Next Article in Journal
Edge Even Graceful Labeling of Polar Grid Graphs
Previous Article in Journal
Massive Spin Zero Fields in Cosmology and the Tail-Free Property
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Optimization in Cluster-Based Routing Protocols for Large-Area Wireless Sensor Networks

School of Electrical and Computer Engineering, The University of Seoul, Seoul 02504, Korea
Symmetry 2019, 11(1), 37; https://doi.org/10.3390/sym11010037
Submission received: 9 December 2018 / Revised: 24 December 2018 / Accepted: 25 December 2018 / Published: 2 January 2019

Abstract

:
In large-area wireless sensor networks with hierarchical cluster-based routing protocols, the average number of clusters, k, and the transmission range for the control messages, R, significantly affect the network lifespan. We analyze energy consumption in depth as a function of ( k , R ) , taking into account the energy dissipation of cluster head nodes and the member nodes, separately. To achieve joint optimization of ( k o p t , R o p t ) , we adopt derivative-free Nelder–Mead Simplex method. Computer simulations have shown that our approach effectively reduces energy consumption of sensor nodes in the process of clustering and data transmission in large-area sensor fields. Our optimization can be applied to existing cluster-based routing schemes to maximize their energy efficiency.

1. Introduction

Ad-hoc wireless sensor network (WSN) is a core technology of Internet of Things (IoT) with a wide range of applications including smart home networking and industrial internet of things (IIoT) [1,2]. In IoT environments, the WSNs have large area with many sensor nodes compared with conventional application specific sensor networks. We need more sophisticated energy-efficient routing protocols than conventional ones targeted for relatively small-area WSNs.
WSN is a collection of large numbers of sensor nodes deployed over a large area with a central base station (BS) that collects sensing data. Sensor nodes are characterized by limited sensing, computing and communication capabilities. Moreover, in WSN based IoT environments, several hundreds or thousands of sensor nodes are randomly deployed with limited battery power, which are difficult to be recharged. To overcome limitations from these characteristics, a great emphasis is placed on scalability and efficient energy consumption of WSN in every design aspects including routing protocols, network topology, security key management, etc.
Based on the deployment of nodes, routing protocols can be divided into two types: flat routing and hierarchical routing, which is also called cluster-based routing. In flat routing protocols, all sensor nodes play identical roles in conveying sensing data to the BS. Cluster-based or hierarchical routing protocols refer to routing protocols in which the nodes are grouped into clusters, where a cluster is composed of a cluster head (CH) and one or more member nodes. Cluster-based routing protocols take advantage of load balancing and reducing communication volume in a distributed manner to prolong the network lifespan of WSN. Low Energy Adaptive Clustering Hierarchy (LEACH) [3] is a most widely adopted cluster-based routing protocol for WSN, by virtue of its simplicity and energy efficiency as a fully decentralized scheme.
There has been a lot of research work related to energy consumption in cluster-based routing protocols. In single hop communication, the CH collects data from its member nodes and directly sends these data to the BS, as in LEACH [3]. If the network area is small, then the entire sensor field can be covered by the transmission range of any node in the field, and single hop protocols are advantageous due to minimum overhead and minimum delay. However, cluster-based routing protocols with single hop protocols [4,5,6,7,8,9] are not suitable for IoT environments based on large-area WNS, due to their short lifespan.
Multi-hop communication is more energy efficient approach to routing protocols for large-area sensor networks. In multi-hop cluster-based routing protocols, the CH sends its data via some intermediate nodes to the BS, if necessary. In LEACH-D protocol [10], connectivity density factor and energy factor are considered in computing the threshold value for the CH selection phase. Although it shows improvement in terms of scalability and energy consumption, it still has hotspot problem with difference in cluster sizes. This hotspot problem is addressed in FZ-LEACH protocol [11] to enhance the lifespan of the network. However, the main drawback of FZ-LEACH is non-optimality in the selection of zone heads. This drawback is improved in IFZ-LEACH [12], in which CH divides the sensor field intofar zone and non-far zone to select the zone head from the far zone based on maximum residual energy. However, it suffers from scalability and network complexity. In DL-LEACH [13], the network is divided into several layers and the nodes in lower layers make distance-base determine whether they are to transmit data via CHs or to send data to the BS directly. It has achieved a good improvement in energy consumption with moderate-size sensor networks. However, it suffers from short node lifespan in large-scale or large-area networks. In CL-LEACH [14], the node with residual energy greater than the threshold value performs the tasks of a relay node for multi-hop communication. Broken links are detected by route maintenance and substituted by some new paths in the existing route. The main drawbacks of this protocol are message overheads and complexity. In P-LEACH [15], a mobile base station (BS) is considered instead of a fixed BS. It uses a cluster-based prediction by activating a small number of nodes during the tracking of the mobile BS in the field, which is divided into three regions: partition cluster, communication quadrangle, and four-partition-cluster structure.
Aside from data routing protocol issues, the authors of [16] presented a survey on cluster-based group key agreement (GKA) protocols for WSN security issues, and assessed and measured the efficiency of each GKA protocol in terms of its energy consumption.
Cluster-based routing protocols divide the sensor nodes into an average of k clusters. In conventional WSN, we used the parameter k as a sub-optimized fixed value by rule of thumb, which worked well enough with small-area sensor networks. In large-area WSNs, k needs to be optimized with increased number of sensor nodes. Decentralized cluster-based routing protocols use control messages for cluster head advertisement, join request, message transmission scheduling, etc. In LEACH algorithm [17] and most of its variants, nodes send control messages with maximum power to reach the entire network to ensure that the messages can be received by nodes farthest away in the sensor field. Using this non-optimized max-distance transmission range of R for the control messages, together with another sub-optimized fixed value of k, is one of the main causes of limited improvements in lifespan of large area sensor network in IoT [18,19].
Referring to a survey paper over a hundred of cluster-based routing protocols [20], we found some approaches [21,22] to optimization of k, without compromising decentralized-clustering features. In [21], the authors investigated the optimization of k using a genetic algorithm, in which, however, the improvement significantly degraded by increasing the size of sensor field from 50 m to 100 m, which are still not big enough to be applied in IoT. In [22], uneven probabilities are applied to the election of CH nodes, while using suboptimal k determined by rule of thumb. In general, we could hardly find cluster-based routing protocols with optimization of R, the transmission range for control messages, or with joint optimization of ( k , R ) . In this paper, we investigate a joint optimization of ( k , R ) by in-depth analyses of energy consumption during clustering processes and data transmission in sensor nodes.
Table 1 is a list of symbols and notations used in this paper.

2. Preliminaries

2.1. Energy Consumption Model

We adopt the energy consumption model stated in [3]. Each sensor node is assumed to perform power control depending on the distance between the transmitter and receiver. To transmit an l-bit message over a distance d (m), a sensor node dissipates energy E T ( l , d ) (J) by
E T ( l , d ) = l ( E e + ϵ f d 2 ) , if d < δ l ( E e + ϵ m d 4 ) , if d δ ,
and the corresponding receiver node expends E R ( l ) (J) in the process of receiving this message,
E R ( l ) = l E e ,
where E e = 50 (nJ/bit) represents the energy in the circuitry per bit; ϵ f = 10 (pJ/bit/m2) and ϵ m = 0.0013 (pJ/bit/m4) denote the energy dissipation in the transmission amplifier needed to achieve an acceptable signal-to-noise ratio according to the free space model (Friss) and the multi-path model, respectively; and δ = ϵ f / ϵ m 87.7 (m). The energy for data aggregation per bit is set as E DA = 5 (nJ/bit). Given two nodes communicating with each other, we also assume symmetry of the forward and reverse path power dissipation, i.e., the same amount of energy is consumed in the forward and reverse paths.

2.2. Cluster-Based Hierarchical Routing

It is assumed that there are N sensor nodes deployed in a circular-shaped field with radius of L (m). The distribution of the sensor nodes is uniformly random within this area, and the deployment is independent for different nodes. All nodes are assumed to have the same sensing ability and the same initial amount of energy. The sensing data are forwarded to a remote base station (BS) by performing the employed routing protocol. The BS is assumed to be at the border or outside of the sensing area.
In cluster-based routing protocols, time line is divided into rounds. Each round begins with the set-up phase, which is composed of CH selection and control message communications. A random number of CHs are elected in the set-up phase of each round. The number of CHs in a round is a random variable whose expectation is k. Conventional algorithms have estimated the value of k to be 5 by rule of thumb. Rounds, r = 0 , 1 , 2 , , are grouped together in such a manner that rounds from r = 0 to r = N / k 1 form a group of rounds (GOR), rounds from r = N / k to r = 2 N / k 1 form another GOR, and so on. Let G be the set of nodes that have not been CHs within current GOR. Then, in round r, node i ( i = 1 , 2 , N ) chooses to become a CH with the probability of
T i , r = k N k · ( r mod N k ) , i G 0 , otherwise .
According to Equation (3), each node serves as a CH one time in a GOR. CH selection is followed by three sequential steps of transmitting control messages: (i) CHs for this round broadcast advertisement (ADV) messages; (ii) non-CH nodes transmit join-request (Join-REQ) messages; and (iii) CHs send TDMA scheduling messages to their members. This ends the set-up phase of a round.
The set-up phase is followed by the steady-state phase in which the CHs gather, aggregate, and route the data from sensors within their cluster. If a non-CH node has failed to join a cluster in a round, it transmits its DATA to the base station (BS) directly for that round. Each member node of a cluster transmits DATA to its CH. CH nodes then perform data aggregation and finally send the aggregated data to the BS.

2.3. Problem Statement

In conventional LEACH-based algorithms, DATA messages are transmitted under power control. However, the control messages including ADV, Join-REQ, and TDMA are assumed to be transmitted with the fixed power enough to reach over a maximum distance of 2 L in the field. This fixed transmission range, R = 2 L , would be inappropriate for IoT based on large-area WSN. Furthermore, this non-optimized, max-distance transmission radius, R = 2 L , for control messages have caused us to set the number of clusters, k, to be a sub-optimal value k = 5 [3], which is used as the rule of thumb thereafter. It is observed that the sub-optimal value k = 5 also significantly shorten the network lifespan especially when L becomes large.
We now write the problem statement as follows. Assume we have N sensor nodes over a circular-shaped sensor field with radius L δ (e.g., L > 200 m ). Our goal in this paper is to jointly optimize the average number k of CH nodes and transmission radius R ( L < R < 2 L ) for the control messages to minimize overall energy consumption in a round or to maximize the sensor network lifespan.

3. Energy Consumption Analysis

Consider the circular-shaped sensor field with radius of L (m) in Figure 1. The center of the sensor field is the origin (0, 0) of the coordinate system. Let S ( S L ) denote distance of BS from the center of the sensor field. The base station (BS) is considered to be at the border or outside of the sensor field at coordinate (S, 0). Within the sensor field, we have a node at r ( 0 < r < L ) (m) away from the origin (0, 0). Each node has transmission radius R ( L < R < 2 L ) for control messages including ADV, Join-REQ, and TDMA messages.
Consider a node marked at r ( 0 < r < L ) (m) away from the origin in Figure 1. Using a dashed circle, we show the transmission radius R (m) of control messages for the marked node. Inside of the sensor field, the area covered by the transmission range of the marked node is called effective area of the marked node. In the case of 0 < r < R L , the marked node is close to the center of the sensor field. In this case, the transmission range depicted by the dashed circle includes the entire sensor field as in Figure 2a; and the effective area of the marked node is exactly the same as the entire sensor field. However, in the case of R L < r < L , the sensor field is covered in part by the transmission range of the marked node as in Figure 2b, and the effective area of the node is the intersection of the two partially overlapping circles.
By assuming symmetrical propagation channel between any two nodes, a node can hear ADV messages from other nodes which only reside in its effective area. The effective area A ( r , R ) of a node at r (m) ( 0 < r < L ) away from the origin, with transmission range R, is calculated by (see Appendix A for its derivation)
A ( r , R ) = π L 2 , 0 < r < R L , I ( r , R ) , R L < r < L ,
where
I ( r , R ) = R 2 cos 1 r 2 + R 2 L 2 2 r R + L 2 cos 1 r 2 + L 2 R 2 2 r L 1 2 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2
is the intersection area of the two partially overlapped circles. The expectation, A ¯ ( R ) , of the effective area is given by (see Appendix B for its derivation)
A ¯ ( R ) = 1 π L 2 0 2 π 0 L A ( r , R ) r d r d θ      = π ( R L ) 2 + 2 L 2 R L L I ( r , R ) r d r      = 2 R 2 cos 1 R 2 L + L 2 cos 1 1 R 2 2 L 2 ( 2 L 2 R + R 3 ) 4 L 2 R 2 4 L 2 .
It is noted that Equation (5) is calculated by taking into account both the total inclusion and partial overlap cases to obtain the expectation of transmission range of an arbitrary node.
Given k and R, we consider the probability that a node hears ADV messages from n CHs as the probability that a node has n CHs in its effective area. We model this probability as the spatial Poisson process, which is a stationary two-dimensional Poisson point process successfully adopted in modeling wireless sensor networks [23,24,25]:
P k , R ( n ) = λ A ¯ ( R ) n n ! e λ A ¯ ( R ) ,
where the density, the number of sensor nodes per unit area,
λ = k π L 2
is the average number of CHs within unit area. A node can join a cluster if it has heard from one of more CHs. Therefore, the probability that a node fails to join a cluster for the current round is given by the probability of hearing zero ADV message:
P k , R ( 0 ) = e k π L 2 A ¯ ( R ) .
The length of ADV, Join-REQ, TDMA, and DATA messages are denoted by l A , l J , l T ( k , R ) , and l D , respectively (in bits). Among them, lengths l A , l J , and l D are fixed. However, the length of a TDMA schedule message, l T ( k , R ) , depends on the number of member nodes in the current cluster, and the number of members, again, depends on ( k , R ) . The expected number of non-CH nodes which successfully join clusters is
( N k ) ( 1 P k , R ( 0 ) ) ,
which, after dividing by k, gives the expected number of member nodes in a cluster. We have
l T ( k , R ) = 16 ( N k ) ( 1 P k , R ( 0 ) ) k ,
where 16 is assumed to be the number of bits to represent each node ID. In the following subsections, we analyze the overall amounts of energy that are expended by the nodes in a round as a function of k and R.

3.1. Energy Dissipation by Non-CH Nodes

In this subsection, we analyze the expected amount of energy consumed by non-CH nodes in a round. First, consider sending Join-REQ messages with transmission radius of R. Since we have R > L and assume
L δ ,
the expectation of energy dissipation E T J o i n by a non-CH node sending a Join-REQ message is given by
E T J o i n = ( 1 P k , R ( 0 ) ) l J ( E e + ϵ m R 4 ) .
Modeling each of k clusters as a circle with the expectation of radius, r C H , we calculate the area of each cluster as
π r C H 2 = π L 2 k ,
from which
r C H = L k .
If we have k < ( L / δ ) 2 then r C H > δ and vice versa. Let d C H denote the distance from a member node to its CH. The expected amount of energy E T t o C H consumed by a member node while sending a DATA message to its CH is calculated by
E T t o C H = ( 1 P k , R ( 0 ) ) l D E e + ϵ f d C H 2 ¯ + ϵ m d C H 4 ¯ ,
where, using Equation (10),
d C H 2 ¯ = 2 π π r C H 2 0 min ( r C H , δ ) r 3 d r    = min L 2 2 k , δ 2 2 ,
and
d C H 4 ¯ = 2 π π r C H 2 δ max ( δ , r C H ) r 5 d r    = max L 6 k 3 δ 6 3 k 2 L 2 , 0 .
We assume that the base station (BS) resides at coordinate ( S , 0 ) where S L . A non-CH node, failing to join a cluster, sends a DATA message to the BS directly, consuming the amount of energy E T t o B S . Let d B S denote the distance from a node to the BS. With large fields, E T t o B S will be dominated by nodes with d t o B S > δ , as follows.
E T t o B S = P k , R ( 0 ) l D E e + ϵ f d B S 2 ¯ + ϵ m d B S 4 ¯       P k , R ( 0 ) l D E e + ϵ m d B S 4 ¯ ,
where
d B S 4 ¯ = 1 π L 2 S L S + L 2 x 5 cos 1 x 2 + S 2 L 2 2 x S d x      = S 4 + 2 S 2 L 2 + L 4 3 , ( S L ) .
The expectation of the number of CHs seen by a non-CH node is
k π L 2 A ¯ ( R ) .
The energy E R A D V consumed by a non-CH node while receiving ADV messages is
E R A D V = k π L 2 A ¯ ( R ) l A E e .
A non-CH node receives a TDMA scheduling message from its CH by expending energy E R T D M A :
E R T D M A = l T ( k , R ) E e ,
where l T ( k , R ) is given in Equation (8).
Consequently, the expectation of total energy expended by all non-CH nodes in a round is given by
E n o n C H ( k , R ) = ( N k ) E T J o i n + E T t o C H + E T t o B S + E R A D V + E R T D M A .

3.2. Energy Dissipation by CH Nodes

We now analyze the expected amount of energy expended by CH nodes in a round. First, consider sending ADV and TDMA messages with transmission radius of R. Average amount of energy consumption by a CH node while transmitting ADV and TDMA messages are
E T A D V = l A ( E e + ϵ m R 4 )
and
E T T D M A = l T ( k , R ) ( E e + ϵ m R 4 ) ,
respectively.
The average number of member nodes of a CH is ( N k ) ( 1 P k , R ( 0 ) ) / k . The expected data-aggregation energy by a CH node is
E A g g = 1 + ( N k ) ( 1 P k , R ( 0 ) ) k l D E D A .
A CH node sends aggregated data to the BS by expending E T C H t o B S
E T C H t o B S = l D E e + ϵ m d B S 4 ¯ ,
where d B S 4 ¯ is calculated as in Equation (13).
In LEACH-based clustering protocol, a CH node receives other CHs’ ADV messages, although they are just dumped; we ignore the energy related to this step. A CH node will hear Join-REQ messages from all non-CH nodes in its control-message range, to check if they are destined for itself or not. Therefore, while a CH node receives Join-REQ messages, it consumes E R J o i n :
E R J o i n = l J E e ( N k ) A ¯ ( R ) π L 2 .
A CH requires energy E R D A T A during receiving DATA from its member nodes as follows:
E R D A T A = ( N k ) ( 1 P k , R ( 0 ) ) k l D E e .
Consequently, the expectation of the total energy expended among all CH nodes in a round is given by
E C H ( k , R ) = k E T A D V + E T T D M A + E A g g + E T C H t o B S + E R J o i n + E R D A T A .
Finally, the expected amount of energy consumption in a round is
E ( k , R ) = E n o n C H ( k , R ) + E C H ( k , R ) .

4. Optimization of ( k , R )

Our goal is to find the optimized k o p t ( 0 < k o p t < N ) and R o p t ( L < R o p t < 2 L ) to minimize E ( k , R ) as in:
( k o p t , R o p t ) = arg min ( k , R ) E ( k , R ) .
We note that k o p t can be calculated as a real number, which can be readily applied to the LEACH algorithm by using rounding off form [ N / k ] for the place of N / k in the cluster-selection probability (Equation (3)).
Although E ( k , R ) is high-order differentiable, getting gradients or Hessian matrix is expensive and complicated. Since E ( k , R ) is observed to have convex-downward shape, as shown by the simulation presented below, we choose Nelder–Mead (N-M) Simplex algorithm [26,27], as a derivative-free optimization method. We suggest constructing the initial simplex as the following three vertices, v 1 , v 2 , and v 3 :
v 1 = ( k 1 , R 1 ) = ( 5 , 3 L 2 ) , v 2 = ( k 2 , R 2 ) = ( 5 + Δ k , 3 L 2 + Δ R ) , v 3 = ( k 3 , R 3 ) = ( 5 + Δ k , 3 L 2 Δ R ) ,
where Δ k and Δ R are 5% value of k 1 and R 1 , respectively. In the first simplex v 1 , k is chosen to be 5 and R is taken as the mid-point of interval [ L , 2 L ] . Large-area sensor networks with large number of sensor nodes often show the optimum values of k o p t , which are greater than k = 5 by conventional rule of thumb. Therefore, we suggest that both the second simplex v 2 and the third, v 3 , have k = 5 + Δ k , instead of using conventional initialization with k = 5 + Δ k for v 2 and, k = 5 Δ k for v 3 .
The N-M optimization algorithm starts with the three vertices v 1 , v 2 , and v 3 . The function E ( k , R ) takes on values E ( v 1 ) , E ( v 2 ) , and E ( v 3 ) . The function values are to be compared to determine the best vertex, second best vertex, and the worst vertex. For N-M simplex transformations, we have used the standard values, 1, 1/2, 1, and 1/2 for the reflection, expansion, contraction, and shrink transformation, respectively. According to the N-M implementation in [27], we iteratively continue the ordering, centroid, and transformation steps of N-M algorithm with given termination tests to obtain the optimization value of v o p t = ( k o p t , R o p t ) .
It is noted that the computational procedure for our proposed optimization described in this paper is not carried out by the sensor nodes, but is carried out at the base station (BS) and/or at the management center, which are assumed to have enough computational capabilities being supplied with sufficient power. The optimized parameters ( k o p t , R o p t ) calculated at the management center can be implemented as a design parameter during the firmware installation for sensor nodes. The optimized parameters calculated at the BS can be broadcast to the sensor nodes deployed in the field through the wireless channel.

5. Performance Evaluation

In the performance evaluation, we used the lengths of messages as in the LEACH code [17]: l A = 16 , l J = 16 , and l D = 8 × ( 500 + 25 ) (bits). We considered N = 100 or N = 200 . We carried extensive simulations with large sizes of sensor fields, L = { 200 m , 300 m , 400 m } , compared with the typical size of 100 m considered in most existing WSN routing protocols [3,18,19,20,21]. The unit of L and R is meters. We assumed S = L , i.e., the BS is on the boundary of the field.
With our derived energy function E ( k , R ) , Nelder–Mead Simplex algorithm converged in an average of 50 iterations taking around 50 ms on a CPU running at 3.10 GHz. In Figure 3, we show a contour plot of E ( k , R ) with N = 200 and L = 400 m . We also show the locations of initial simplex v 1 = ( 5 , 600 m ) and the final optimized simplex v o p t = ( 6.5 , 525 m ) after 54 iterations. The marks connected with dotted lines between v 1 and v o p t show the path of simplex transformations from the iterations of N-M optimization. A closer investigation on the convergence behavior of the N-M optimization process is shown in Appendix C. We observed that the iterations have 3 expansions, 9 reflections, 6 outside-contractions, and 36 inside-contractions out of a total of 54 transformations. Overall, 66% of transformations are inside-contractions, which means the energy function E ( r , R ) has a very good shape for optimization.
We evaluated our proposed optimization by simulation with the LEACH code [17] from the originator, which runs on NS2 and has been verified in the literature, to obtain higher level of objectivity of our simulation results. For each scenario, we ran 100 simulations with different seed numbers to obtain narrow confidence intervals.
In Table 2, we compare average energy consumption per node in a round with measure (mJ/node/round), between the original LEACH [3] and the LEACH with our optimization. Each value was obtained from several hundreds of rounds with all N nodes alive in the cluster-based routing algorithms. The larger are N and L, the higher is the percentage of energy savings. We also show the optimized parameters ( k o p t , R o p t ) in the table as compared with the fixed values of ( k = 5 , R = 2 L ) in the existing LEACH-based algorithms. It was observed that the optimum number k of clusters is dominated by N. On the other hand, R is mainly affected by the size, L, of sensor field.
Figure 4 shows simulation results with N = 200 and L = 400 m . Every node had an initial energy of 10 (J). The original LEACH [3] takes k = 5 by rule of thumb, and R = 2 L = 800 m to make sure that the entire sensor field is covered by any sensor node. In the figure, we show the number of nodes alive over simulation time in rounds. In the original LEACH [3], the average node lifespan is 110 rounds. Our proposed optimization, shown as “LEACH with Optimization”, takes k o p t = 6.5 and R o p t = 525 m and outperforms the original, non-optimized LEACH [3] with an average node lifespan of 178 rounds, which is an increment of 62%. A genetic algorithm based optimization, LEACH-GA [21], does not take into account the energy dissipation for control messages, and yields an optimized value of k = 3.4 , which resulted in quick energy depletion in our simulation environment with large area sensor field.
In Figure 5, we show how much our optimization improves another LEACH-based algorithm, LEACH-DT [22], which applies uneven probabilities to nodes in CH selection depending on the distance to the BS. LEACH-DT [22] uses the same parameters k = 5 and R = 2 L = 800 (m) as in the original LEACH. LEACH-DT itself outperforms the original LEACH, as shown in the figure. We could further improve LEACH-DT by running it with our optimized parameters k o p t = 6.5 and R o p t = 525 m , i.e., we used uneven CH-selection probabilities while keeping the average of 6.5 CHs in each round and setting the transmission radius for control messages to be 525 m. This improved LEACH-DT significantly, as shown in the curve “LEACH-DT with Optimization”.
In Table 3, we compare performance in terms of time to percentage-node-death in rounds among the schemes compared in Figure 5. Our proposed optimization improved the network lifespan in terms of all criteria, 1–90%, in the table. We note that our optimization helps LEACH and LEACH-DT improve energy efficiency by increasing the lifespan dramatically with optimization. Consequently, our proposed optimization is expected to help existing cluster-based routing protocols to further improve in terms of network lifespan.

6. Conclusions

We have analyzed the expectation of energy dissipation in a round as a function of k and R to obtain joint optimization values of ( k o p t , R o p t ) . We have analyzed the amount of energy dissipation of CH nodes and non-CH nodes to derive the expectation of energy consumption in a round as a function of system design parameters ( k , R ) with given network parameters including the number of sensor nodes N and the radius L of the sensor field. Our analyzed energy function is computationally tractable for derivative-free optimization algorithms, among which we adopt Nelder–Mead (N-M) simplex algorithm in our proposed scheme. The optimization procedure converges quickly enough for the BS or management center to run the optimization algorithm in real time. Our proposed method outperforms existing non-optimized LEACH-based schemes in terms of average node lifespan by saving the energy consumption by several tens of percent. Our optimization approach is expected to help existing cluster-based algorithms to further improve their energy efficiency.

Funding

This work was supported by the 2015 Research Fund of the University of Seoul.

Conflicts of Interest

The author declares no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
WSNWireless Sensor Network
IIoTIndustrial Internet of Things
LEACHLow Energy Adaptive Clustering Hierarchy
CHCluster head
BSBase station
GORGroup of Rounds
ADVAdvertisement
Join-REQJoin-request
TDMATime division multiple access

Appendix A. Derivation of Effective Area A(r,R)

In this appendix, we outline the derivation of Equation (4), the effective area. First, in the case of 0 < r < R L , the sensor field is totally included in the transmission range, and the effective area is the area of sensor field itself, π L 2 . Second, if we have R L < r < L , then the two circles of transmission range and sensor field are partially overlapped. In this case, the effective area is the intersection area, I ( r , R ) , of the two circles, as explained in the remainder of this appendix.
As in Figure A1a, let C 1 and C 2 be the two circles of radii R and L, respectively, whose centers are at a distance r ( R L < r < L ) from each other. In this appendix, we temporarily use a Cartesian coordinate system with origin at the center of circle C 1 with R such that the center of C 2 with L is at ( r , 0 ) , as in Figure A1a.
Figure A1. Two intersecting circles C 1 with radius R and C 2 with radius L. (a) Overlapping of sensor field and transmission range; (b) Upper half of the intersection area.
Figure A1. Two intersecting circles C 1 with radius R and C 2 with radius L. (a) Overlapping of sensor field and transmission range; (b) Upper half of the intersection area.
Symmetry 11 00037 g0a1
The circles C 1 and C 2 are described by the following equations, respectively:
x 2 + y 2 = R 2
( x r ) 2 + y 2 = L 2 .
We have x = d 1 at the two intersection points. Replacing x with d 1 and isolating y 2 on both equations above, we have
R 2 d 1 2 = L 2 ( d 1 r ) 2 .
Solving for d 1 , we have
d 1 = R 2 L 2 + r 2 2 r .
As in Figure A1a, let r = d 1 + d 2 , or
d 2 = r d 1 .
We calculate the upper-half areas, A 1 and A 2 , of the segments from circles C 1 and C 2 , respectively, as in Figure A1b. We have
A 1 = d 1 R R 2 x 2 d x
A 2 = r L d 1 L 2 ( x r ) 2 d x .
The computation of these integrals is straightforward. Before we proceed, notice first that
A 2 = r L d 1 L 2 ( x r ) 2 d x = L d 1 r L 2 x 2 d x = r d 1 L L 2 x 2 d x = d 2 L L 2 x 2 d x
This is the same as Equation (A8) if we apply the substitutions d 1 d 2 and R L . Therefore, by computing A 1 , we immediately obtain A 2 as well. We have
A 1 = d 1 R R 2 x 2 d x = R d 1 R 1 x R 2 d x = R 2 d 1 / R 1 1 x 2 d x .
The indefinite integral of 1 x 2 is straightforward by using integration by parts:
1 x 2 d x = x 1 x 2 x x 1 x 2 d x = x 1 x 2 + x 2 1 1 x 2 d x + 1 1 x 2 d x = x 1 x 2 1 x 2 d x + sin 1 ( x ) .
Therefore, we have
1 x 2 d x = 1 2 x 1 x 2 + sin 1 ( x ) .
Using Equation (A11) on Equation (A9) yields
A 1 = R 2 2 π 2 d 1 R 1 d 1 R 2 sin 1 d 1 R = R 2 2 cos 1 d 1 R d 1 R 1 d 1 R 2 = R 2 2 cos 1 d 1 R d 1 2 R 2 d 1 2 .
where we used the fact that π / 2 sin 1 ( α ) = cos 1 ( α ) for any α in [ 1 , 1 ] . As discussed above, we can now obtain A 2 directly by doing the substitutions d 1 d 2 and R L on the expression for A 1 on Equation (A12)
A 2 = L 2 cos 1 d 2 L d 2 L 2 d 2 2 .
Finally, intersection area I ( r , R ) is computed as twice of the sum of A 1 and A 2
I ( r , R ) = 2 ( A 1 + A 2 ) = R 2 cos 1 d 1 R d 1 R 2 d 1 2 + L 2 cos 1 d 2 L d 2 L 2 d 2 2 .
By using Equations (A4) and (A5), we have
I ( r , R ) = R 2 cos 1 r 2 + R 2 L 2 2 r R + L 2 cos 1 r 2 + L 2 R 2 2 r L 1 2 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 .

Appendix B. Expectation of Effective Area A ¯ ( R )

In this appendix, we derive the expectation (Equation (5)) of effective area. The expectation, A ¯ ( R ) , of the effective area of a node can be obtained by averaging the effective area A ( r , R ) over the entire sensor field, which can be represented in a polar coordinate system:
A ¯ ( R ) = 1 π L 2 0 2 π 0 L A ( r , R ) r d r d θ .
Applying Equation (4) to Equation (A16), we have
A ¯ ( R ) = 1 π L 2 0 2 π 0 L A ( r , R ) r d r d θ = 2 π π L 2 0 L A ( r , R ) r d r = 2 L 2 0 R L π L 2 r d r + R L L I ( r , R ) r d r = π ( R L ) 2 + 2 L 2 R L L I ( r , R ) r d r = π ( R L ) 2 + 2 R 2 L 2 R L L r cos 1 r 2 + R 2 L 2 2 r R d r + 2 R L L r cos 1 r 2 + L 2 R 2 2 r L d r 1 L 2 R L L r 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 d r
To calculate Equation (A17), we need to have the corresponding indefinite integrals. For the first integration out of the three integrals in Equation (A17), we have
r cos 1 r 2 + R 2 L 2 2 r R d r = 1 2 r 2 cos 1 r 2 + R 2 L 2 2 r R 1 4 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 L 2 2 tan 1 R 2 + L 2 r 2 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 .
For the second integration in Equation (A17), we can now obtain the indefinite integration by doing the substitutions R L and L R on Equation (A18). For the third integration in Equation (A17), we have
r 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 d r = ( r 2 R 2 L 2 ) 4 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 R 2 L 2 tan 1 R 2 + L 2 r 2 4 r 2 L 2 ( r 2 R 2 + L 2 ) 2 .
Finally, we obtain the expectation of effective area A ¯ ( R ) by applying the indefinite integrals in Equations (A18) and (A19) to the definite integrals in Equation (A17) followed by straightforward manipulating for simplifications:
A ¯ ( R ) = 2 R 2 cos 1 R 2 L + L 2 cos 1 1 R 2 2 L 2 ( 2 L 2 R + R 3 ) 4 L 2 R 2 4 L 2 .

Appendix C. Convergence Behavior of the Optimization

In this appendix, we show the convergence behavior of the N-M optimization process in terms of iteration, function counts, function values, and N-M procedures with N = 200 and L = 400 .
In Table A1, “Func-Count” means the number of function evaluations and “Procedure” means the type of transformation in N-M optimization algorithm. We use the convergence criteria of 1 × 10 4 for E ( k , R ) to terminate the iteration.
Table A1. Optimization process.
Table A1. Optimization process.
IterationFunc-Count E ( k , R ) Procedure
134.6879initial simplex
254.63203expand
374.50425expand
494.50425contract inside
5114.40857expand
6124.40857reflect
7134.40857reflect
8144.40857reflect
9164.40857contract inside
....................
51954.40667contract inside
52974.40667contract inside
53994.40667contract inside
541014.40667contract inside

References

  1. Ghayvat, H.; Mukhopadhyay, S.; Gui, X.; Suryadevara, N. WSN- and IoT-based smart homes and their extension to smart buildings. Sensors 2015, 15, 10350–10379. [Google Scholar] [CrossRef] [PubMed]
  2. Zhou, M.; Zhao, M.; Liu, A.; Ma, M.; Wang, T.; Huang, C. Fast and efficient data forwarding scheme for tracking mobile targets in sensor networks. Symmetry 2017, 9, 269. [Google Scholar] [CrossRef]
  3. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  4. Essam, M.; Shaaban, E. Enhancing S-LEACH security for wireless sensor networks. Int. J. Appl. Comput. 2011, 4, 101–107. [Google Scholar]
  5. Manzoor, B.; Javaid, N.; Rehman, O.; Akbar, M.; Nadeem, Q.; Iqbal, A.; Ishfaq, M. Q-LEACH: A new routing protocol for WSNs. Procedia Comput. Sci. 2013, 19, 926–931. [Google Scholar] [CrossRef]
  6. Wang, A.; Yang, D.; Sun, D. A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. Comput. Electr. Eng. 2012, 38, 662–671. [Google Scholar] [CrossRef]
  7. Abdulsalam, H.M.; Ali, B.A. W-LEACH based dynamic adaptive data aggregation algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 9, 1–11. [Google Scholar] [CrossRef]
  8. Sasikala, A.S.D.; Sangameswaran, N. Improving the energy efficiency of LEACH protocol using VCH in wireless sensor network. Int. J. Eng. Dev. Res. 2015, 3, 918–924. [Google Scholar]
  9. Batra, P.K.; Kant, K. LEACH-MAC: A new cluster head selection algorithm for wireless sensor networks. Wirel. Netw. 2016, 22, 49–60. [Google Scholar] [CrossRef]
  10. Liu, Y.; Xu, K.; Luo, Z.; Chen, L. A reliable clustering algorithm based on LEACH protocol in wireless mobile sensor networks. In Proceedings of the International Conference on Mechanical and Electrical Technology, Singapore, 10–12 September 2010; pp. 692–696. [Google Scholar]
  11. Katiyar, V.; Chand, N.; Gautam, G.C.; Kumar, A. Improvement in LEACH protocol for large-scale wireless sensor networks. In Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 23–24 March 2011; pp. 1070–1075. [Google Scholar]
  12. Kim, D.S.; Cha, H.S.; Yoo, S. Improve far-zone LEACH protocol for energy conserving. In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 21–23 September 2012; pp. 1–4. [Google Scholar]
  13. Lee, J.Y.; Jung, K.D.; Moon, S.J.; Jeong, H.Y. Improvement on LEACH protocol of a wide-area wireless sensor network. Multimedia Tools Appl. 2017, 76, 19843–19860. [Google Scholar] [CrossRef]
  14. Marappan, P.; Rodrigues, P. An energy efficient routing protocol for correlated data using CL-LEACH in WSN. Wirel. Netw. 2016, 22, 1415–1423. [Google Scholar] [CrossRef]
  15. Cho, S.; Han, L.; Joo, B.; Han, S. P-LEACH: An efficient cluster-based technique to track mobile sinks in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014, 803656. [Google Scholar] [CrossRef]
  16. Klaoudatou, E.; Konstantinou, E.; Kambourakis, G.; Gritzalis, S. A survey on cluster-based group key agreement protocols for WSNs. IEEE Commun. Surv. Tutor. 2011, 13, 429–442. [Google Scholar] [CrossRef]
  17. MIT uAMPS LEACH ns Extentions. Available online: http://www2.ece.rochester.edu/projects/wcng/code.html (accessed on 1 December 2018).
  18. Khediri, S.E.L.; Nasri, N.; Wei, A.; Kachouri, A. A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput. Sci. 2014, 32, 1180–1185. [Google Scholar] [CrossRef]
  19. Devika, G.; Karegowda, A. A programatic study of LEACH and its decendant routing protocols in WSN. Int. J. Comput. Intell. Inform. 2015, 4, 300–307. [Google Scholar]
  20. Singh, S.K.; Kumar, P.; Singh, J.P. A survey on successors of LEACH protocol. IEEE Access 2017, 5, 4298–4328. [Google Scholar] [CrossRef]
  21. Liu, J.L.; Ravishankar, C.V. LEACH-GA: Genetic algorithm-based energy-efficient adaptive clustering protocol for wireless sensor networks. Int. J. Mach. Learn. Comput. 2011, 1, 79–85. [Google Scholar] [CrossRef]
  22. Kang, S.H.; Nguyen, T. Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 2012, 16, 1396–1399. [Google Scholar] [CrossRef]
  23. Ram, S.S.; Manjunath, D.; Iyer, S.K.; Yogeshwaran, D. On the path coverage properties of random sensor networks. IEEE Trans. Mobile Comput. 2007, 6, 494–506. [Google Scholar] [CrossRef]
  24. Liu, B.; Towsley, D. A study on the coverage of large-scale networks. In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, 25–27 October 2004; pp. 475–483. [Google Scholar]
  25. Zhang, H.; Hou, J. On deriving the upper bound of α-lifetime for large sensor networks. In Proceedings of the 5th ACM International Symposium on Mobile Ad-Doc Networking and Computing, Tokyo, Japan, 24–26 May 2004; pp. 121–132. [Google Scholar]
  26. Lagarias, J.C.; Reeds, J.A.; Wright, M.H.; Wright, P.E. Convergence Properties of the Nelder–Mead Simplex Method in Low Dimensions. SIAM J. Optim. 1998, 9, 112–147. [Google Scholar] [CrossRef]
  27. Gao, F.; Han, L. Implementing the Nelder–Mead simplex algorithm with adaptive parameters. Comput. Optim. Appl. 2012, 51, 259–277. [Google Scholar] [CrossRef]
Figure 1. Sensor field and control-message transmission range.
Figure 1. Sensor field and control-message transmission range.
Symmetry 11 00037 g001
Figure 2. Effective area of control-message.
Figure 2. Effective area of control-message.
Symmetry 11 00037 g002
Figure 3. Contour of energy function E ( k , R ) ( N = 200 , L = 400 m ) and N-M transformation path from initial simples v 1 = ( 5 , 600 m ) to optimized simplex v o p t = ( 6.5 , 525 m ) .
Figure 3. Contour of energy function E ( k , R ) ( N = 200 , L = 400 m ) and N-M transformation path from initial simples v 1 = ( 5 , 600 m ) to optimized simplex v o p t = ( 6.5 , 525 m ) .
Symmetry 11 00037 g003
Figure 4. Number of nodes alive ( N = 200 , L = 400 m).
Figure 4. Number of nodes alive ( N = 200 , L = 400 m).
Symmetry 11 00037 g004
Figure 5. Number of nodes alive ( N = 200 , L = 400 m).
Figure 5. Number of nodes alive ( N = 200 , L = 400 m).
Symmetry 11 00037 g005
Table 1. Symbols and notations.
Table 1. Symbols and notations.
NotationMeaning
Ntotal number of sensor nodes
Lradius of circular-shaped sensor field, (m)
Sdistance of BS from the center of the sensor field, (m)
E T ( l , d ) energy dissipation while transmitting an l-bit message over d meters, (J)
E R ( l ) energy dissipation which receiving an l-bit message, (J)
E e energy consumption in the sensor circuitry per bit, (nJ/bit)
ϵ f energy attenuation factor in free space model, (pJ/bit/m2)
ϵ m energy attenuation factor in multi-path model, (pJ/bit/m4)
E DA energy for data aggregation per bit, (nJ/bit)
δ δ = ϵ f / ϵ m 87.7 (m)
T i , r probability that node i chooses to become a CH in round r
kexpected number of cluster heads in a round
Rtransmission radius of control messages (ADV, Join-REQ, TDMA), (m)
A ( r , R ) effective area of a node at r (m) away from the origin with transmission range R, (m2)
A ¯ ( R ) expectation of the effective area among nodes with transmission range R
P k , R ( n ) the probability that a node has n CHs in its effective area, given k and R
P k , R ( 0 ) the probability that a node has no CHs in its effective area, given k and R
l A length of the advertisement message, (bits)
l J length of the Join request message, (bits)
l T ( k , R ) length of a TDMA message, given k and R, (bits)
l D length of the aggregated DATA message, (bits)
r C H the expectation of the radius of a cluster modeled as a circle, (m)
E T J o i n avg. energy by a non-CH node while sending a Join-REQ message in a round
d C H distance from a member node to its CH
d B S distance from a node to the BS
E T t o C H avg. energy by a member node while sending a DATA message to its CH in a round
E T t o B S avg. energy consumed by a non-CH, non-member node while
sending DATA message to the BS in a round
E R A D V avg. energy by a non-CH node while receiving ADV messages in a round
E R T D M A avg. energy by a non-CH node while receiving TDMA messages in a round
E n o n C H ( k , R ) avg. total energy expended by all non-CH nodes in a round
E R A D V avg. energy by a CH node receiving ADV in a round
E R T D M A avg. energy by a CH node receiving TDMA in a round
E A g g avg. data-aggregation energy in a round
E T C H t o B S avg. energy by a CH node transmitting aggregated data to BS in a round
E R J o i n avg. energy by a CH node receiving Join request messages in a round
E R D A T A avg. energy by a CH node receiving DATA messages from its member nodes in a round
E C H ( k , R ) avg. total energy expended by all CH nodes in a round
E ( k , R ) expected amount of total energy consumption in a round
Table 2. Energy consumption per node in a round.
Table 2. Energy consumption per node in a round.
NLEnergy Consumption (mJ)Saving ( k o p t , R o p t )
Original LEACH [3]LEACH w/Opt.
100200 m10.59.212.4%(5.2, 286 m)
300 m31.924.124.5%(5.2, 428 m)
400 m86.462.827.3%(5.2, 571 m)
200200 m12.210.712.3%(6.4, 263 m)
300 m31.220.334.9%(6.5, 393 m)
400 m84.148.941.9%(6.5, 525 m)
Table 3. Time to percent-node-death.
Table 3. Time to percent-node-death.
SchemeTime to %-Node-Death (Rounds)
1%10%50%90%
LEACH [3]Non-opt.5474108166
With opt.6897174296
LEACH-DT [22]Non-opt.4773146205
With opt.5198286488

Share and Cite

MDPI and ACS Style

Kang, S.H. Energy Optimization in Cluster-Based Routing Protocols for Large-Area Wireless Sensor Networks. Symmetry 2019, 11, 37. https://doi.org/10.3390/sym11010037

AMA Style

Kang SH. Energy Optimization in Cluster-Based Routing Protocols for Large-Area Wireless Sensor Networks. Symmetry. 2019; 11(1):37. https://doi.org/10.3390/sym11010037

Chicago/Turabian Style

Kang, Sang H. 2019. "Energy Optimization in Cluster-Based Routing Protocols for Large-Area Wireless Sensor Networks" Symmetry 11, no. 1: 37. https://doi.org/10.3390/sym11010037

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop