You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Article
  • Open Access

15 February 2023

An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs

,
,
and
1
LISAC Laboratory, Faculty of Sciences Dhar EL Mahraz, Sidi Mohamed Ben Abdellah University, Fez 30000, Morocco
2
ERCI2A, Faculty of Science and Technology Al Hoceima, Abdelmalek Essaadi University, Tetouan 93000, Morocco
3
LISA Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez 30000, Morocco
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

Wireless sensor networks consist of many restrictive sensor nodes with limited abilities, including limited power, low bandwidth and battery, small storage space, and limited computational capacity. Sensor nodes produce massive amounts of data that are then collected and transferred to the sink via single or multihop pathways. Since the nodes’ abilities are limited, ineffective data transmission across the nodes makes the network unstable due to the rising data transmission delay and the high consumption of energy. Furthermore, sink location and sensor-to-sink routing significantly impact network performance. Although there are suggested solutions for this challenge, they suffer from low-lifetime networks, high energy consumption, and data transmission delay. Based on these constrained capacities, clustering is a promising technique for reducing the energy use of wireless sensor networks, thus improving their performance. This paper models the problem of multiple sink deployment and sensor-to-sink routing using the clustering technique to extend the lifetime of wireless sensor networks. The proposed model determines the sink placements and the most effective way to transmit data from sensor nodes to the sink. First, we propose an improved ant clustering algorithm to group nodes, and we select the cluster head based on the chance of picking factor. Second, we assign nodes to sinks that are designated as data collectors. Third, we provide optimal paths for nodes to relay the data to the sink by maximizing the network’s lifetime and improving data flow. The results of simulation on a real network dataset demonstrate that our proposal outperforms the existing state-of-the-art approaches in terms of energy consumption, network lifetime, data transmission delay, and scalability.

1. Introduction

Wireless sensor networks (WSNs) have notably increased in popularity over the last few decades. Their success, and the rising demand for them, are reflected in the ever-expanding range of applications in various fields, such as transportation [1,2,3,4,5], health [6,7,8] (human activities in health care), manufacturing [9,10,11,12], military [13,14] (battleground surveillance by the military), and environment [15,16,17] (wildfire early detection, air pollution monitoring, and water monitoring). WSNs are also critical components of the Internet of Things (IoT) [18].
A typical WSN consists of several sensor nodes (SNs) and at least one base station (BS), called the sink. An SN is a small device with limited abilities (energy, processing capacity, and memory) that is placed in the environment to sense and gather the necessary data before sending it directly (single hop) or via other multihop communications to the nearest sink [19]. The sink is in charge of receiving and conveying these gathered data to the final user and is outfitted with high energy and processing capabilities [20]. Communications consume more than 70% of the battery energy among various nodes. In sparse topology, a WSN with limited node capacities cannot function as intended if one of the network’s sensors runs out of energy [21]. In dense topology, the overlapped sensing areas significantly increase unnecessary energy consumption and shorten the network’s lifetime. For that reason, it is necessary to construct an energy-efficient WSN to maximize the network’s lifetime.
The lifetime is the time until the energy of the first sensor node is exhausted [22], and to improve it the flow balance between nodes must be significantly improved. SNs closer to the base station conserve a considerable quantity of energy for extended periods of time, and energy consumption is related exponentially to distance during data transmission. Hence, the distance between communicating nodes determines the quantity of energy used for data transmission. Specifically, the nodes nearest to the sink consume less energy. In contrast, distant nodes may use other nodes to transmit the data to the sink, which causes energy depletion of the SNs that are closest to the base station. Indeed, the sink location impacts the network’s lifetime based on its distance from a significant number of sensor nodes.
An excellent way to design an energy-efficient WSN is to deploy numerous sinks rather than a single sink [23]. When designing a network with several sinks, we intend to determine how many sinks there should be. However, even more crucially, we need to determine where the sinks should be placed and then select the optimal path for data transmission. Clustering is a promising strategy for managing the WSN structure, since it has the potential to improve network performance. It aims to group nodes based on predetermined criteria, such as ensuring the quality of service, balancing the network load, and optimizing the resource requirements [24]. Resource-constrained nodes no longer need to send data directly to sinks using clustering techniques. Other approaches are proposed to outperform energy efficiency, such as sleeping mechanisms [25], data aggregation algorithms [20] and compressed sensing mechanisms [26]. The sleeping mechanism significantly reduces energy consumption by putting sensors to sleep or waking them up. The data aggregation algorithm is mainly used to process massive data that does not supply meaningful information to its owner in its current inconsistent form. The compressed sensing mechanism takes advantage of the redundancy present in environmental WSN signals to decrease the number of transmitted measurements and, as a result, achieve an appealing reduction in network energy consumption. However, it necessitates significant data preprocessing, which runs counter to Ambient Intelligence domains’ processing and energy limitations.
In general, sensor nodes can be deployed in different environments with different technologies, such as Wireless Body Sensor Networks [27] that gather and evaluate patients’ vital-sign-related data by deploying various bio-medical sensors (body temperature, blood pressure, heartbeat, etc.) in the human body for an extended period, thereby lowering healthcare costs. An essential part of the Intelligent Transport System (ITS), the Vehicular Ad-hoc Network (VANET) [28], connects and allows wireless communication between moving vehicles. It is a particular type of Mobile Ad-hoc Network (MANET). The Flying Ad-hoc Network (FANET) [29] consists of several Unmanned Aerial Vehicle (UAV) nodes that connect wirelessly. UAVs can be controlled remotely or using pre-programmed instructions.
Typically, SNs consume a larger amount of energy while transmitting data. Hence, reducing the amount of redundant data transferred to the BS is crucial when the cluster head (CH) nodes in a network are appropriately selected. Additionally, it is essential to examine the routing protocol in the main features and common scenarios to ensure real-world WSN construction and optimum environment simulation for further improvements using a range of optimization methodologies [30].
Previous studies have notably discussed approaches to sensor deployment, sink placement, and data transmission for energy efficiency. These techniques [23,31,32,33,34] are not suggested in the case of large-scale sensor deployment. Other studies focused only on the issue of routing paths without attaching them to sink placements [31,34,35,36,37,38,39] or addressed only the sink placement [23,32]. Studies have provided a clustering model for data routing, but there are considerable shortcomings in the clustering methods. In particular, they put a tremendous load on CH and ignore the residual energy and distance between the Cluster Head and the sink, which impacts energy consumption. Therefore, we need a solution that addresses the aforementioned issues in order to reduce energy consumption, increase the network’s lifetime, and shorten the data transmission delay in a constrained IoT network. Thus, we have to propose a fully analytical model that considers the most common review limitations: clustering optimization, placement of multiple sinks, and data routing problems in heterogeneous WSNs.
In this research, inspired by swarm intelligence methods, especially the ant clustering algorithm, we propose an efficient model based on clustering that determines the ideal position for multiple sinks and routing data pathways in WSNs. The following are some of our research’s significant points in terms of the proposed model-based clustering:
  • We propose a complete model that aims at increasing the network’s lifetime. It performs essential tasks like CH selection (higher Cp factor), path construction from sink to CH (less costly path), and sink placement (in the barycenter of the cluster); as a result, it minimizes the load on the sensor nodes.
  • Under the operation of our model, no intermediate node participates or transmits their data packets with less than an energy threshold and more than a distance threshold (long link—discussed in Section 3.1), thereby conserving a significant amount of energy.
  • We compared our proposed technique with others under various simulation settings (varying the number of sensor nodes, CHs, and sinks) to identify areas of limitation and found that it outperformed all of them. We observed that the number of hops is reduced by more than 4% to one hop, and the residual energy is increased by more than 3%.
We have adopted the ant clustering algorithm because of its various features [40]: (i) it requires minimal information about the issue at hand; (ii) it can typically complete both broad and parallel searches over the area of potential solutions by having a swarm (population) of candidate solutions. In our study, the execution time is a carried-out concern, so a parallel search is needed; (iii) it is scalable in clustering issues because of its distributed nature [41]. In this research, we address the problem of clustering in a constrained environment in which we have a high number of varied sensors and features; (iv) it is robust to the impacts of outlier data [42,43,44,45]; (v) it examines the space issue more deeply than greedy algorithms that use local search. According to [46], ant-based algorithms can find near-optimal solutions.
The structure of this work is organized as follows: the second section includes a summary and a review of the most recent works on sink placement and data routing paths. In Section 3, we provide a definition of the problem, the ant clustering algorithm, and the adopted model of energy. In Section 4, we present an appropriate way to formulate the proposed method, which deals with four issues: deployment sensors, applied clustering, multiple sinks placements, and data routing paths. In Section 5, we further discuss the main extracted results. Finally, a thorough conclusion and proposal for future work are presented in Section 6.

3. Preliminaries

This section provides background information, including the definition of the problem, the ant clustering algorithm, and the energy model adopted for the rest of this paper.

3.1. Problem Definition

A typical WSN consists of N+M nodes, where N sensor and actuator nodes are deployed randomly in an area with different communication ranges and M stationary sinks. Sensor nodes can monitor environmental factors as well as generate data. Actuator nodes or end-users can use the generated data. The actuator nodes can convey data from SNs via intermediary nodes or end-users to the BS in order to execute a physical parameter. In general, each node can transfer data to the sink in direct or indirect communication. Therefore, the WSN serves as a link between the physical and digital information worlds by gathering data from its surroundings and transmitting it to digital devices like computers.
Direct communication is the process of allowing nodes to communicate directly with the sink. It would only be accessible to nodes with a communication range more extensive than their distance from the sink (within range of the sink). Indirect communication is available for all nodes. It is based on assigning intermediate nodes to convey data to a sink.
Furthermore, indirect communication can be visualized in two cases. Firstly, the node’s packets are usually sent to neighbour nodes based on their communication range (within range of neighbouring nodes) until they reach the sink. Thus, the nearest node to the sink will receive different requests, which causes it to deplete its energy faster (hole energy issue), as shown in Figure 1. In the simplest scenario, each node sends packets to the neighbouring nodes, which may be along the longest path. Consequently, this kind of scenario can eventually cause many nodes to run out of energy. In the second case, the nodes are grouped into clusters, and each specified CH node transmits data from its cluster members to the sink; this reduces their energy consumption but has a heavy toll on CHs.
Figure 1. Data transmission using neighbouring nodes.
Figure 2 illustrates this scenario. Furthermore, all nodes have to relate to a single CH by communicating outside the conventional radio range. As a result of the formal scheme, service quality and performance suffer a severe degradation. For this purpose, the nodes are either clustered physically or virtually, which enables a comprehensive visualisation of the study environment and better control of environmental variables. Moreover, a specific node is designated as the Cluster Head based on a selection factor, in addition to placing a sink in the cluster’s centre, which aims to minimize energy consumption and lengthen the network’s lifetime.
Figure 2. Data transmission using cluster head.
The network is depicted as a graph G (S, A), where S = {n1,n2, ...,nN+M} nodes, and A represents wireless connections. Table 3 describes the notations used in the remainder of this paper.
Table 3. Symbol denotation.

3.2. Ant Clustering Algorithm

This sub-section provides a general summary of the ant clustering algorithm; later we will propose an improved version for the WSN context. The ant clustering algorithm was introduced by [62], and it is a swarm-intelligent approach for clustering issues inspired by the ant-like behaviour exhibited [63]. The algorithm is based on the foraging behaviour of real ants hunting for food. The method uses the ants to deposit an amount of pheromone that reflects the problem to be grouped during their movements. Hence, an ant is placed at each data point site, and the ants are free to move about the search space in order to identify locations with high pheromone density. The quantity of pheromone deposited at various locations across the search space controls the movements of the ant. The introduction of a pheromone function to the grid enhances the reward for dropping objects in more dense areas of the grid. Therefore, the more pheromone is deposited, the more ants congregate. This results in the formation of homogeneous clusters of data.
The grid size is proportional to the number of objects. The agent ants are free to travel around the grid, picking up or discarding objects based on their resemblance to other objects, and the density of the objects in their current local area, as well as the status of the agent ant (whether it is loaded or not). Low-density neighbourhoods (low amounts of pheromones) increase the likelihood of an ant picking up an object, but a remarkable resemblance between things in the neighbourhood area (high amount of pheromone) decreases it. On the other hand, high-density communities increase the chances of dropping an object. The grid’s agent ants and objects can be in one of two states: (a) the agent ant is holding an object i and calculating the dropping probability at its current location; (b) another agent ant is unloading and calculating the probability of picking up an object. Finally, the agent ants aggregate the objects on the grid into heaps containing objects similar to one another.
The density distribution function for an object i, at a specific grid position d, is given by the Equation:
f ( i ) = 1 S 2 j 1 d i , j α   if   f i > 0   0   otherwise
where S 2 is the number of cells in a general neighbourhood area, d i , j is the distance between i and j, which is commonly based on Euclidean distance, and α is a constant that describes the scale for dissimilarity among objects. Once similar or equivalent things hold all the sites nearby, the f i may achieve its maximum value. The picking up and dropping probability of an object is given by of Equations (2) and (3), respectively.
P pick i = ( K 1 K 1 + f S i   ) 2
P drop i = ( f S i   K 2 + f S i   ) 2
where, K1 and K2 are two constants.

3.3. Energy Model

The energy consumption of constrained nodes is a crucial criterion for evaluating IoT solutions. During the design and operation of the proposed approach, a radio model is utilized to study the parametric effect. In this approach, a sensor node consists of seven parts: transmission and reception electrical equipment; transmission and reception antennas; transmission amplifiers; and data processors. Energy is consumed according to the number of operations of data transmission, data reception, and data compression. We assumed the energy model from [15]. Their version incorporates free space and multi-path fading channels relying on source and destination distances. In radio and amplifier electronics, the transmission phase consumes energy as follows:
E T b , D = b × E Elec + b × E D × D 2 if   D < D threshold b × E Elec + b × E mp × D 4 if   D D threshold
where b is the number of bits (data) sent across a given distance D, E Elec is the entire amount of electrical energy required to send or receive one bit of data using modulators, digital coding, and other electronic circuits, E D is the amount of power required by the amplifier to send data to the receiver directly, E mp is the amount of energy required by the amplifier to convey data through multiple nodes in a multi-hop network, and D threshold is the threshold distance, which is calculated as follows:
D threshold = E D E mp
The receiving phase consumes the following to receive data:
E R b , D = b × E Electrical

4. Our Proposal

This research proposes a new strategy for placing multiple sinks in the best positions, and for transmitting and conveying data through an optimal short path that minimizes energy consumption, maximizes the network’s lifetime, and reduces data transmission delay.

4.1. Deployment Sensors

In our model, we assumed that N nodes are spread randomly throughout the environment and that each node i has a unique identity (ID). S(i) is the set of node i’s neighbours. Each node i can adopt one of the two types of communication: single-hop, in which a node near the sink sends its data directly as a direct node, and multihop, in which a distant node uses intermediate nodes to send its data to the sink. Below are the assumptions made in our model:
Assumptions:
  • Sensor nodes are stationary and are deployed randomly in the environment.
  • Multiple sinks (base stations) should be in fixed positions.
  • The sensor nodes in the base station’s communication range transmit data directly to the sink.
  • The sensor nodes are aware of their neighbours’ node locations.
  • The sensor nodes can send and receive data from nodes in the communication range.
  • Each sensor node’s total energy consumption cannot exceed its initial energy.
  • All sensor nodes have different energies, communications, and sensing ranges.

4.2. Improving the Ant Clustering Algorithm for Sensor Node Clustering

To improve and facilitate communication between each node and the sink utilizing an optimal path, we offer a metaheuristic strategy for forming clusters via the CH. The CH are determined by the SNs with the highest chance of picking factor. Finally, clusters are formed by the improved ant-clustering algorithm (IAC). Some nodes use a multihop routing mechanism inside clusters to interact with the cluster head, and once all of the cluster members receive data packets, the data along the precomputed path are transferred to the sink.
Our approach improves the ant clustering algorithm by adding three elements that increase the quality and speed of clustering. Algorithms 1 and 2 depict the suggested IAC algorithm in two steps: initialization and main clustering steps, respectively. In the initialization step, clustering is performed based on the communication range and the distance between each sensor and the most similar cluster head. At the end of this step, we obtain k clusters and other nodes (outliers) that are not yet assigned to any cluster. The main clustering step continues to formulate clusters by using the pick-up and dropping probabilities and the ant’s short memory to ameliorate the clusters’ formation and assign each outlier node to the most similar cluster head. Therefore, this memory is checked upon selecting a new sensor (including the outlier node) to determine the ant’s movement bias. Accordingly, the ant tends to move towards the site of the last similar cluster head it visited. We assume that each sensor can remember the CH relaying to the cluster and the number of clusters (CN) in which it is situated. The CN and CH are established in the initialization step, and the CN is later updated during the main clustering procedure, as described below.

4.2.1. Initialization Step

Firstly, sensors are randomly deployed on a grid with a maximum of one sensor allowed in each cell. In our solution, the grid is represented by a two-dimensional array, where each element contains a number of sensors. Furthermore, empty cells can be assigned to the corresponding element in the array with a predefined value (such as 0). Sparse matrices are effectively utilized to represent the two-dimensional array when the size of the grid is very large. Next, we calculate the chance of picking a cluster head node for each node and then choose k cluster heads using Equation (7), which is defined as follows:
Cp i = ( R energy   ( S i ) max _ R energy   ) × ( C range i max _ C range )
where Cpi is the chance of picking cluster head node i, and R energy   S i and C range i are the residual energy and communication range of S i , respectively. max _ R energy and max _ C range are the maximum values of the residual energy and the network’s maximum communication range, respectively.
We determine the optimum number of clusters, k, using one of the widely-used performance measures in cluster analysis, the Silhouette index (SI) [64]. A higher SI value indicates that data points are less similar to other clusters and more similar to their own cluster. The Silhouette index used in distributed clustering is determined as follows:
SI K = 1 NK k = 1 K n = 1 N SI S i
SI S i = b S i a ( S i ) max ( a S i , b S i )
where K is the number of clusters in each experiment, a ( S i ) is the average dissimilarity of the i th object to all objects in the same cluster, and b S i is the average dissimilarity of the i th object with all objects in the closest cluster.
Algorithm 1: Initialization phase (IAC)
1. 
For each sensor node S i  do
2. 
         Calculate Cp i factor using Equation (7)
3. 
End for
4. 
Sort all the SNs in descending order based on Cp
5. 
Select the k first SNs that have a maximum value of Cp as CH using Equation (8)
6. 
CHs = j = 1 k CH j
7. 
S T   = S T     CHs
8. 
for each S i in S T  do
9. 
         for each CH j in CHs do
10. 
               Calculate d ( S i   , CH j ) using Equation (10)
11. 
       End for
12. 
       Select min_d( ( S i   , CH j )
13. 
       if  C range ( S i   , CH j ) ≥ min_d( ( S i   , CH j ) then
14. 
                         Put S i   near CH j
15. 
                         S i   . CN ,   CH j . CN
16. 
       else                     //     C range S i , CH j < min Futureinternet 15 00075 i001 _ d ( S i   ,   CH j )  
17. 
                         Drop S i in a free cell in the grid
18. 
                          S i   . CN     CH j . CN
19. 
//NewNumber = total number of clusters + 1
20. 
       End if
21. 
End for
Initialized clusters with a most similar cluster head (MSCH) are formulated by selecting the minimal distance min_ d S i   ,   CH j between each sensor node S i and each cluster head CH j . Each node’s property is represented by the Euclidean distance of the sensors, which is defined as follows:
d ( S i   ,   CH j ) = ( L = 1 N att ( S i   . att L CH j . att L ) 2
where d S i   ,   CH j is the distance between the sensor S i and the CH j , S i   . att L is the L th attribute of sensor S i , and CH j . att L is the L th attribute of the j th Cluster Head.
Node S i with a distance to CH j less than their communication range C range ( S i ,   CH j ) is assigned to the cluster via   CH j . The CN of S i is changed to CH j ’s CN. Alternatively, the S i that failed to be assigned to any cluster is placed in a random free grid cell, and S i CN is updated. The main clustering step then begins after the initialization process.

4.2.2. Main Clustering

Once the previous phase is complete, we will have obtained k clusters with their CHs and other nodes that were not yet assigned to any clusters (free clusters). We apply Algorithm 2. The ant moves randomly around the grid, calculating the dropping probability function for empty cells along the way after verifying the pick-up probability. If a sensor’s drop probability in an empty cell exists, the ant will drop it, and the CN of S i will be replaced by the CN of the closest CH in the ant’s neighbourhood while verifying the communication range. Otherwise, the ant will randomly place S i in a grid cell (without changing the CN of S i ), which is considered a cluster.
Algorithm 2: main clustering (IAC)
1./*Main loop*/
2.for t = 1 to t max  do
3.      for all ants do
4.             If (ant unladen) then
5.             Compute P pick ( S i   ) using Equation (13)
6.             Select a random real number P r ͼ [0,1]
7.                  If ( P r P pick S i   )  then
8.                    Pick up S i  
9.                 End if
10.              Else
11.                     If (ant carrying object) S i   ) then
12.                        Find MSCH
13.                        Compute P drop ( S i   ) using Equation (14)
14.                        If ( P r P drop S i   )  then
15.                             Try to drop S i   near MSCH
16.                              S i   .CN ← MSCH .CN
17.                             refreshed_memory(ant)
18.                        end if
19.                    End if
20.                     if UnsuccessfulTries > δ then //δ is a predefined threshold
21.                       α ← α + ∆α
22.                      end if
23.             end for
24.  end for
In addition, as mentioned below, we applied several modifications to the ant clustering algorithm to boost its performance. We used short-term memory for each ant to improve the speed and the quality of clustering [23]. As a result, each ant can remembering a few sites where it has effectively dropped a sensor. Then, upon selecting a new sensor, this memory is checked to bias the ant’s direction movement. Eventually, the ant returns to the location where it last dropped a comparable sensor.
During the pick-up/dropping function, the extent of similarity between sensor S i and its neighbours is calculated as follows (we have changed the fundamental notion of this formula offered by [23] with our clustering problem):
f ( S i   ) = max ( 0 ; 1 S 2 S j   S i [ 1 d ( S i   ,   S j ) × C range ( S i   ,   S j ) α μ ]
S i signifies the local neighbourhoods surrounding the site of the communication range, and d S i   ,   S j specifies the distance between sensors S i and S j , where d is the Euclidean distance and α is a factor of the scale for dissimilarity. α is chosen to be very small to prevent the creation of clusters; otherwise, the individual clusters merge. The value of μ , which is the average of the total sum of the distances between the sensors, is calculated by the following formula:
μ = 2 N ( N 1 ) i = 1 N j = 1 i - 1 d ( S i   ,   S j ) × C range ( S i   ,   S j )
where N denotes the total number of sensors in the system.
The probability of an ant picking up or dropping the object is computed when the similarities are assessed as follows:
P pick ( S i   ) = ( K 1 K 1 + f S i   ) 2
P drop ( S i   ) = ( f S i   K 2 + f S i   ) 2
Choosing the appropriate values for K 1 and K 2 significantly impacts the probability of the sensors being picked up or dropped. The pattern of the pick-up function increases as the value of K 1 increases, but the dropping probability decreases as the value of K 2 increases. We chose the most relevant K 1 and K 2 during our experiment to achieve the best outcomes.
In our contribution, we assigned the pheromone concept to the density function, as named in our paper, and the function of similarity is illustrated in Equation (11). This function defines the similarity between a sensor and its neighbours. Hence, a high similarity value signifies a high pheromone value in the context of ant behaviour. The quantity of pheromones (similarity between a sensor and its neighbours) controls how an ant moves. In more detail, the updating pheromone mechanism is defined by computing the pick-up and dropping probabilities concerning removing and inserting a sensor from a cluster, as illustrated in Equations (13) and (14). The calculation of the pick-up and dropping probability functions is based on the similarities between a sensor and its neighbouring sensors. If the pick-up probability value of a sensor in a given field is high, the similarity function (pheromone) between the remaining sensors in this field becomes higher when this sensor is removed. Similarly, when the dropping probability value of a sensor in a new field is higher, the similarity function in this new field (cluster) increases after it is added, which means that the pheromone concentration increases, which indicates convergence to the solution (cluster).

4.3. Sink Placement

As the nodes are clustered, the fundamental goal is to locate multiple sinks to achieve the longest lifespan, more energy efficiency, and the fastest data delivery to each sink. As a result, a sink placement strategy was required to accomplish the predicted goals for each cluster, where all of these clusters would collectively achieve the large-scale WSN goals. If the sink is situated in a location with a small number of neighbour nodes, they would be regularly used to relay packets to the sink. As a result, these nodes consume more energy, causing the WSN’s lifetime to be shortened. Figure 3 represents a scenario in which the sink has a small number of communication neighbours.
Figure 3. Sink location in low-neighbour area.
For this situation, we propose a strategy that places the sinks in the appropriate locations so that the number of nodes surrounding the sink is as high as possible. Therefore, we suggest placing the sink in the barycentre of the cluster with a number of nodes greater than a predetermined number ( N threshold ) and in the barycentre of multiple groups that have the fewest number of nodes. In Figure 4, two possible sink locations are in the barycentre of a cluster with more nodes than the threshold using Equation (15) or in the barycentre of the most neighbour clusters (MNC) using Equation (16). The details are formally described as a flowchart in Figure 5, which depicts the network construction in addition to two possible sink locations.
Figure 4. WSN construction with our proposed strategy.
Figure 5. Flow chart of sink placement.
The coordinates of sink k are denoted as sink k x k , y k and determined according to the possible location as follows:
  • When sink k is located in the barycentre of cluster j:
    x k = i = 1 N j C range i x i i = 1 N j C range i y k = i = 1 N j C range i y i i = 1 N j C range i
    where x i and y i are the coordinates of sensor i, which exists in cluster j, C range i is the range communication of sensor i, and N j is the number of sensors in cluster j.
  • When sink k is located in the barycentre of p neighbour clusters:
    x k = i = 1 p C range i x CH i i = 1 p C range i y k = i = 1 p C range i y CH i i = 1 p C range i
    where CH 1 , , CH i , , CH p is the set of p cluster heads of these neighbours’ clusters with communication range ( r 1 , , r i , , r p ) , x CH i and y CH i are the coordinates of cluster head CH i that exists in cluster i, and p is the number of clusters.

4.4. Data Routing and Transmission

A sink creates pathways between CHs and itself once the CHs are picked. Since the BS includes comprehensive topology information, it chooses the best path in such a way that the routing path’s overall energy consumption is as low as possible. Then, before constructing any paths, it classifies the routes into Direct_path, Direct_nodes_CH, and Multi_path_R.
Direct_path is a path over which nodes communicate directly to the sink without any intermediaries, and those nodes are named Direct_nodes_sink. Direct_nodes_CH is a path of all nodes that use only CHs as intermediate nodes to the sink, and Multi_path_R is a path consisting of multiple intermediate nodes excluding CH. During the transmission phase, the sink verifies whether the CH has sufficient remaining energy to participate. Otherwise, it is replaced by another node in the same cluster as the new CH. However, if its distance from the previous CH is not in the communication range of the old CH or the sink (assigned to this cluster), it will not be considered, and the following node with the next-highest Cp value would be considered instead. This process is successfully executed following Algorithm 3.
Algorithm 3: Cluster Head Adjustment
Input:  Old_CH
Output:  New_CH
1. for each SN in a cluster do
2. calculate Cp
3. select node with max Cp
4. if  C range ( old CH , S i ) ≺ d( old CH , S i   )
5.       select the following nodes with max Cp
6. Else
7.       Select S i as New_CH
8. End for
The sink constructs a Route Set (Multi_path_R) for each CH representing all possible paths to the CH. It already generates a Legitimate Route Set (Multi_path_LR), which includes all of the routes with remaining energy over the threshold energy ( E threshold ). We calculate E threshold using Equation (17). A path constitutes several SNs that use multihop communication to send packets from the CH to the sink. Any path with a sensor node with residual energy below a predetermined E threshold is excluded from the Multi_path_LR set.
E threshold = R energy S i n i
where R energy S i is the sum of all nodes’ residual energies of cluster i, and n i is the number of existing sensors in cluster i.
Then, for all Multi_path_LR, the sink computes the cost of energy, which is the sum of the cost of energy of each node on that path. The optimal path between the CH and sink is thought to be that with the lowest energy cost. We calculate the cost of any route by using Equation (18), which is defined as follows:
cost LRj = x = 0 x LRj d ( S i , S i + 1 ) R energy S i
where R energy S i is the residual energy of node S i , and d ( S i , S i + 1 ) is the distance between S i and the next node S i + 1 .
Algorithm 4: Repacking _CH_ Route
Declare
Drect_nodes_sink = {}
Direct_nodes_CH = {}
Multi_path_R = {}
Multi_path_LR = {}
Multi_path_BR = {}             //represents the set of best routes to CH
1.for each S i in nodes
2.         if d( S i   ,   sin k ) < d( S i   ,   CH ) & C range ( S i   , sin k ) > d( S i   ,   sin k ) then
3.              Add S i to Direct_nodes_sink
4.         Else
5.              for each CH do
6.                    if ( E res   ( CH ) < E threshold ) then
7.                         select new CH using Algorithm 3
8.                         If  S i   ͼ N ( CH ) & C range ( S i   ,   CH ) > d( S i   ,   CH ) then
9.                              Add S i to Direct_nodes_CH
10.                         Else
11.                              for each route Rj ∈ Multi_path_R do
12.                                   if ∀ S i ∈ Rj: d( S i , S i + 1 ) < D threshold     | | E R ( S i ) < E threshold then
13.                                       Multi_path_LR = Multi_path_LR ∪ Rj
14.                                   End if
15.                              End for
16.                             for each route LRj ∈ Multi_path_LR
17.                                   Calculate cost(LRj) using Equation (18)
18.                            end for
19.                             BR = min(cost(LR))
20.                         Multi_path_BR = Multi_path_BR ∪ BR
21.                     End if
22.                 End if
23.             End for
24.          End if
25.end for
After selecting all of the cluster heads and constructing the paths, the sink broadcasts the associated CHs (IDs, location). Upon receiving information about the CHs, the nodes submit a join request to the closest CH, while their neighbour nodes store the inf_Table (Cluster Head ID, CH Residual Energy CH_ E res ,   Neighbours   ID , Neighbours location Nb_Loc, Neighbours Residual Energy Nb_ E res ). As a result, each node has full information about its neighbours, including their position, remaining energy, and CH IDs, and each CH is aware of every cluster member.
Now, each node sends the sensed data to the sink, while employing the proposed routing system shown in Algorithm 4. Each node has a complete info_Table, and each member of the cluster iterates through its inf_Table, shortlisting their neighbour nodes, which are called next_hop_Set. All of the nodes between node i and CH from the shortlisted candidates are recorded in next_hop_Set if the following condition is verified: Consider node i, and j, k, l are i‘s neighbours. Nodes j and l are input into next_hop_Set if their distances to the sink are lower than the distance of node i to the sink d i , CH d j , CH and d i , CH d l , CH .
A cluster member directly determines its next hop by selecting the nearest node to the transmitting one verifying d( S i , S i + 1 ) < D threshold , on top of possessing a higher remaining energy than E threshold . Moreover, our proposed model can provide a way to continue operating when a first node is depleted, where each one of its neighbours deletes all information about it from their inf_Table.

5. Simulation and Evaluation

5.1. Simulation Setup

In this section, we describe our relevant simulation tests, which demonstrate the high efficiency and scalability of the suggested approach. The simulation was performed using the network simulator OMNeT++ for the proposed routing protocol in each case (measuring energy consumption and WSN lifetime) over large scale networks, and python scripts were written to implement the corresponding algorithm of clustering. The simulation was conducted on a Dell Inspiron 155,567 computer with an Intel i7 CPU running at 2.4 GHz, Windows 7 (64-bit), and 8 GB of RAM. We used network settings that are identical to those indicated in Table 4 throughout our simulations.
Table 4. Setting Considered For Our Simulations.
To develop our contribution, we used data from the Stanford Large Network Dataset Collection’s Brightkite dataset, a location-based online social network [65]. There are 5000 nodes in the retrieved dataset, each with its coordinates. We deployed 13 BSs in the network, and we set up the nodes with varied residual energies ranging from 0.3 to 0.9.
As known in the literature, hierarchical protocols and methods are state-of-the-art and based on clustering algorithms such as LEACH [57], DP clustering [61], and HEEMP [39]. We then compared the previous algorithms with our contribution to demonstrate the proposed technique’s performance. LEACH randomly selected and updated the CHs after a fixed amount of time. It also managed to send data from a CH to a specific BS in a random way. In the DP Clustering approach, the CHs are chosen based on the coordinate location of these nodes. The residual energy and node degree are considered while choosing the CHs in the HEEMP. The shortest path is used in all approaches to send the data from the nodes to a specific BS.

5.2. Simulation Results

Table 5 illustrates the fundamental differences relative to the number of hops and clusters. The IAC algorithm is compared to LEACH, HEEMP, and DP clustering to obtain the cluster heads. Our technique shows fewer nodes and clusters with multiple hops than the compared algorithms. Moreover, the maximum number of hops required to reach CH is 3. However, LEACH’s, HEEMP’s, and DP’s clustering are 5, 4, and 4, respectively, since the IAC clustering algorithm is more effective than other clustering techniques on a large scale.
Table 5. Comparison of the efficiency of sensors affectations for different clustering algorithm.

5.2.1. Statistical Results over The Lifetime Based on Various Methods

In this study, we defined the first node’s energy consumption ( FE C ) that ultimately reaches their initial energy ( FE I ) while transmitting the data as a metric to measure the network lifetime t as follows:
t = t f t i
where t f is the instance t when FE C   FE I = 0 , and t i is the instance when the network starts.
The LEACH, HEEMP, DP clustering and the proposed approach were used to investigate the effect of a variable number of sensor nodes on the network’s lifetime. The network’s lifetime was evaluated according to the number of sensors, which ranged from 200 to 1500, as shown in Figure 6a. It is worth noting that the network’s lifetime diminishes as the overall number of sensors grows; this phenomenon occurs mainly because by increasing the number of sensors in the same cluster, the considered sink covers a significant number of nodes’ packets. Our proposed approach shows two possible sink placements: the barycentre of the weighted cluster and the barycentre of the neighbours’ clusters, the Cp factor, and the data routing technique; all of these factors improve the network’s lifetime.
Figure 6. Network lifetime vs. (a) number of sensors, (b) number of cluster heads, varying the number of sinks from 5 to 15 when fixing the number of sensors (N)., (c)-N = 500, (d)-N = 1000.
The network’s lifetime obtained by LEACH, HEEMP, and DP clustering, in addition to our proposed approach, is between 114 s and 95 s, 130 s and 118 s, 145 s and 124 s, and 160 s and 132 s, respectively, as the total number of sensors grows between 200 and 600.
The network’s lifetime decreases as the number of sensors grows for all of the compared algorithms. Nevertheless, in all cases, our proposed method has achieved a more extended network lifetime than the other techniques.
Furthermore, in Figure 6a, we note that by increasing the number of sensors, the lifetime lowers (the first node depletes its energy). We can relate that to different assumptions, e.g. that which nodes are depleted first depends on a set of parameters, such as the initial energy (the energy consumption will increase by increasing the number of sensors, and nodes that have lower initial energy probably deplete its energy first), the location (direct or indirect to sinks), the degree (number of sensors in communication range increases by increasing number of sensors), etc. Using the experimental parameters shown in Table 4, the influence of a variable number of clusters on the network’s performance is investigated in this scenario. The number of clusters increases from 10 to 50. The results are depicted in Figure 6b, where it is clear that the network’s lifetime extends as the number of clusters grows, causing each cluster’s size to diminish. Hence, the number of intracluster communications is reduced. On the other hand, the network’s number of CHs increases as the distance between nodes decreases. Therefore, each CH sends its measurements via a shorter link. This criterion, according to the suggested model, indeed increases the network’s lifetime.
The proposed approach, with all of the algorithms, efficiently balances the residual energy among the sensors of each cluster by increasing the number of groups and decreasing their sizes. Thus, the network’s lifetime is increased. Above all, our proposed approach notably provides the best results.
This scheme evaluates the network lifetime performance of four algorithms by fixing the number of sensors and varying the number of sinks, where Figure 6c depicts a scenario in which the number of sensors is N = 500 and the number of sinks ranges from 5 to 15, and Figure 6d depicts a scenario in which the number of sensors is N = 1000 and the number of sinks ranges from 5 to 15. It is obvious that the network’s lifetime increases as the number of sinks increases, resulting in most of the sensor nodes adopting direct transmission to the sink. Therefore, the number of intracommunications is diminished. Overall, Figure 6c,d indicate how the network’s lifetime improves as the number of sinks increases according to the suggested model.
As the total number of sinks grows, the overall number of sensors that communicate directly to the sink increases, implying that the load on the sensors is reduced, the effect of the energy hole phenomena is diminished, and the network’s lifetime is extended. As an outcome, expanding the number of sinks for a given number of sensors extends the sensor’s lifetime. Conversely, compared to our proposed method, the network’s lifetime acquired by the LEACH, HEEMP, and DP clustering approaches is poor in each case. The proposed approach provides the most extended lifetime. It outperforms the results of other algorithms by at least 4%.

5.2.2. Statistical Results on Average Residual Energy Based on Various Methods

We define the average residual energy (ARE) as the difference between the average initial energy (AIE) and the average energy consumed (AEC) by all nodes. The total average residual energy (ARE) is expressed as follows:
ARE = AIE ASEC
AIE = 1 N i = 0 N IE
AEC = 1 N ( i = 1 N E T ( i ) + E R ( i ) )
where IE is the initial energy of node i, and E T ( i )   and   E R ( i ) are the consumption energy for transmission and reception by node i, respectively.
In this section, we study the performance of the algorithms by measuring their average residual energy. In Figure 7, we evaluate the average residual energy performance of four algorithms with the following number of sensors (N): 200, 400, 600, 800, 1000, and 1500. In Figure 8a,b, we evaluate the network-lifetime performance of four algorithms by fixing the number of sensors and varying the number of sinks. Figure 8a depicts a scenario in which the number of sensors is N = 500 and the number of sinks ranges from 5 to 15; Figure 8b depicts a scenario in which the number of sensors is N = 1000 and the number of sinks ranges from 5 to 15. As a result, the outcomes of Figure 7 and Figure 8a,b validate the observation shown in Figure 6a.
Figure 7. Average residual energy with a wide-ranging number of sensors N.
Figure 8. Average residual energy when fixing the number of sensors (N) and varying the number of sinks (M) from 5 to 15. (a)-N = 500, (b)-N = 1000.
In Figure 7, as the total number of sensors grows, the average residual energy of the previous four methods increases significantly. However, the network lifetime generated by our proposed approach remains the longest; thus, it produces the highest average residual energy out of all of the methods.
The scenarios with varying total numbers of sinks are depicted in Figure 8a,b. The average residual energy produced by the four algorithms falls significantly as the number of sensors grows. Similarly, when the overall number of sinks increases, the overall number of SNs reaching the CH directly in each cluster increases. Consequently, the average residual energy increases as well. Compared to other methods, our approach achieved a higher average residual energy.

5.2.3. Statistical Results for Hops Based on Various Methods

The performance of the routing methods is the main purpose of this section. Figure 9a,b show the equivalent results of the approaches in terms of the average number of hops. It is widely understood that the more prolonged the data transmission path is, the more extended the data transmission delay remains. As a result, reducing the number of hops is a standard network planning method.
Figure 9. Average hops with a variable number when fixing the number of sensors (N) and varying the number of sinks (M) from 5 to 15. (a)-N = 500, (b)-N = 1000.
This approach’s average number of hops decreases as the total number of sinks grows, as seen in Figure 9a,b. When the overall number of sinks increases, the clusters’ cover ranges decrease. The proposed model has a minimum number of hops in each situation, with an average number of hops less than two, as shown in Figure 9a. As the number of sinks increases to 11, the average number of hops is lowered to between 1.559 and 1.423. Since our suggested technique has established pathways from the sensors to the sinks using the Repacking _CH_ Route algorithm, the sensors were connected to their associated CH and sinks. Even though other algorithms have used the clustering strategy, they have not produced superior outcomes to our proposed study achievement.

6. Conclusions

This paper has dealt with the prevalent issues of high energy consumption, short network lifetime, and data transmission delay in a constrained IoT network. It has notably offered a complete analytical model that combines and resolves all mentioned issues using three aspects: clustering optimization, multiple sink placement, and data routing in heterogeneous WSNs.
We have proposed a practical approach that computes Cp factors to select CHs and then constructs referred clusters, where each cluster has been assigned a specific sink according to a proposed architecture. Unlike existing methods that force each cluster to maintain one unchangeable CH, eventually leading to an enormous energy depletion of the CH nodes given the considerable distance between the cluster members’ nodes and the CH, our suggested method ensures that no CH or intermediate node participates or transmits their data packets with less than an energy threshold and more than a distance threshold. Furthermore, the simulation results have showed that our proposed analytical model reduces the number of hops by more than 4% and increases the residual energy by more than 3% compared to other state-of-the-art algorithms. As a result, it outperforms them in terms of increasing the network’s lifetime, decreasing energy consumption, and reducing data transmission delay using different amounts of sensor nodes.
The proposed work can help researchers and developers build and create applications for highly compressed networks. In addition, applications such as smart farming, smart industry, and smart grids can leverage the data produced by the deployed sensors to develop new applications and services for users.
To increase the extent of our contribution to sink placement, we plan to apply our approach in different environments, such as underwater wireless sensor networks (UWSNs). In this regard, we intend to resolve the fixed sink issue by investigating mobile sinks and to highlight potential trade-offs between performance and cost by corroborating the performance results with some further computational complexity analyses.

Author Contributions

Writing—original draft, S.B.; Writing—review & editing, A.Z., E.H.N. and A.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yousif, M.; Hewage, C.; Nawaf, L. IoT Technologies during and Beyond COVID-19: A Comprehensive Review. Future Internet 2021, 13, 105. [Google Scholar] [CrossRef]
  2. Wang, Y.; Zen, H.; Sabri, M.F.M.; Wang, X.; Kho, L.C. Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective. Future Internet 2022, 14, 202. [Google Scholar] [CrossRef]
  3. Qian, C.; Liu, X.; Ripley, C.; Qian, M.; Liang, F.; Yu, W. Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. Future Internet 2022, 14, 64. [Google Scholar] [CrossRef]
  4. Hackl, J.; Dubernet, T. Epidemic Spreading in Urban Areas Using Agent-Based Transportation Models. Future Internet 2019, 11, 92. [Google Scholar] [CrossRef]
  5. Autili, M.; Di Salle, A.; Gallo, F.; Pompilio, C.; Tivoli, M. A Choreography-Based and Collaborative Road Mobility System for L’Aquila City. Future Internet 2019, 11, 132. [Google Scholar] [CrossRef]
  6. Ramakrishnan, A.M.; Ramakrishnan, A.N.; Lagan, S.; Torous, J. From symptom tracking to contact tracing: A framework to explore and assess COVID-19 apps. Future Internet 2020, 12, 153. [Google Scholar] [CrossRef]
  7. Hyla, T.; Pejaś, J. eHealth Integrity Model Based on Permissioned Blockchain †. Future Internet 2019, 11, 76. [Google Scholar] [CrossRef]
  8. Hammood, D.A.; Rahim, H.A.; Alkhayyat, A.; Ahmad, R.B. Body-to-Body Cooperation in Internet of Medical Things: Toward Energy Efficiency Improvement. Future Internet 2019, 11, 239. [Google Scholar] [CrossRef]
  9. Zannou, A.; Boulaalam, A.; Nfaoui, E.H. System service provider–customer for IoT (SSPC-IoT). In Embedded Systems and Artificial Intelligence; Springer: Berlin/Heidelberg, Germany, 2020; pp. 731–739. [Google Scholar]
  10. Trakadas, P.; Simoens, P.; Gkonis, P.; Sarakis, L.; Angelopoulos, A.; Ramallo-González, A.P.; Skarmeta, A.; Trochoutsos, C.; Calvο, D.; Pariente, T.; et al. An artificial intelligence-based collaboration approach in industrial iot manufacturing: Key concepts, architectural extensions and potential applications. Sensors 2020, 20, 5480. [Google Scholar] [CrossRef]
  11. Sayeed, A.; Verma, C.; Kumar, N.; Koul, N.; Illés, Z. Approaches and Challenges in Internet of Robotic Things. Future Internet 2022, 14, 265. [Google Scholar] [CrossRef]
  12. Parada, R.; Palazón, A.; Monzo, C.; Melià-Seguí, J. RFID Based Embedded System for Sustainable Food Management in an IoT Network Paradigm. Future Internet 2019, 11, 189. [Google Scholar] [CrossRef]
  13. Djukanovic, G.; Kanellopoulos, D.N.; Popovic, G. Evaluation of a UAV-Aided WSN for Military Operations: Considering Two Use Cases of UAV. Int. J. Interdiscip. Telecommun. Netw. (IJITN) 2022, 14, 1–16. [Google Scholar] [CrossRef]
  14. Sam, A.J.; Mahamuni, C.V. A Wireless Sensor Network (WSN) Prototype for Scouting and Surveillance in Military and Defense Operations using Extended Kalman Filter (EKF) and FastSLAM. SSRN Electron. J. 2022. [Google Scholar] [CrossRef]
  15. Ahmad, R.; Wazirali, R.; Abu-Ain, T. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 2022, 22, 4730. [Google Scholar] [CrossRef] [PubMed]
  16. Cureau, R.J.; Pigliautile, I.; Pisello, A.L. A New Wearable System for Sensing Outdoor Environmental Conditions for Monitoring Hyper-Microclimate. Sensors 2022, 22, 502. [Google Scholar] [CrossRef] [PubMed]
  17. Fascista, A. Toward Integrated Large-Scale Environmental Monitoring Using WSN/UAV/Crowdsensing: A Review of Applications, Signal Processing, and Future Perspectives. Sensors 2022, 22, 1824. [Google Scholar] [CrossRef] [PubMed]
  18. Bouarourou, S.; Boulaalam, A.; Nfaoui, E.H. A bio-inspired adaptive model for search and selection in the Internet of Things environment. PeerJ Comput. Sci. 2021, 7, e762. [Google Scholar] [CrossRef]
  19. Bouarourou, S.; Zannou, A.; Boulaalam, A.; Nfaoui, E.H. Sensors Deployment in IoT Environment. In Proceedings of the International Conference on Digital Technologies and Applications, Fez, Morocco, 15–20 December 2022; pp. 276–283. [Google Scholar]
  20. Nazib, R.; Moh, S. Sink-Type-Dependent Data-Gathering Frameworks in Wireless Sensor Networks: A Comparative Study. Sensors 2021, 21, 2829. [Google Scholar] [CrossRef]
  21. Zannou, A.; Boulaalam, A.; Nfaoui, E.H. SIoT: A New Strategy to Improve the Network Lifetime with an Efficient Search Process. Future Internet 2020, 13, 4. [Google Scholar] [CrossRef]
  22. Mishra, S.; Thakkar, H. Features of WSN and Data Aggregation techniques in WSN: A Survey. Int. J. Eng. Innov. Technol.(IJEIT) 2012, 1, 264–273. [Google Scholar]
  23. Oyman, E.; Ersoy, C. Multiple sink network design problem in large scale wireless sensor networks. In Proceedings of the 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577), Paris, France, 20–24 June 2004; pp. 3663–3667. [Google Scholar] [CrossRef]
  24. Safa, H.; Moussa, M.; Artail, H. An energy efficient Genetic Algorithm based approach for sensor-to-sink binding in multi-sink wireless sensor networks. Wirel. Netw. 2013, 20, 177–196. [Google Scholar] [CrossRef]
  25. Wan, R.; Xiong, N.; Loc, N.T. An energy-efficient sleep scheduling mechanism with similarity measure for wireless sensor networks. Hum. -Cent. Comput. Inf. Sci. 2018, 8, 18. [Google Scholar] [CrossRef]
  26. Razzaque, M.A.; Dobson, S. Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing. Sensors 2014, 14, 2822–2859. [Google Scholar] [CrossRef] [PubMed]
  27. Bangash, J.I.; Abdullah, A.H.; Anisi, M.H.; Khan, A.W. A Survey of Routing Protocols in Wireless Body Sensor Networks. Sensors 2014, 14, 1322–1357. [Google Scholar] [CrossRef] [PubMed]
  28. Malik, A.; Khan, M.Z.; Faisal, M.; Khan, F.; Seo, J.-T. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors 2022, 22, 1897. [Google Scholar] [CrossRef] [PubMed]
  29. Lansky, J.; Ali, S.; Rahmani, A.M.; Yousefpoor, M.S.; Yousefpoor, E.; Khan, F.; Hosseinzadeh, M. Reinforcement Learning-Based Routing Protocols in Flying Ad Hoc Networks (FANET): A Review. Mathematics 2022, 10, 3017. [Google Scholar] [CrossRef]
  30. Curry, R.M.; Smith, J.C. A survey of optimization algorithms for wireless sensor network lifetime maximization. Comput. Ind. Eng. 2016, 101, 145–166. [Google Scholar] [CrossRef]
  31. Gawade, R.D.; Nalbalwar, S.L. A Centralized Energy Efficient Distance Based Routing Protocol for Wireless Sensor Networks. J. Sens. 2016, 2016, 1–8. [Google Scholar] [CrossRef]
  32. Tsoumanis, G.; Oikonomou, K.; Koufoudakis, G.; Aïssa, S. Energy-efficient sink placement in wireless sensor networks. Comput. Netw. 2018, 141, 166–178. [Google Scholar] [CrossRef]
  33. Jari, A.; Avokh, A. PSO-based sink placement and load-balanced anycast routing in multi-sink WSNs considering compressive sensing theory. Eng. Appl. Artif. Intell. 2021, 100, 104164. [Google Scholar] [CrossRef]
  34. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, Hawaii, 7 January 2000; Volume 2, p. 10. [Google Scholar]
  35. Ghafoor, S.; Rehmani, M.H.; Cho, S.; Park, S.-H. An efficient trajectory design for mobile sink in a wireless sensor network. Comput. Electron. Eng. 2014, 40, 2089–2100. [Google Scholar] [CrossRef]
  36. Lindsey, S.; Raghavendra, C. PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings of the Aerospace Conference Proceedings, Big Sky, MT, USA, 9–16 March 2002; Volume 3, pp. 1125–1130. [Google Scholar]
  37. Han, Z.; Wu, J.; Zhang, J.; Liu, L.; Tian, K. A general self-organized tree-based energy-balance routing protocol for wireless sensor network. IEEE Trans. Nucl. Sci. 2014, 61, 732–740. [Google Scholar] [CrossRef]
  38. Pantazis, N.A.; Nikolidakis, S.A.; Vergados, D.D. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2012, 15, 551–591. [Google Scholar] [CrossRef]
  39. Sajwan, M.; Gosain, D.; Sharma, A.K. Hybrid energy-efficient multi-path routing for wireless sensor networks. Comput. Electron. Eng. 2018, 67, 96–113. [Google Scholar] [CrossRef]
  40. Bonabeau, E.; Dorigo, M.; Theraulaz, G.; Theraulaz, G. Swarm Intelligence: From Natural to Artificial Systems; Oxford University Press: Oxford, UK, 1999. [Google Scholar]
  41. Sarathy, R.; Shetty, B.; Sen, A. A constrained nonlinear 0–1 program for data allocation. Eur. J. Oper. Res. 1997, 102, 626–647. [Google Scholar] [CrossRef]
  42. Handl, J.; Meyer, B. Ant-based and swarm-based clustering. Swarm Intell. 2007, 1, 95–113. [Google Scholar] [CrossRef]
  43. Jevtić, A. Swarm intelligence: Novel tools for optimization, feature extraction, and multi-agent system modeling. Telecomunicacion. Ph.D. Thesis, Technical University of Madrid, Madrid, Spain, 2011. [Google Scholar]
  44. Jevtić, A.; Quintanilla-Domínguez, J.; Barrón-Adame, J.M.; Andina, D. Image segmentation using ant system-based clustering algorithm. In Proceedings of the Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, Bilbao, Spain, 22–24 September 2011; pp. 35–45. [Google Scholar]
  45. Dorigo, M.; Birattari, M. Swarm intelligence. Scholarpedia 2007, 2, 1462. [Google Scholar] [CrossRef]
  46. Cui, X.; Potok, T.E.; Palathingal, P. Document clustering using particle swarm optimization. In Proceedings of the 2005 IEEE Swarm Intelligence Symposium, Pasadena, CA, USA, 8–10 June 2005; SIS 2005. pp. 185–191. [Google Scholar]
  47. Zhao, C.; Wu, C.; Wang, X.; Ling, B.W.-K.; Teo, K.L.; Lee, J.-M.; Jung, K.-H. Maximizing lifetime of a wireless sensor network via joint optimizing sink placement and sensor-to-sink routing. Appl. Math. Model. 2017, 49, 319–337. [Google Scholar] [CrossRef]
  48. Kabakulak, B. Sensor and sink placement, scheduling and routing algorithms for connected coverage of wireless sensor networks. Ad Hoc Netw. 2019, 86, 83–102. [Google Scholar] [CrossRef]
  49. Hong, Z.; Wang, R.; Li, X. A clustering-tree topology control based on the energy forecast for heterogeneous wireless sensor networks. IEEE/CAA J. Autom. Sin. 2016, 3, 68–77. [Google Scholar] [CrossRef]
  50. Mukherjee, S.; Amin, R.; Biswas, G.P. Design of routing protocol for multi-sink based wireless sensor networks. Wirel. Netw. 2019, 25, 4331–4347. [Google Scholar] [CrossRef]
  51. Cayirpunar, O.; Tavli, B.; Kadioglu-Urtis, E.; Uludag, S. Optimal Mobility Patterns of Multiple Base Stations for Wireless Sensor Network Lifetime Maximization. IEEE Sens. J. 2017, 17, 7177–7188. [Google Scholar] [CrossRef]
  52. Sapre, S.; Mini, S. A differential moth flame optimization algorithm for mobile sink trajectory. Peer—Peer Netw. Appl. 2020, 14, 44–57. [Google Scholar] [CrossRef]
  53. Gosain, D.; Snigdh, I.; Sajwan, M. DSERR: Delay Sensitive Energy Efficient Reliable Routing Algorithm. Wirel. Pers. Commun. 2017, 97, 3685–3704. [Google Scholar] [CrossRef]
  54. Sohraby, K.; Minoli, D.; Znati, T. Wireless sensor networks: Technology Protocols; Applications; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
  55. Heinzelman, W.R.; Kulik, J.; Balakrishnan, H. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th annual ACM/IEEE International Conference on Mobile Computing and Networking, Washington, DC, USA, 15–20 August 1999; pp. 174–185. [Google Scholar]
  56. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  57. Handy, M.; Haase, M.; Timmermann, D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network, Lake Buena Vista, FL, USA, 21–23 May 2003. [Google Scholar] [CrossRef]
  58. Manjeshwar, A.; Agrawal, D.P. TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks. ipdps 2001, 1, 189. [Google Scholar]
  59. Tirani, S.P.; Avokh, A. On the performance of sink placement in WSNs considering energy-balanced compressive sensing-based data aggregation. J. Netw. Comput. Appl. 2018, 107, 38–55. [Google Scholar] [CrossRef]
  60. Sun, P.; Wu, L.; Wang, Z.; Xiao, M.; Wang, Z. Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks. IEEE Access 2018, 6, 36383–36394. [Google Scholar] [CrossRef]
  61. Zannou, A.; Boulaalam, A.; Nfaoui, E.H. Data Flow Optimization in the Internet of Things. Stat. Optim. Inf. Comput. 2022, 10, 93–106. [Google Scholar] [CrossRef]
  62. Lumer, E.D.; Faieta, B. Diversity and adaptation in populations of clustering ants. In Proceedings of the Third International Conference on Simulation of Adaptive Behavior: From Animals to Animats 3: From Animals to Animats 3, Brighton, UK, 8–12 August 1994; pp. 501–508. [Google Scholar]
  63. Deneubourg, J.-L.; Goss, S.; Franks, N.; Sendova-Franks, A.; Detrain, C.; Chrétien, L. The dynamics of collective sorting robot-like ants and ant-like robots. In From Animals to Animats: Proceedings of the First International Conference on Simulation of Adaptive Behavior; MIT Press: Cambridge, MA, USA, 1990; pp. 356–365. [Google Scholar]
  64. Nanda, S.J.; Panda, G. A survey on nature inspired metaheuristic algorithms for partitional clustering. Swarm EComput. 2014, 16, 1–18. [Google Scholar] [CrossRef]
  65. Grover, A.; Leskovec, J. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; pp. 855–864. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.