You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

10 September 2021

Majority Decision Aggregation with Binarized Data in Wireless Sensor Networks

Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan 335009, Taiwan
This article belongs to the Special Issue Selected Papers from IIKII 2021 Conferences

Abstract

Wireless sensor networks (WSNs) are the cornerstone of the current Internet of Things era. They have limited resources and features, a smaller packet size than other types of networks, and dynamic multi-hop transmission. WSNs can monitor a particular area of interest and are used in many different applications. For example, during the COVID-19 pandemic, WSNs have been used to measure social distancing/contact tracing among people. However, the major challenge faced by WSN protocols is limited battery energy. Therefore, the whole WSN area is divided into odd clusters using k-means++ clustering to make a majority rule decision to reduce the amount of additional data sent to the base station (or sink) and achieve node energy-saving efficiency. This study proposes an energy-efficient binarized data aggregation (EEBDA) scheme, by which, through a threshold value, the collected sensing data are asserted with binary values. Subsequently, the corresponding cluster head (CH), according to the Hamming weight and the final majority decision, is calculated and sent to the base station (BS). The EEBDA is based on each cluster and divides the entire WSN area into four quadrants. All CHs construct a data-relay transmission link in the same quadrant; the binary value is transferred from the CHs to the sink. The EEBDA adopts a CH rotation scheme to aggregate the data based on the majority results in the cluster. The simulation results demonstrate that the EEBDA can reduce redundant data transmissions, average the energy consumption of nodes in the cluster, and obtain a better network lifetime when compared to the LEACH, LEACH-C, and DEEC algorithms.

1. Introduction

In recent years, wireless sensor networks (WSNs) have emerged as a topic of interest to most scholars because of the increasingly mature and advanced technology of micro-electro-mechanical systems (MEMS) and communication batteries, as well as improved communication technology and related application software [1,2]. The advantage of WSNs is their low implementation cost; there is no fixed infrastructure, and their deployment is arbitrary. Hundreds to thousands of sensor nodes are densely and arbitrarily deployed to sense areas of interest. Therefore, WSNs play an essential role in tracking and surveillance operations, such as habitat monitoring, weather forecasting, high accuracy agriculture, natural disaster prevention, border surveillance, smart cities, and home automation. They operate in an environment that does not require attended assistance with sensing, computation, and communication capabilities. Each sensor node can communicate among nodes and sends the gathered information using a multiple-hop relay. The base station (BS) is generally fixed and arbitrarily deployed far from these sensors. Because the communication distance between the sensor nodes and the BS is considerable, the energy will be exhausted quickly. Thus, the main factor influencing the total energy consumption is data transfer over a distance between nodes. Furthermore, because of nodes’ dense deployment for optimal data resolution, the consequences of sensor node redundancy are data highly correlated, producing unnecessary data transmissions from nodes owing to overlapping sensing areas. The degree of data correlation causes redundant data and the additional energy consumption of the nodes [3,4].
The sensor nodes use the sensed original sensor signals to assert a binary value of one or zero by defining a threshold, thereby transferring binary values to the cluster head (CH) in the same cluster. Subsequently, the CH performs data aggregation and the majority decision through the Hamming weight (HW). Thus, in addition to reducing the redundant transmission of data, the reporting nodes can also save energy and extend the lifetime of the entire network [5]. Therefore, this study includes the following proposals:
  • The calculation method for defining the k value of k-means++ to ensure that the distance between nodes in the cluster is less than the threshold value between transmission and reception in the first-order radio model and provides further energy-saving efficiency and extends the overall network lifetime.
  • The k value is defined as an odd number, which means that there will be an odd cluster and cluster head, and the purpose is to aggregate the binarized data to a BS to achieve a majority decision afterward.
  • Once the nodes are deployed, the sensing nodes must operate for months or years without any additional power supply. Notably, the communication between nodes often consumes more energy than the computation. If the original sensing data are directly transmitted to the sink, it will consume much more energy. WSNs are often used in alarm applications. Moreover, we have assumed that a critical threshold value is the warning level and is asserted/deasserted a binary. Only binary values are transmitted, which conserves energy at the node and extends the network’s lifetime.
  • The BS is fixedly deployed in the center of the sensing area. The sensing area consumes the center of the entire WSN and is used as the origin to further divide it into four quadrants. A data transmission chain is constructed in each quadrant. The chain starts from the CH farthest from the BS, and ends at the CH nearest to the BS. In each round, the CH transmits the majority binary value to the next hop until it reaches the BS by the chain. This is a proven method of reducing CH energy consumption.
The remainder of this paper is organized as follows: Section 2 describes related research examining the energy consumption, energy efficiency, cluster head selection, and cluster formation in a WSN used, and applying the Hamming weight to count the number of non-zero bits to obtain the majority result. Section 3 discusses the working principle of our proposed EEBDA scheme in detail. In Section 4, the performance of the proposed EEBDA against other related protocols is evaluated. Section 5 discusses, evaluates, and compares the results with other protocols. Finally, we conclude the study and discuss future work in Section 6.

3. The Proposed Approach (EEBDA)

In general, each node is designed with a limited battery power to operate in the WSNs, depleting quickly. However, the lifetime of a network relies on the energy available to the nodes. Therefore, the prime task of the WSN routing protocol design is to transfer data to the BS through multi-hops with minimum energy consumption of nodes. Therefore, maximizing the lifetime of a WSN is a primary challenge. This study uses k-means++ clustering to classify nodes according to the distance between nodes and discusses an energy-efficient method, and the shortest distance between node and group center CH selection. In addition, the k value is specially designed to define the appropriate number of clusters (most of which are odd numbers) as the majority decision of each cluster data, and the final result is transmitted to the BS. Furthermore, we considered that the spatial correlation between the nodes prevents redundant transmissions. Our study is categorized into the following phases: cluster formation, CH selection and rotation, the majority result of a binarized aggregation, and the CH chain formation phase. In the following section, we discuss the working principle of our proposed EEBDA scheme in detail, and the overall operation of the proposed method is depicted in Figure 6 (flowchart). Table 1 lists the notations and definitions used in this study.
Figure 6. Flowchart of the proposed EEBDA.
Table 1. Notation and definition.

3.1. Cluster Formation

There are different assumptions about the radio characteristics, including energy dissipation in the transmission and reception nodes. This study adopts a simple model, and the following parameter values reference the first-order radio model [19]. In Equations (3) and (4), the amplifier parameters are used to calculate the distance threshold (d0) of data transmission and reception between two nodes. Where d 0 = ε f s / ε m p 87.7058 , d0 = 87, simplifying the calculations to cut off the decimal points and take the distance threshold as an integer value of 87. At the beginning of the cluster formation, neighboring nodes were grouped into the same clusters using k-means++ clustering. Equation (6) is used to calculate the k value of k-means++, which is used to divide the cluster into k groups, as shown in Figure 7. In addition, the k value is defined as an odd value for the subsequent calculation of the majority decision making. In Equation (6), C is the length and width divided by d0 individually and takes the ceiling value. If C is odd, then k = C; if C is even, then k = C + 1.
C = l e n g t h d 0 × w i d t h d 0   then   k = C + M
where   M = 0 ,       C   i s   o d d   1 ,       C   i s   e v e n
Figure 7. A schematic drawing of the cluster formation.
In Figure 7, “length” denotes the length of the sensing range, and “width” denotes the width of the sensing area. For example, assume that k equals five; it is divided into a schematic diagram of five clusters.

3.2. Cluster Head Selection and Rotation

A CH rotates among the nodes and attempts to equilibrate the energy usage through all nodes. Therefore, the CH selection will affect the lifetime of a WSN because a CH consumes more power than an ordinary (non-CH) node. The monitoring, aggregation, and control of each cluster are performed by the CH, which acts as a leader. The cluster heads have a direct transmission with the BS. In the initial phase, the cluster head selects the node with the maximum residual energy, and more than the energy threshold (Et), and is closest to the group center as the cluster head. Other nodes then join the nearest cluster head, and their probability of being selected as the cluster head increases the next time. The CH rotation aims to show the advantages of being cluster based and selecting a plentiful energy sensor node to be a CH in a cluster; the energy load can be dispersed in the cluster. In this study, a threshold value of the residual energy was considered when selecting the CHs in each subsequent round. The nodes near the cluster head dissipate less energy as the relay data of these nodes is a shorter distance. Likewise, more energy is consumed if the nodes are far away from the CH. If the current CH energy is less than the energy threshold, it triggers the rotation CH procedure, where the energy threshold (Et) is the overall average residual energy of a cluster in which the current CH is located. Equation (7) shows that the node with the highest score in each cluster is selected as the CH. In Algorithm 1, Rmin and Rmax denote the scanning range with a radius of 10 m and 25 m, respectively [35]. Any nodes beyond the Rmax range are already far from the cluster (group) center and are not ideal candidates as CHs. The process of accessing the nearest nodes from the group center and finding a node with the maximum residual energy uses Algorithm 1 at each rotation CH phase.
S c o r e n k x = E r n k x E i n n k x + 1 D n k x 2
where   E r e n k x and E i n n k x   are the residual and initial energies of node x, respectively, and D n k x   is the distance between node x and the center of the group.
Algorithm 1 Cluster head rotation
Input: Rmin, Rmax, Gxy, CHk, n k (x), Et, Er
Output: New_CHk
For each node n k (x) in {1, 2, …, K}
IF CHk.Er <= Et//Check if the residual energy of the current CHk is less than or equal to the energy
 threshold (Et).
   Scan Gxy.radius = Rmin//Scanning all nodes in the 10 m radius of a group center
  IF Find a MAX{   S c o r e n k x }//Find the node with maximum residual energy, ref Equation (7)
   Broadcast New_CHk = n k x selected
   ELSE
   Scan Gxy.radius = Rmax//Scanning all nodes in the 25 m radius of a group center
    IF Find a MAX{   S c o r e n k x }
     Broadcast New_CHk = n k x selected
    ELSE
     IF Random selection of a MAX{   S c o r e n k x }
      Broadcast New_CHk = n k x selected
     END IF
    END IF
   END IF
ELSE
  The CHk to continues as the CH
END IF
END FOR

3.3. The Majority Result of a Binarized Aggregation

All sensor nodes are designed to perform omnidirectional sensing and sense events within a certain radius. Due to low cost and energy constraints, multiple sensor nodes are required to be densely deployed in a domain of interest to perform a common sensing task, which leads to highly correlated data transmission [36,37]. Notably, the communication between nodes consumes more energy than computation [15]. For dense WSNs, multiple nodes detect the same event simultaneously when the number of nodes exceeds the minimum data resolutions required for the sensing area. The correlated data transmissions cause unnecessary collisions and consume additional energy. Therefore, data aggregation for energy efficiency considerations is a critical task in clustered sensing networks [38]. Moreover, a significant amount of energy saving can be taken advantage of by spatial correlation and further binarized data. The cluster head is responsible for collecting data sensed by non-CH nodes and passes this binarized data to a BS. The BS broadcasts a data request message, and all sensor nodes transmit binary sensing data to their CH. The energy consumed to relay one bit of data is equivalent to that consumed when executing several hundred instructions. Therefore, communication must be managed according to the properties of the network to solve the problem of what to do with multi-hop relay data and redundant data transfer by all means.
Furthermore, the idea of this study is a constraint that can be built from multiple constraints by simply using the “AND” and “OR” operators (that is, “1” and “0” bit values). First, the collected sensing data are asserted (asserted/deasserted) with binary values of one or zero at the sensor nodes through a threshold value and then sent to their CH. For example, assume that the threshold value for humidity is 30%. IF node A = “humidity’’ <= 30 THEN node A’s asserted value is 1. This means that the humidity value sensed at the node is too low, the environment is too dry, and crops need watering. CH calculates the Hamming weight of the binary value from all nodes within a cluster; decisions with a majority rule then send majority decision result of a 1-bit or 0-bit value to the BS. In the final phase, the BS also uses the Hamming weight to calculate the binary values from all CHs to obtain the final majority result. Suppose Ck has a number of members nk(1), nk(2),…,nk(x) with binary decisions B n k C k 1 , B n k C k 2 ,…, B n k C k x ,   k 1 , , k as given in Equation (8), where C H k 1 , , k m a j denotes the majority result of each CH in the network. The final majority result of the entire network ( B S m a j ) can be determined by Equation (9). Finally, the pseudo-code of the network’s final majority result algorithm is presented in Algorithm 2. An illustration is shown in Figure 8, where the one-dimensional matrix represents binarized aggregation data and then computes the Hamming weight in each matrix to obtain the majority result.
C H k 1 , , k m a j = 1           i f   { x | B n k C k x = 1 }   x | B n k C k x = 0   0           o t h e r w i s e
B S m a j = 1           i f   { k | C H k 1 , , k m a j k = 1 }   k | C H k 1 , , k m a j k = 0   0           o t h e r w i s e
Figure 8. Concept of using the Hamming weight to data aggregation.
Algorithm 2 Find the majority result of a cluster
Input: C k 1 , , k , CHk, n k (x),   B n k C k x ,
Output: Majority result of a cluster ( C H k 1 , , k m a j )
For each node n k (x) in C k 1 , , k
   C H k 1 , , k = B n k C k x
   //each cluster head (CHk) receives binary values from its own member nodes B n k C k x  
   IF  C H k 1 , , k m a j = 1
   //where C H k 1 , , k m a j can be calculated by using Equation (7).
    Send C H k 1 , , k m a j = 1 to BS//Send cluster final majority result one value to the BS
   ELSE
   Send C H k 1 , , k m a j = 0 to BS
   END IF
    B S m a j = { C H k 1 , , k m a j k } //BS receives binary values from C H k 1 , , k m a j
    IF  B S m a j = 1
    //where B S m a j can be calculated by using Equation (8).
     final majority result of the entire network is true
    ELSE
     final majority result of the entire network is false
    END IF
End For

3.4. CH Chain Formation Phase

For the CH chain formation phase, the center of the entire sensing area is used as the origin to divide into four logical quadrants, and it is assumed that the BS is located in the center of the sensing area. The CHs in the same quadrant construct a data-relay transmission chain, and the CH of the closest BS is fixed at the chain-end for communication with the BS. The CHs transmit the cluster’s majority decision results to the BS, as shown in Figure 9. There are K cluster heads in this study, and each cluster head is assigned a unique random number from 1 to K, where K is the number of clusters and K is the odd number. To avoid CHs closer to the BS, more data must be relayed. The CH is located in the same quadrant, from the farthest CH and nearest CH to the BS as the chain head and chain tail, constructing a data transmission chain. The CH nodes in each chain transmit data to their chain tail node. Consider the third quadrant in Figure 9. For example, there are three cluster heads, CH6, CH7, and CH8, in quadrant 3. The farthest from the BS, CH6 is the beginning of a chain node and ends at the nearest cluster head (CH8), forming a communication chain. Finally, CH8, CH9, CH3, and CH5 forward the aggregated binarized data toward the BS.
Figure 9. CH Data transmission in the chain.

3.5. Overhead Cost Analysis

In the proposed EEBDA method, overhead cost analysis is mainly divided into majority decision part and data aggregation. For data aggregation, after CHs receive a BS data request message (a request message), all nodes send a binary value to CH by threshold asserting/deasserting. The node sends data to CH within one hop. The CHs construct a chain, which also sends data to the BS within three hops. Assuming that there are n nodes in each cluster, each CH receives n binary values. If the network has k clusters, the BS will receive k binary values from the CH. As a result, the total number of messages per round is Mtotal = k × n. The binary value is transmitted to the CH through the sensor nodes in the majority decision part, and the CH stores binarized aggregation data in the one-dimensional matrix to perform Hamming weight operations. Therefore, the time complexity is O(n), and no additional space is consumed; hence, the space complexity is O(1) [12,39].

4. Experimental Analysis

In this section, we evaluate the performance of the proposed EEBDA. First, the proposed mechanism was experimented with and simulated using the MATLAB simulation tool [40]. Second, all experiments were executed on a single machine running Windows 10 with an Intel Core i7-7700 CPU @ 3.60 GHz.

4.1. Experiment Setting

We compared EEBDA with LEACH, LEACH-C, and DEEC algorithms for performance analysis. Therefore, all four protocols are simulated for comparative analysis, where nodes are randomly deployed 100, 200, and 500 nodes in a WSN environment. All nodes possess the same initial energy. The parameter settings used in the simulations are listed in Table 2.
Table 2. Simulation parameters.
We evaluated the energy consumption of WSNs as it is a major limitation. These simulation experiments aimed to evaluate the effectiveness and efficiency of the protocols. Furthermore, several metrics were used to compare them, such as the average residual energy of the network, the number of nodes alive, and the variance of the residual energy. Finally, we performed experiments on three metrics to compare the EEBDA with the other protocols.

4.2. The Energy Consumption Performance

A comparison of the network average residual energy concerning time (in rounds) is shown in Figure 10. In the parameter setting for initial energy, 0.5 J energy is assigned to each node, where the total energy of the network is 50, 100, and 250 J for 100, 200, and 500 nodes, respectively. The simulation parameters of the network are presented in Table 2. The 100, 200, and 500 sensor nodes were randomly deployed in regions of size 100 m2 and 200 m2, respectively.
Figure 10. Average residual energy relative to the number of rounds in EEBDA, LEACH, LEACH-C, and DEEC protocols. (a) 500 nodes in 100 m2 area; (b) 200 nodes in 100 m2 area; (c) 100 nodes in 100 m2 area; (d) 500 nodes in 200 m2 area; (e) 200 nodes in 200 m2 area; (f) 100 nodes in 200 m2 area.
As illustrated in Figure 10, the residual energy of the sensor nodes is compared after multiple simulations run over LEACH, LEACH-C, DEEC, and EEBDA in WSNs. The total residual energy of the network considers the residual energy of all the nodes in each round. This metric is reported in Figure 10, which shows that the proposed scheme (EEBDA) saves more energy than the other protocols. In Figure 10, the maximum number of rounds is 5000; as shown in the figure, the average residual energy in the WSN varies with the number of rounds. For example, when the number of rounds is approximately 2250, the average residual energy of the other three algorithms is approximately zero. We considered the distance between the sender and receiver, the cluster size, and the spatial correlation among sensor nodes. Therefore, the EEBDA scheme has a lower energy consumption than the other algorithms, and the proposed scheme can prolong the lifetime of a WSN. It is clearly shown in the Figure that the energy dissipation of the proposed protocol is less than that of all the other schemes.
To evaluate the proposed EEBDA algorithm more accurately, we compared it again with LEACH, LEACH-C, and DEEC from surviving sensor nodes. In Figure 11, the results show the number of surviving sensor nodes after 5000 rounds; the sensing area is 100 m2 and 200 m2, and the number of network nodes is 100, 200, and 500 for LEACH, LEACH-C, DEEC, and EEBDA.
Figure 11. Number of alive nodes over rounds. (a) 500 nodes in 100 m2 area; (b) 200 nodes in 100 m2 area; (c) 100 nodes in 100 m2 area; (d) 500 nodes in 200 m2 area; (e) 200 nodes in 200 m2 area; (f) 100 nodes in 200 m2 area.
The surviving sensor nodes of the WSN consider the alive nodes in each round. This simulation result is reported in Figure 11, which shows more alive nodes in our proposed method (EEBDA) than in the other protocols. In Figure 11, 100, 200, and 500 nodes deployed randomly are reported to be almost zero at about round 2000 on LEACH, LEACH-C, and DEEC. Thus, in our proposed method, the network lifetime is significantly better than the other algorithms in all cases. As expected, our scheme determines the network configuration that consumes the lowest energy in every round. Therefore, the surviving nodes of the network are higher than those obtained with LEACH, LEACH-C, and DEEC. From the Figure, we can conclude that EEBDA realizes the lowest energy consumption and prolongs the lifetime of the network.

4.3. The Variance of the Residual Energy

The unbalanced energy consumption affects the network lifetime and leads to an unbalanced energy consumption in nodes. In addition, the premature death of some nodes reduces the overall performance of the WSN. In addition, it results in significant differences in the death time of the nodes in the WSN, which adversely affects the stability of the network and the efficiency of the transmission of information. Figure 12 mainly reflects the energy consumption balance in the remaining surviving sensor nodes in the network with high network operation times. In this work, we have made an experimental simulation variance of the residual energy to demonstrate this problem to compare the difference in the number of nodes and sensing area among the algorithms. As shown in Figure 12, the variance of the residual energy of each node is smaller than that of the other three algorithms when using EEBDA. This means that the energy consumption of each node is more balanced, and it is more conducive to improving the overall practical lifetime of the WSN.
Figure 12. Comparison of the variance of the residual energy. (a) 500 nodes in 100 m2 area; (b) 200 nodes in 100 m2 area; (c) 100 nodes in 100 m2 area; (d) 500 nodes in 200 m2 area; (e) 200 nodes in 200 m2 area; (f) 100 nodes in 200 m2 area.

5. Discussion

The EEBDA outperformed the LEACH, LEACH-C, and DEEC protocols in the lifetime of the network, energy consumption, and energy balance. The reasons are summarized as follows.
LEACH, LEACH-C, and DEEC protocols define different threshold values of the CH selection. In LEACH and DEEC, the CH’s selection is random. These results cause an imbalanced distribution of CH in each round, which causes an imbalance in energy consumption among nodes and the premature death of some nodes. In DEEC, some adjustments are made for CH selection such that high-energy nodes have a higher probability of becoming CH than low-energy nodes. However, the main weakness of DEEC is the overhead involved in handling the average energy of the entire network. This results in faster death of high-energy nodes, which prolongs the instability period of the network and imbalanced energy consumption among nodes. In the probability of electing CHs, the LEACH-C protocol that selects CHs considers the average energy of the nodes. In other words, when the residual energy of a node is higher than the average energy of the network, the average probability of that node being elected as CH is higher than that of a node whose residual energy is less than the average energy of the network. Therefore, compared to LEACH, the difference in energy consumption between advanced and ordinary nodes decreases, and the network lifetime is more prolonged than LEACH. In the CH selection model, LEACH-C applies the residual energy and the average energy of the network to the defined threshold compared to DEEC. When the residual energy is higher than the average energy of the network, the node has a higher probability of being elected as CH; however, it remains slightly random. Therefore, the lifetime of the network is improved relative to the DEEC protocol; however, there is no more significant improvement in the residual energy variance than LEACH and LEACH-C.
Conversely, our algorithm uses the Hamming weight to calculate the majority results by the sensing data asserted/deasserted with binary values of one or zero through a threshold value. The data-relay chain of CH considers the distance from the CH to the BS and overcomes the transmission of redundant data. Our algorithm considers that the search range of CH selection is located as near as possible from the group center, reduces the energy consumption in unnecessary transmission, saves network energy consumption, and prolongs the lifetime. Therefore, EEBDA is superior to LEACH, LEACH-C, and DEEC protocols concerning energy consumption and lifetime. The proposed EEBDA mechanism, with binarized data aggregation afterward, achieved a majority decision that utilizes spatial and symmetry data correlation in the sensor data that can be used to reduce the energy consumption of sensor nodes for persistent data collection and maximize the lifetime of the network.

6. Conclusions and Future Works

According to the aforementioned simulated results, the evidence of spatial correlation chain-clustering in the EEBDA binarized data aggregation mechanism is superior to LEACH, LEACH-C, and DEEC protocols in terms of the residual energy of sensor nodes and the network lifetime. To further improve the performance of WSNs, this study proposes a novel WSN clustering routing protocol. First, the binarized data aggregation technique is introduced based on a simple energy consumption model. Subsequently, the k-means++ clustering algorithm determines the K value as an odd value to set the number of clusters to judge the majority decision. The CHs first construct a data-relay chain with CHs in the same quadrant, construct a data-relay chain with neighboring CHs, and send their clusters’ final majority results to the BS. The CHs check their residual energy at the end of each round, which decides whether or not to rotate the CH to balance the energy consumption within the cluster. In cluster-based WSNs, there is a mode of asymmetric data transmission from sensor nodes to the CH, allowing sensor nodes to report sensed data in turn, maximizing the network lifetime. However, our protocol has some shortcomings.
First, even if the node energy is sufficient, faulty nodes or transmission failures may occur because of the uncertainty of the natural environmental factors in the data transmission process. Therefore, in future works, we can consider adding a fault-tolerant mechanism to allow a few faulty nodes, in tandem with mostly healthy nodes, to execute data transmission tasks and keep network operation. Second, the protocol applies only to two-dimensional or land scenarios. We did not consider three-dimensional or underwater scenarios; typically, sensor nodes may be deployed in three dimensions, and robust communication protocols should be considered to avoid interference. Therefore, in the future, we will consider proposing a clustering routing protocol based on this protocol that is suitable for three-dimensional scenarios with energy efficiency.

Funding

This work was supported by the Information, Communications and Electronic Force Command under the contract number 1100034926.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef] [Green Version]
  2. Nakas, C.; Kandris, D.; Visvardis, G. Energy efficient routing in wireless sensor networks: A comprehensive survey. Algorithms 2020, 13, 72. [Google Scholar] [CrossRef] [Green Version]
  3. Kim, J.; Lee, D.; Hwang, J.; Hong, S.; Shin, D.; Shin, D. Wireless Sensor Network (WSN) configuration method to increase node energy efficiency through clustering and location information. Symmetry 2021, 13, 390. [Google Scholar] [CrossRef]
  4. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L.H. A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
  5. Chang, J.; Liu, F. A byzantine sensing network based on majority-consensus data aggregation mechanism. Sensors 2021, 21, 248. [Google Scholar] [CrossRef]
  6. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  7. Mohamed, R.E.; Saleh, A.I.; Abdelrazzak, M.; Samra, A.S. Survey on wireless sensor network applications and energy efficient routing protocols. Wirel. Pers. Commun. 2018, 101, 1019–1055. [Google Scholar] [CrossRef]
  8. Gherbi, C.; Aliouat, Z.; Benmohammed, M. An adaptive clustering approach to dynamic load balancing and energy efficiency in wireless sensor networks. Energy 2016, 114, 647–662. [Google Scholar] [CrossRef]
  9. El Alami, H.; Najid, A. ECH: An enhanced clustering hierarchy approach to maximize lifetime of wireless sensor networks. IEEE Access 2019, 7, 107142–107153. [Google Scholar] [CrossRef]
  10. Parhami, B. Voting algorithms. IEEE Trans. Reliab. 1994, 43, 617–629. [Google Scholar] [CrossRef] [Green Version]
  11. Javadi, S.H.; Peiravi, A. Fusion of weighted decisions in wireless sensor networks. IET Wirel. Sens. Syst. 2015, 5, 97–105. [Google Scholar] [CrossRef]
  12. Biswas, P.; Samanta, T. True event-driven and fault-tolerant routing in wireless sensor network. Wirel. Pers. Commun. 2020, 112, 439–461. [Google Scholar] [CrossRef]
  13. Reed, I.S. A Class of Multiple-Error-Correcting Codes and the Decoding Scheme; Massachusetts Inst of Tech Lexington Lincoln Lab: Lexington, MA, USA, 1953. [Google Scholar]
  14. Cusick, T.W. Simpler proof for nonlinearity of majority function. Discret. Appl. Math. 2021, 297, 55–59. [Google Scholar] [CrossRef]
  15. Benini, L.; DeMicheli, G. Dynamic Power Management: Design Techniques and CAD Tools; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  16. Yin, Y.; Liu, F.; Zhou, X.; Li, Q. An efficient data compression model based on spatial clustering and principal component analysis in wireless sensor networks. Sensors 2015, 15, 19443–19465. [Google Scholar] [CrossRef] [Green Version]
  17. Villas, L.A.; Boukerche, A.; De Oliveira, H.A.; De Araujo, R.B.; Loureiro, A.A. A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks. Ad Hoc Netw. 2014, 12, 69–85. [Google Scholar] [CrossRef]
  18. Tayeh, G.B.; Makhoul, A.; Perera, C.; Demerjian, J. A spatial-temporal correlation approach for data reduction in cluster-based sensor networks. IEEE Access 2019, 7, 50669–50680. [Google Scholar] [CrossRef]
  19. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000; p. 10. [Google Scholar]
  20. Jagannath, J.; Polosky, N.; Jagannath, A.; Restuccia, F.; Melodia, T. Machine learning for wireless communications in the Internet of Things: A comprehensive survey. Ad Hoc Netw. 2019, 93, 101913. [Google Scholar] [CrossRef] [Green Version]
  21. Jan, B.; Farman, H.; Javed, H.; Montrucchio, B.; Khan, M.; Ali, S. Energy efficient hierarchical clustering approaches in wireless sensor networks: A survey. Wirel. Commun. Mob. Comput. 2017, 2017, 1–14. [Google Scholar] [CrossRef] [Green Version]
  22. Fanian, F.; Rafsanjani, M.K. Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. J. Netw. Comput. Appl. 2019, 142, 111–142. [Google Scholar] [CrossRef]
  23. Wang, Q.; Lin, D.; Yang, P.; Zhang, Z. An energy-efficient compressive sensing-based clustering routing protocol for WSNs. IEEE Sens. J. 2019, 19, 3950–3960. [Google Scholar] [CrossRef] [Green Version]
  24. Shahraki, A.; Taherkordi, A.; Haugen, Ø.; Eliassen, F. Clustering objectives in wireless sensor networks: A survey and research direction analysis. Comput. Netw. 2020, 180, 107376. [Google Scholar] [CrossRef]
  25. Rostami, A.S.; Badkoobe, M.; Mohanna, F.; Hosseinabadi, A.A.R.; Sangaiah, A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2018, 74, 277–323. [Google Scholar] [CrossRef]
  26. MacQueen, J. Some methods for classification and analysis of multivariate observations. In Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability; Cam, L.M., Le Neyman, J., Eds.; University of California Press: Berkeley, CA, USA, 1967; Volume 1, pp. 281–297. [Google Scholar]
  27. Vassilvitskii, S.; Arthur, D. k-means++: The advantages of careful seeding. In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms; Bansal, N., Pruhs, K.R., Stein, C., Eds.; Association for Computing Machinery, Inc: New York, NY, USA, 2006; pp. 1027–1035. [Google Scholar]
  28. Alghamdi, T.A. Energy efficient protocol in wireless sensor network: Optimized cluster head selection model. Telecommun Syst. 2020, 74, 331–345. [Google Scholar] [CrossRef]
  29. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  30. Awaad, M.H.; Jebbar, W.A. Extending the WSN lifetime by dividing the network area into a specific zones. Int. J. Comput. Netw. Inf. Secur. 2015, 2, 33–39. [Google Scholar] [CrossRef] [Green Version]
  31. Marhoon, A.F.; Awaad, M.H. Reduce energy consumption by improving the LEACH protocol. Int. J. Comput. Sci. Mob. Computing. 2014, 3, 1–9. [Google Scholar]
  32. Qing, L.; Zhu, Q.; Wang, M. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks. Comput. Commun. 2006, 29, 2230–2237. [Google Scholar] [CrossRef]
  33. Loganathan, S.; Arumugam, J. Clustering algorithms for wireless sensor networks survey. Sens. Lett. 2020, 18, 143–149. [Google Scholar] [CrossRef]
  34. Kang, S.H.; Nguyen, T. Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 2012, 16, 1396–1399. [Google Scholar] [CrossRef]
  35. Alam, K.M.; Kamruzzaman, J.; Karmakar, G.; Murshed, M. Dynamic adjustment of sensing range for event coverage in wireless sensor networks. J. Netw. Comput. Appl. 2014, 46, 139–153. [Google Scholar] [CrossRef]
  36. Tripathy, A.K.; Chinara, S. Comparison of residual energy-based clustering algorithms for wireless sensor network. ISRN Sens. Netw. 2012, 2012, 1–10. [Google Scholar] [CrossRef] [Green Version]
  37. Khedo, K.; Doomun, R.; Aucharuz, S. Reada: Redundancy elimination for accurate data aggregation in wireless sensor networks. Wirel. Sens. Netw. 2010, 2, 300. [Google Scholar] [CrossRef] [Green Version]
  38. Randhawa, S.; Jain, S. Data aggregation in wireless sensor networks: Previous research, current status and future directions. Wirel. Pers. Commun. 2017, 97, 3355–3425. [Google Scholar] [CrossRef]
  39. Count the Number of Set Bits (1s) in an Integer. Available online: https://thecodingbot.com/count-the-number-of-set-bits-1s-in-an-integer/ (accessed on 20 August 2021).
  40. The MathWorks, Inc. Home Page. Available online: https://www.mathworks.com/ (accessed on 21 August 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.