only cluster and tentative CHs become formal CHs (A, D, E, F, G, H, I, J).

Figure 2 .
Figure 2. The CH selection process in RE 2 WCA.(a) Tentative CHs (A, B, C, D, E) form.There are some nodes fail to join a cluster.(b) The tentative CHs (A, D, E, F, G, H, I) are updated and increased, so only a few nodes are at free state.(c) All nodes have their only cluster and tentative CHs become formal CHs (A, D, E, F, G, H, I, J).

Figure 3 .
Figure 3.A clustering wireless sensor network model.

Figure 3 .
Figure 3.A clustering wireless sensor network model.

Figure 4 .Figure 5 .
Figure 4. (a-c) is the practical example of fault node detection process.(a) Cluster members (3, 9) send message to CH. Node 6 fails sending, hence node 6 is to be probable fault node.(b) Nodes (3, 6, 9) send message to CH respectively.Node 6 is normal.(c) Nodes (3, 9) send message to CH respectively.Node 6 still fails to send messages.

Figure 5 .
Figure 5. (a-c) is the practical example of Backup CH mechanism process.(a) In the period of time_fn2, nodes (3, 9) receive the message from CH (5) but node 6 not.Node 6 marks CH possibly failed.(b) Backup CH launch the status enquiry message for cluster.(c) Backup CH receive the messages from inner-cluster nodes and judge CH is faulted or not.

Figure 6 .
Figure 6.Round of network set up.

Figure 6 .
Figure 6.Round of network set up.

Figure 7 .
Figure 7. TDMA schemes adopted for the intra-cluster communication.

Figure 8 .
Figure 8. CDMA schemes adopted for the inter-cluster communication.

Figure 7 .
Figure 7. TDMA schemes adopted for the intra-cluster communication.

Figure 7 .
Figure 7. TDMA schemes adopted for the intra-cluster communication.

Figure 8 .
Figure 8. CDMA schemes adopted for the inter-cluster communication.

Figure 8 .
Figure 8. CDMA schemes adopted for the inter-cluster communication.
listed as follows, RE 2 WCA is compared with EMDWCA and DWCA protocols.(1) Ratio of the number of clusters to the number of all nodes; (2) Ratio of non-single node clusters to the number of clusters; (3) Standard deviation of the number of nodes in a cluster and maximum number of nodes in a cluster; (4) Average residual energy of CHs elected in each cluster.

Figure 9 .
Figure 9. Features of elected CHs.(a) Percentage of CHs.(b) Average residual energy per CH.Figure 9. Features of elected CHs.(a) Percentage of CHs.(b) Average residual energy per CH.

Figure 9 .
Figure 9. Features of elected CHs.(a) Percentage of CHs.(b) Average residual energy per CH.Figure 9. Features of elected CHs.(a) Percentage of CHs.(b) Average residual energy per CH.

Figure 10 .
Figure 10.Features of clusters.(a) Standard deviation of the number of nodes/cluster.(b) Percentage of non-single clusters.(c) Ratio of maximum number of nodes in RE 2 WCA to other two types protocol.(d) Rate of CH changes with node speed varying.

Figure 10 .
Figure 10.Features of clusters.(a) Standard deviation of the number of nodes/cluster.(b) Percentage of non-single clusters.(c) Ratio of maximum number of nodes in RE 2 WCA to other two types protocol.(d) Rate of CH changes with node speed varying.

Figure 11 .
Figure 11.Surviving nodes vary with Round number.

Figure 12 .
Figure 12.Throughput of the network.(a) Network throughput varies with the distance.(b) Network throughput under certain fault nodes.

Figure 12 .
Figure 12.Throughput of the network.(a) Network throughput varies with the distance.(b) Network throughput under certain fault nodes.

Figure 13 .
Figure 13.Number of packages dropped varies with Mobility parameter.

Figure 14 .
Figure 14.Network energy consumption with the network round number increases.Figure 14.Network energy consumption with the network round number increases.

Figure 14 .
Figure 14.Network energy consumption with the network round number increases.Figure 14.Network energy consumption with the network round number increases.