Next Article in Journal
Advanced Technologies for Renewable Energy Systems and Their Applications
Previous Article in Journal
Electroless Pd Nanolayers for Low-Temperature Hybrid Cu Bonding Application: Comparative Analysis with Electroplated Pd Nanolayers
Previous Article in Special Issue
Optimization of Delay Time in ZigBee Sensor Networks for Smart Home Systems Using a Smart-Adaptive Communication Distribution Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Centrality-Based Topology Control in Routing Protocols for Wireless Sensor Networks with Community Structure

by
Juan Diego Belesaca
1,*,
Andres Vazquez-Rodas
1,*,
Cristihan Ruben Criollo
1 and
Luis J. de la Cruz Llopis
2
1
Department of Electrical Engineering, Electronic, and Telecommunications, University of Cuenca, Cuenca 010101, Ecuador
2
Department of Network Engineering, Universitat Politècnica de Catalunya UPC, 08034 Barcelona, Spain
*
Authors to whom correspondence should be addressed.
Electronics 2025, 14(19), 3812; https://doi.org/10.3390/electronics14193812
Submission received: 15 July 2025 / Revised: 12 August 2025 / Accepted: 15 August 2025 / Published: 26 September 2025
(This article belongs to the Special Issue Energy-Efficient Wireless Sensor Networks for IoT Applications)

Abstract

Wireless sensor networks (WSNs) are key enablers of efficient communication in the Internet of Things (IoT) ecosystem. These networks comprise numerous sensor nodes that collaboratively collect and transmit data, requiring adaptive and energy-efficient management. However, high node density and resource limitations introduce challenges such as control overhead, packet collisions, interference, and energy inefficiency. To mitigate these issues, this paper adopts the Hybrid Wireless Mesh Protocol (HWMP), standardized under IEEE 802.11s for wireless mesh networks (WMNs), as the routing protocol in WSNs. HWMP’s hybrid design combining reactive and proactive routing is well-suited for dynamic and mobile environments, making it applicable to WSNs operating under similar conditions. Building on this foundation, we propose a community-aware topology control mechanism that constructs a Connected Dominating Set (CDS) to serve as the network’s energy-efficient backbone. Node selection is guided by centrality metrics and detected community structures to enhance routing efficiency and network longevity. The mechanism is evaluated across six mobility scenarios characterized by realistic movement patterns. Comparative results show that incorporating community structure significantly improves routing performance and reduces energy consumption, validating the approach’s effectiveness in real-world WSN deployments.

1. Introduction

Wireless sensor networks (WSNs) have become essential in today’s digital landscape, driven by the rapid expansion of the Internet of Things (IoT). By 2024, the global IoT ecosystem comprised more than 15 billion interconnected devices, with projections indicating this number will double by 2030 [1]. Notably, Greater China alone accounts for approximately 5 billion IoT devices, emphasizing the widespread adoption of this technology. Furthermore, about two-thirds of these devices actively utilize IoT capabilities, showcasing its deep integration into daily life. Among the numerous applications, remote asset monitoring is one of the most prevalent, solidifying WSNs as a critical enabler in the IoT paradigm.
Efficient management of WSNs is crucial for their optimal performance. Modern networks must exhibit self-organization and autonomous maintenance [2,3]. The most common scenario involves networks formed mainly by mobile sensor nodes deployed in diverse environments. With technological advancements, WSNs are evolving into comprehensive sensing systems within the IoT framework, facilitating various applications such as environmental monitoring, healthcare, and smart cities [4,5]. As a result, mobile sensor nodes are becoming a significant research focus, aiming to leverage real-time information for enhanced personal and environmental benefits.
Despite the substantial progress that has been made, a critical gap persists in existing approaches. The majority of solutions target connectivity or energy efficiency in isolation, seldom exploiting the interplay between mobility patterns (e.g., human mobility) and community structures to inform topology control [6]. In a similar vein, the Hybrid Wireless Mesh Protocol (HWMP) from IEEE 802.11s has exhibited robust mesh-based routing in wireless mesh networks (WMNs) [7]. However, its implementation within resource-constrained WSN contexts remains under-explored [8,9]. A unified approach that leverages both realistic mobility behavior and community structure has the potential to reduce redundant transmissions, balance energy use, and maintain reliable end-to-end communication in IoT deployments.
In response, this work proposes a community-aware topology control mechanism that integrates centrality metrics and community detection to form an energy-efficient Connected Dominating Set (CDS) backbone. Specifically, a methodology was developed to select the most central nodes within each detected community based on betweenness centrality, as well as to identify nodes that optimally bridge distinct communities using bridging centrality. These selected nodes function as routers, thereby establishing a robust backbone network. The HWMP is adapted for mesh-like operation within WSNs, and mobility models that reflect human movement are employed. Community detection further refines backbone formation by identifying clusters with strong internal cohesion, ensuring that high-centrality nodes anchor communication paths. The objective of this study is to assess the efficacy of a proposed system across a series of six mobility scenarios. The primary goals of this assessment are threefold: first, to achieve superior routing efficiency; second, to attain more balanced energy consumption; and third, to extend the network lifetime when compared to both unstructured networks and noncommunity-aware controls.
The remainder of this paper is structured as follows. Section 2 presents a theoretical framework to understand the study better. Section 3 reviews related works. The design and evaluation of the proposed topology control mechanism are detailed in Section 4. Section 5 presents results and discusses. Finally, Section 6 outlines the conclusions and future research directions.

2. Theoretical Background

This section presents the foundational elements that support our proposed topology control mechanism. Although the study focuses on a wireless sensor network (WSN) scenario, we adopt the Hybrid Wireless Mesh Protocol (HWMP) initially defined in the IEEE 802.11s standard for wireless mesh networks (WMNs) as the routing protocol [9]. HWMP’s hybrid nature, combining proactive and reactive strategies, makes it highly adaptable to dynamic, mobile, and decentralized WSN environments [10]. By incorporating this protocol, we enable mesh-like routing behavior within WSNs, aligning with our goal of achieving scalable and energy-efficient topologies.
To build a robust theoretical foundation, we next examine the key components of the system: WSN characteristics and the rationale for using HWMP, followed by topology control strategies, human mobility models, community detection methods, and centrality metrics. These concepts provide the necessary background to understand the design and evaluation of our community-aware topology control mechanism.

2.1. Wireless Sensor Networks

Wireless sensor networks (WSNs) comprise spatially distributed sensor nodes that monitor and record environmental conditions such as temperature, sound, and pressure, transmitting the collected data to a central location for analysis and processing. Each sensor node typically consists of a microcontroller, a radio transceiver with an internal or external antenna, an electronic circuit for interfacing with the sensors, and an energy source, usually a battery [11,12]. These nodes collaborate to form a network capable of self-organization and self-healing, making WSNs suitable for environmental monitoring, industrial process control, and healthcare applications [13,14,15].
Maintaining reliable communication becomes challenging when sensor nodes are mobile or deployed over extensive areas. To address this, integrating concepts from wireless mesh networks (WMNs) into WSNs has proven effective [16]. WMNs are low-cost, self-configurable multi-hop networks designed to provide ubiquitous wireless connectivity through mesh routers (MRs) or router nodes [17]. These MRs are typically powerful devices with multiple radio interfaces that create a robust backbone, facilitating connectivity among nodes [18].
By incorporating router nodes into WSNs, the network benefits from enhanced scalability, extended coverage, and improved fault tolerance. This router nodes can handle high traffic loads and manage dynamic topologies, addressing common challenges in WSNs, such as limited energy resources and communication range. This integration enables the development of more resilient and efficient sensor networks that are capable of supporting various applications in complex environments [16,19].

2.2. Hybrid Wireless Mesh Protocol

The Hybrid Wireless Mesh Protocol (HWMP), initially specified in the IEEE 802.11s standard, is pivotal in enabling dynamic and energy-efficient routing in wireless mesh-based architectures [20]. While HWMP was initially designed for wireless mesh networks (WMNs), its flexible hybrid routing strategy combining both reactive and proactive mechanisms makes it highly applicable to wireless sensor networks (WSNs), particularly in Internet of Things (IoT) scenarios where mobility and topology changes are frequent.
HWMP’s hybrid approach supports efficient data dissemination under varying network conditions. In its reactive mode, route discovery is initiated only when a source station (STA) needs to transmit data to an unknown destination. This is achieved by broadcasting a Path Request (PREQ) message, which allows intermediate nodes to establish or update paths to the target node [8,21]. This on-demand mechanism is particularly beneficial for energy-constrained WSNs with low node density and dynamic traffic patterns, as it minimizes unnecessary control overhead.
On the other hand, the proactive mode of HWMP configures one or more nodes as root stations that periodically broadcast PREQ messages to maintain updated routing information. Nodes receiving these messages calculate optimal paths to the root, considering metrics such as link quality and hop count [21]. This mode is advantageous in more stable topologies and supports hierarchical communication flows, which can contribute to reducing energy consumption through structured routing.
Moreover, HWMP introduces a hierarchical network organization by categorizing nodes into specific roles, such as mesh routers, bridge routers, and end stations [22]. This role-based structure enhances scalability and energy efficiency by delegating communication tasks according to each node’s capabilities and positions within the network.
By integrating HWMP within WSNs, this work leverages mesh-like communication patterns to build scalable, robust, and energy-aware routing topologies, aligning with the broader goals of efficient IoT connectivity and long-term network sustainability [16].

2.3. Topology Control

Topology control is a foundational technique in the domain of wireless networks. It facilitates the modification of network parameters, thereby enabling the creation and maintenance of a particular network topology, thus achieving predetermined network properties [23]. Its significance is particularly pronounced in the domains of ad hoc networks and wireless sensor networks (WSNs), where it plays a pivotal role. The fundamental objective of topology control is to reduce energy consumption while mitigating radio interference. Consequently, it serves to minimize packet collisions [24].
One of the primary concerns within client WMNs is the establishment of an appropriate network topology that serves as the foundation for the implementation of higher-level routing protocols [25]. Given the inherent dynamism of these networks, where topologies are in continuous change, routing schemes must demonstrate robustness in the face of these alterations.
A predominant approach to topology control mechanisms revolves around the adjustment of node transmission power [24,26,27]. In such systems, the employment of high transmission power levels can lead to complications related to interference, while low power levels result in network fragmentation. Alternatively, certain mechanisms are contingent upon the power mode of individual nodes, encompassing transmission, reception, idle, and sleep states. Furthermore, certain mechanisms adopt a clustering approach, often relying on the strategic selection of a Connected Dominating Set (CDS), as exemplified in the works of Qi et al. [28] and Farooq et al. [29].
The challenge inherent in finding a Dominant Set (DS) hinges on identifying a subset D of nodes in the network graph, such that each node belongs to D or is adjacent to it [30]. The formation of a connected graph by the nodes within this DS results in the transition of the DS to the form of a CDS. The nodes that comprise the CDS constitute the network’s backbone. The quality of the resultant reduced topology can be assessed on various criteria, including connectivity, energy efficiency, throughput, and resilience to mobility dynamics [31].

2.4. Human Mobility Models

In the domain of wireless sensor network (WSN) and wireless mesh network (WMN) simulations with mobility devices, the employment of representative scenarios that closely resemble real-world conditions is of critical importance. The attainment of this degree of realism frequently necessitates the incorporation of mobility traces into the networks under examination [32]. However, acquiring authentic mobility traces for particular scenarios poses a considerable challenge, necessitating significant time and resources, and the deployment of numerous devices. Consequently, a pragmatic approach entails the utilization of synthetic traces generated by mobility models. These models encapsulate human behavior patterns through mathematical formulations, thereby offering a means to approximate the movements of network nodes. Leveraging mobility models enables the production of network performance evaluations that closely mirror real-world outcomes.
In this context, the Random Waypoint Mobility (RWM) [33] model is one of the most frequently utilized mobility models. In this study, we have considered the most relevant models in light of contemporary human behavior. Table 1 summarizes the main characteristics of the discussed models relevant to simulations in WSNs and WMNs. This comparison emphasizes the complexity, realism, and application contexts of each model, which supports selecting appropriate models for specific simulation requirements.

2.4.1. Lévy Walk Model

In the study of mobility models, the Lévy walk model is a notable paradigm. This model encapsulates aspects of human behavior by integrating statistical characteristics associated with Lévy walk movements, a form of random motion primarily governed by diffusion processes [40]. Initially devised to elucidate the behaviors of certain animal species [41,42], the Lévy walk model transformed when Rhee et al. introduced the concept of a truncated Lévy walk (TLW) model [34]. The TLW model attempts to replicate human decision-making processes when navigating toward intended destinations, lending a degree of intentionality to the otherwise stochastic nature of Lévy walks.
The TLW model has notably served as the basis for subsequent mobility models, including SWIM, SLAW, and SMOOTH. These models have contributed to a more nuanced understanding of network node mobility patterns within the context of WSNs.

2.4.2. Small World In Motion (SWIM)

Small World In Motion (SWIM) is an efficient, parameter-sparse mobility model designed to emulate human mobility patterns. Unlike other models, which require many input parameters, SWIM captures human behavior by simulating tendencies, such as frequenting nearby places or popular social spots, over time.
SWIM divides the simulation area into cells equivalent in size to the node’s transmission radius. Nodes have individual weights based on cell popularity and distance from their randomly assigned home location. SWIM also uses a cell distance weight parameter ( α ), which governs node behavior; higher values promote proximity to home and neighbors, while lower values encourage exploration of popular locations. SWIM offers a streamlined approach to modeling complex social mobility patterns in wireless networks [35].

2.4.3. Self-Similar Least-Action Human Walk (SLAW)

Self-Similar Least-Action Human Walk (SLAW) is a comprehensive mobility model designed to simulate complex human behaviors. While it involves more input parameters than SWIM, SLAW leverages contemporary statistical patterns derived from human mobility studies, including truncated power-law distributions, pause times, inter-contact times, fractal waypoints, and individually defined mobility zones [36,43,44].
SLAW is designed to represent diverse social scenarios, such as university campuses, shopping centers, restaurants, and theme parks. It can generate mobility traces for regular trips, which are common for individuals with set routines, as well as sporadic trips, which are ideal for modeling those who visit random locations. This flexibility distinguishes SLAW from models such as RWM or TLW.

2.4.4. SMOOTH Mobility Model

SMOOTH emerges as a pragmatic and realistic mobility model, offering a simplified alternative to SLAW while retaining essential human behavioral characteristics [37]. Like SLAW, SMOOTH incorporates critical mobility and human behavior attributes.
Although the Hurst parameter is simpler than that of SLAW, it still yields commendable performance. In SMOOTH, the movement of nodes is intricately linked to social behavioral patterns and community dynamics. For example, certain offices in a building, such as a conference room, may receive more frequent visits than others. Consequently, SMOOTH generates clusters of varying sizes and randomly distributes them. The number of clusters is an input parameter, and each group is assigned a different popularity value. Popularity dictates the frequency of visits to each group, thus influencing the likelihood that a group will be selected as a destination. This approach effectively captures the dynamics of human behavior within various settings [45].

2.4.5. Disaster Area Model

In an intriguing approach outlined in [38], a unique mobility model is introduced to simulate disaster scenarios. The primary objective is to create scenarios in which to test and assess the optimal and efficient performance of communication systems under challenging circumstances. Due to the critical importance of reliable communication systems in disaster scenarios, this model paves the way for evaluating topology control techniques in such environments. Consequently, it has garnered our attention and is under consideration for integration into this research effort.
The disaster area model is based on the concept of room separation, where care rooms and the locations of rescue personnel are strategically distributed throughout the simulation area. Key areas incorporated into the model include the incident location (IL), the emergency patient waiting area (PWT), the casualties clearing station (CCS), the transport zone (comprising the ambulance and helicopter areas), and the technical operation command (TOC) [38].

2.4.6. Map-Based Mobility Model

Most mobility models, including SWIM, SLAW, and SMOOTH, operate without considering geographic boundaries. These models are scale-free by nature and show no variation in response to geographical constraints. However, the work presented by [39] is a notable departure from this convention. It incorporates geographical restrictions into the SLAW mobility model, producing the Map-Based Self-Similar Least-Action Human Walk (MSLAW) model. This enhancement introduces a novel dimension to performance results in mobile network simulations.
Furthermore, integrating geographic boundaries enables interaction with propagation models, leveraging the distribution of buildings and environmental obstructions to improve the model’s accuracy in representing real-world scenarios.

2.5. Community Detection

In graph theory, it is important to understand the difference between network partitioning and community detection. Network partitioning involves dividing a network into groups of roughly equal size. The number of groups and their sizes are predetermined. However, communities in reality exhibit varying sizes. Community detection, on the other hand, seeks to uncover these network properties and accommodate the inherent heterogeneity found in actual communities.
Several metrics are used to evaluate the quality of a community structure, with modularity being the most widely embraced. Defined by Newman and Girvan [46], modularity quantifies the discrepancy between edge density within a community and the expected density if the edges were distributed randomly in the network. For weighted networks, modularity Q is calculated using Equation (1).
Q = 1 2 m i , j A i j k i k j 2 m δ ( c i , c j )
where A is the adjacency matrix, A i j represents the edge weight between nodes i and j, k i denotes the sum of edge weights connected to node i, c i signifies the assigned community for node i, δ ( c i , c j ) equals 1 if c i = c j and 0 otherwise, and m is half the sum of all edge weights in the graph.
Essentially, community detection involves grouping nodes based on strong internal connections and weaker external connections. Many algorithms have been proposed for this task, but optimal community detection algorithms are NP-hard, particularly those focused on maximizing modularity. Therefore, approximation algorithms are often preferred. Many existing algorithms focus on binary networks, where edges have a weight value of one if they exist and zero if they do not, as in certain environments, such as biological networks. However, real-world networks are typically weighted, requiring community detection algorithms that account for these weight values [47].

2.6. Centrality Metrics

In the field of social network analysis, graph-theoretic metrics are widely used to identify the most critical nodes in a network. Centrality measures are particularly valuable because they are designed to identify the most influential actors. The following components are considered the most relevant for this study.

2.6.1. Betweenness Centrality

Betweenness centrality is assumed to play a central role in this study. It is defined as the fraction of all shortest paths between pairs of nodes that pass through a given node. In essence, this metric quantifies the extent to which a node can control the flow of information between other nodes within the network. The betweenness centrality C B of a node v is shown in Equation (2).
C B ( v ) = j = 1 N k = 1 j 1 g j k ( v ) g j k
where g j k is the number of shortest paths between j and k, g j k ( v ) is the number of shortest paths between j and k that pass through v, and N is the total number of nodes in the network [48].
Regarding communities, in Ref. [47] two centrality metrics derived from the betweenness centrality are defined: intra-centrality and inter-centrality.

2.6.2. Intra-Centrality

Intra-centrality ( intra C B ) measures the influence of a node within its community. It is calculated by determining its betweenness centrality while considering only nodes that belong to the communication, as shown in Equation (3).
intra C B ( v ) = j = 1 N ( C v ) k = 1 j 1 g j k ( v ) g j k , i , j C v
where C v is the community to which v belongs and N ( C v ) is the total number of nodes that belong to C v , g j k is the number of shortest paths between j and k, g j k ( v ) is the number of shortest paths between j and k that pass through v, and N is the total number of nodes in the network [47]. If a node belongs to more than one community, then it has an intra C B value for each community to which it belongs. This occurs in the case of overlapping communities.

2.6.3. Inter-Centrality

The inter-centrality ( inter C B ) of a node v for two communities C m and C n is defined as the betweenness centrality of v considering only the nodes that belong to either community (see Equation (4)). If a node belongs to more than one community, then it has an intra-community betweenness centrality value for each community to which it belongs (in the case of overlapping communities). In general, inter-centrality measures the capability of a node to communicate with these two communities. Each node has an inter C B value for each pair of communities in the network.
inter C B ( v ) = j = 1 N ( C m C n ) k = 1 j 1 g j k ( v ) g j k , i , j C m C n
where g j k is the number of shortest paths between j and k, g j k ( v ) is the number of shortest paths between j and k that pass through v, and N is the total number of nodes in the network [47].
Intra-centrality is a useful method for identifying the most influential nodes within a single area. However, inter-centrality does not appear to be a viable method for detecting nodes that bridge two or more densely populated regions. This is because advance knowledge of all the communities in the network is required, and each node would generate an inter C B ( v ) value for each pair of communities, implying high memory usage.

2.6.4. Bridging Centrality

Bridging centrality is a derivative of betweenness centrality. It identifies nodes that facilitate substantial information flow between densely connected regions, which are often characterized by high modularity [49]. Bridging centrality ( C B r i d ) combines betweenness centrality ( C B ) and the bridging coefficient ( B C ) of a node, as shown in Equation (5). B C is defined in Equation (6).
C B r i d ( v ) = B C ( v ) × C B ( v )
B C ( v ) = d ( v ) 1 i N ( v ) 1 d ( i )
where d ( v ) is the degree of node v and N ( v ) is the set of neighbor nodes of v. According to Ref. [49], the nodes that are actually considered bridging nodes are those within the 25% highest C B r i d values in the network.

2.6.5. Centrality Computation in Dynamic and Distributed Networks

The precise calculation of centrality metrics necessitates comprehensive topological understanding and entails polynomial computational complexity, rendering such methodologies impractical for low-power sensor nodes. In dynamic and distributed WSNs, these constraints necessitate lightweight and scalable alternatives. A number of strategies have been formulated to approximate centrality in the absence of complete network information or substantial computational resources.
A representative example of such approximations is the ego-betweenness centrality, which restricts the computation of shortest-path-based centrality to the local ego-network of each node [50]. Specifically, the ego-temporal betweenness metric quantifies how often a node facilitates communication between its neighbors over the shortest temporal paths. Formally, for a node i, the ego-betweenness centrality is calculated using the adjacency matrix A of its one-hop neighborhood. The elements of this matrix are given by:
A i j = 1 , if there is a peer link between nodes i and j 0 , otherwise
The metric is derived by summing the reciprocal of the non-zero elements of the matrix product A 2 [ 1 A ] , where A 2 represents the number of length two shortest paths between non-adjacent neighbors passing through the ego node. However, while this localized measure avoids the need for full network knowledge, its scalability may degrade in dense networks where ego-networks grow substantially in size relative to the global topology.
In dynamic or temporal networks, the concept ego-betweenness centrality has been adapted to consider time-respecting paths within the ego-network. For instance, in Ref. [51] local proxies are introduced. In this study, the pass-through degree is computed by evaluating the temporal ego-shortest betweenness and the betweenness centrality based on temporal paths within the ego-network. This measure is computationally efficient, operating in nearly linear time relative to the number of temporal edges. It serves as an approximation of temporal betweenness. While these approximations reduce overhead, they introduce trade-offs in accuracy and sensitivity to network sparsity.
In a similar manner, as demonstrated in prior studies [17], nodes can ascertain their centrality exclusively based on their one-hop neighborhood by periodically disseminating local connectivity information. This strategy enables each node to estimate its importance in the network and participate in nodes as router selection with minimal communication overhead. Furthermore, local updates enable the system to maintain its adaptability in the face of mobility-induced topology changes.
Another strategy involves distributed consensus protocols. In Ref. [52], a distributed algorithm is proposed to estimate alpha-centrality in undirected asymmetric networks. In this paradigm, nodes engage in an iterative exchange of information with their one-hop neighbors. Concurrently, they implement a consensus process that culminates in a global centrality estimation, obviating the necessity for centralized coordination.
Another viable approach for enabling global centrality computation in WSNs is the integration of Software-Defined Networking (SDN) principles. In SDN-based architectures tailored for WSNs, a centralized controller is responsible for managing network behavior by maintaining a global view of the topology and flow state [53,54]. The computational burden is transferred from the sensor nodes, which are limited in resources. As a result, complex graph-based operations can be performed without compromising the local energy budgets. Furthermore, the SDN controller has the capacity to disseminate routing or topology control decisions that are informed by centrality in a dynamic manner, thereby enabling network adaptation that is both responsive and optimized [55]. The introduction of SDN has given rise to novel design considerations, including but not limited to control overhead and fault tolerance [3]. However, SDN has also furnished a pragmatic framework for the realization of centralized intelligence within distributed and dynamic WSN environments.
Together, these methods offer a robust theoretical foundation for decentralized and efficient centrality computation in WSNs. They provide feasible solutions that align with the computational and energy limitations of sensor nodes while supporting dynamic topologies. Consequently, the topology control strategy proposed in this study builds upon these principles to operationalize centrality metrics in realistic WSN environments.

3. Related Work

Due to their potential to improve network efficiency, topology control mechanisms for wireless sensor networks (WSNs) have garnered significant attention in the scientific community. This surge in interest has prompted numerous studies compiling various topology control techniques.
One of the primary objectives of topology control is to optimize energy usage and extend battery life. This challenge has spurred significant efforts within the scientific community to address this issue. For instance, in Ref. [23], a detailed overview of distributed topology control techniques is provided, with a primary emphasis on extending battery life in wireless sensor networks (WSNs). These techniques fall into two categories: 2D and 3D algorithms. Two-dimensional algorithms are further divided into power adjustment, power mode, clustering, and hybrid approaches. Conversely, 3D algorithms address topology control in specialized settings, such as indoor or underwater environments. Similarly, Ref. [56] presents a comprehensive review of topology control techniques in WSNs, with a focus on full coverage, barrier coverage, sweep coverage, energy management, and power control.
Furthermore, in Ref. [57], a taxonomy is introduced to classify topology control problems in WSNs. The two main classifications are network coverage and network connectivity. These works also emphasize the importance of energy management as a foundational framework for addressing topology control challenges. Similarly, Huang et al. [58] contribute to a taxonomy of topology control algorithms, primarily emphasizing energy efficiency for Internet of Things (IoT) applications. These algorithms fall into three categories: homogeneous, heterogeneous, and miscellaneous. The first two categories assume homogeneity or heterogeneity among network devices, respectively, while the “others” category considers factors such as device location, direction, and neighboring nodes.
In recent years, topology control based on discrete Markov processes has emerged as an effective strategy for extending the operational lifetime of star-configured wireless sensor networks (WSNs). This strategy models node state transitions in active, inactive, or sleep modes. It also dynamically optimizes duty cycles to minimize energy consumption without sacrificing connectivity [59,60]. Meanwhile, federated learning has gained prominence as a privacy-preserving approach to training AI models collaboratively across distributed devices, ranging from mobile phones to healthcare systems and autonomous vehicles, by keeping raw data localized and only exchanging model updates [61,62]. Comprehensive surveys of federated learning have identified several key challenges, such as non-independent and identically distributed data, data heterogeneity, communication efficiency, and model security. These surveys have also speculated about the potential evolution of federated learning toward artificial consciousness, which is subject to rigorous ethical scrutiny. Together, these studies outline the current state of the art at the intersection of energy-efficient WSN design and decentralized, privacy-aware machine learning.
Other studies focus on strategically placing network elements to improve topology. In Ref. [63], the authors review placement strategies, buffering capacity, and mobility models for implementing Throwboxes in delay-tolerant networks (DTNs). Throwboxes serve as relays between network nodes to improve delivery rates, reduce delays, and alleviate the load on mobile nodes.
Other studies emphasize devising adaptable topology control techniques. In Ref. [64], the focus is on topology control in mobile ad hoc networks (MANETs). The authors propose a method to determine the optimal topology during update intervals through node group prediction, thereby minimizing the nodes’ cumulative energy consumption. Conversely, in Ref. [65], the authors specify topology control for monitoring landslides in WSNs. This flexible topology works in both normal and emergency conditions. This approach demonstrates the versatility and applicability of topology control in specialized contexts.
In the domain of community awareness, a considerable body of literature employs Social Network Analysis (SNA) methodologies, frequently utilizing centrality metrics such as betweenness centrality, degree centrality, and closeness centrality, among others. As demonstrated in Ref. [66], nodes with a high degree of centrality can influence the dependability of wireless mesh networks (WMNs). The efficacy of the TDMA channel access scheduling algorithm implemented in high-centrality nodes is demonstrated through its implementation in the nodes, thereby showcasing network performance enhancements. In the study by Meghanathan et al. [67], centrality metrics are employed to identify Connected Dominating Sets (CDSs) in complex graphs. The formation of the smallest CDSs is often predicated on betweenness centrality. In addition, an investigation was conducted in [17] that entailed a comparison between degree, closeness, and betweenness centrality metrics to establish a WMN backbone. The findings indicated that betweenness centrality exhibited enhanced stability and fragmentation performance in networks with randomly distributed nodes. In contrast, Shifani et al. propose the IoT-based Secured Data Exchange Protocol (IoTSDEP) in order to further enhance community awareness through SNA in [68]. This paradigm enables social communities in wireless sensor networks (WSNs) to share information in a decentralized and resilient manner. By leveraging lightweight encryption, secure routing, and intrusion detection, the system enhances efficiency, scalability, privacy, and trust.
A subset of research endeavors involves the integration of centrality metrics and community structures with the objective of enhancing network performance. As stated in the research paper “Bubble Rap” [69], a routing algorithm is provided that is rooted in social behavior. This algorithm integrates community structure knowledge and node centrality values to facilitate routing decisions. The “Bubble Rap” protocol is designed to facilitate the dissemination of data packets to prominent nodes within the network framework. This dissemination process is informed by a combination of global and local rankings, thereby ensuring the optimal delivery of information. In Ref. [47], an algorithm for packet forwarding is proposed in Delay-Tolerant Networks (DTNs), which utilizes community structures and metrics of inter-centrality and intra-centrality.
Recent research has demonstrated the efficacy of leveraging centrality metrics to enhance routing performance and resilience in distributed networks. For instance, a distributed algorithm for computing load centrality (LC) was integrated into Babel’s distance-vector protocol. The integration of these systems has enabled the precise determination of LC values under stable conditions, leading to a significant reduction in route-recovery times and the maintenance of minimal control overhead across diverse topologies [70,71]. In the context of OLSR-based multi-hop networks, a novel approach to selecting Multi-Point Relay (MPR) nodes for in-network packet filtering was proposed in [72]. This approach entailed the implementation of a lightweight, distributed betweenness centrality estimation procedure, offering a novel solution to the challenges posed by network management in dynamic environments. This procedure consistently yielded optimal filtering efficiency and reduced false positives, even as network size and mobility varied. Moreover, the study cited in [73] offers a comprehensive overview of research on the efficacy of clustering in conjunction with centrality. This approach has been demonstrated to minimize redundancy in established paths for routing in both static and dynamic networks.
Despite the preponderance of prior studies in topology control that have focused on transmission power adjustment and node placement, there have been independent and joint endeavors to develop topology control and packet forwarding algorithms through the utilization of centrality metrics and community structures. This work introduces a community-aware topology control method for WSNs, emphasizing the discovery of a connected dominant set (CDS) within a homogeneous WMN. Nodes outside this CDS deactivate their routing functions, leading to reduced topologies. The proposed approach is evaluated and compared with a noncommunity-aware topology control method exclusively reliant on centrality metrics.

4. Topology Control Mechanism

In this section, an overview of the environment under research is provided. In the following section, we delineate the community detection algorithm that was utilized for the evaluation. We proceed to assess various router selection methods based on centrality metrics and community structures. Consequently, an exhaustive evaluation of the resulting reduced topologies was conducted for all scenarios evaluated in this study.
The proposed evaluation framework for the topology control mechanism is composed of four sequential stages: (1) selection of mobility models to simulate realistic node movement, (2) detection of community structure using the Louvain algorithm, (3) router selection based on centrality metrics within and across communities, and (4) establishment of connections and edge weights according to the IEEE 802.11s standard and the Airtime Link Metric. Each component plays a fundamental role in shaping the backbone network and evaluating its performance under different mobility scenarios. Figure 1 illustrates the overall process.

4.1. Scenarios Under Consideration

In this study, the scenarios were selected according to the criteria outlined in [32] with the objective of closely replicating the environments of social behavior in real life. Each scenario under consideration comprises a WSN that has been expanded to a WMN, consisting of 100 nodes that adhere to the 802.11s standard. The nodes have been meticulously positioned within a delineated area measuring 1024 by 520 m. In order to maintain uniformity and objectivity in the evaluation process, it is imperative that all simulations adhere to a consistent structural foundation. The duration of each simulation is fixed at 500 s. The distinguishing factor among these scenarios is the mobility model that governs the movement of the nodes. The integration of six distinct mobility models has been successfully executed. The following models are employed: SWIM, SLAW, SMOOTH, Disaster Area, map-Based, and Random Waypoint.
The objective of this study is to validate performance enhancements across a spectrum of realistic settings. The input parameter configurations for the initial four mobility models comply with the specifications delineated in [35,36,37,38]. In the case of the map-based scenario, it emulates a portion of Cuenca, Ecuador. In the Random Waypoint Mobility (RWM) model, each node autonomously selects a destination and proceeds toward it along a straight path at a randomly determined speed within the range of v m i n to v m a x . For the purposes of this study, the node movement speed has been set to vary between 2 and 4 m per second, with a maximum pause time of 20 s.
For all models of mobility, with the exception of the map-based model, the Bonnmotion version 3 software is employed [74]. Conversely, the map-based model utilizes SUMO software for emulation.

4.2. Community Detection

As previously indicated, the adoption of human mobility patterns by nodes within the network naturally gives rise to the formation of communities over time as a result of social interactions. These communities are distinguished by the observation of increased temporal and spatial interactions among their constituent nodes. Consequently, the initial step in devising a community-aware topology control mechanism is to identify and track these evolving communities within each scenario.
The Louvain algorithm, as delineated in [75,76], has been identified as the optimal approach for community detection. This algorithm is characterized by its global and centralized nature, with a foundation in modularity maximization. It demonstrates proficiency in the identification of communities within weighted networks. The acceleration of the Louvain algorithm is achieved through the implementation of the Grappolo tool, which utilizes parallel execution techniques as outlined in the work by Lu et al. [77].
The Louvain algorithm requires the weight matrix of the network’s links as an input parameter. The construction of this matrix is predicated on the nodes and the connections between them. The nodes are derived from the mobility traces of each mobility model, while the edge weights are determined by simulating the same nodes under the 802.11s standard and the HWMP protocol to establish connections [78].
That is, the edge weights are determined by the expression m a x ( c a ) c a , where c a represents the airtime link metric of 802.11s, and m a x ( c a ) denotes the maximum value of c a observed throughout the network. The airtime link metric is a quantitative metric that quantifies the channel resources required for transmitting a frame over a specific link. Lower metric values are indicative of more favorable links. Therefore, the maximum difference between the nodes’ values, that is, m a x ( c a ) c a , is indicative of the strength of the link between the two nodes. The output is a matrix comprising the nodes and the community to which each is assigned.

4.3. Routers Selection

In Section 2.6, the emphasis is placed on the significance of betweenness centrality and its derivatives in the context of network information flow regulation and forwarding. A higher betweenness centrality value for a node is indicative of greater control over the information flowing between nodes. Given that the topology under study exhibits a community structure due to the various applied mobility models, it becomes evident that topology control design should consider these communities. In accordance with the findings of prior studies [17,32,49], the decision has been made to utilize betweenness and bridging centrality metrics in the selection of routers.
This work proposes a methodology for selecting the most central nodes within each community based on betweenness centrality, as well as the nodes that optimally connect the communities to each other using bridging centrality. For the bridging nodes, the selection criterion invariably encompasses the top 25% of nodes that exhibit the highest values of bridging centrality within the network. This percentage aligns with the conclusions drawn from prior research, as outlined in [49], where the definition of bridging nodes was derived from empirical studies. This approach is intended to select a sub-group of nodes as routers and thereby construct the backbone network. These selected nodes execute the Hybrid Wireless Mesh Protocol (HWMP) as the backbone routing protocol. While HWMP was originally designed for WMNs, this study adopts it as the routing layer to evaluate the performance of the topology formed by the selected nodes. Consequently, the topology control mechanism does not modify the HWMP protocol itself; rather, it identifies which nodes in the WSN will act as routers and participate in HWMP routing operations. The remaining nodes, which were not selected as part of the backbone, function as basic sensors and forward traffic through at least one of the HWMP-enabled routers. This separation enables reduced routing overhead in non-router nodes, while facilitating scalable and dynamic communication through the optimized topology.
In this study, the computation of node centralities is not addressed as a primary contribution; rather, it is considered a prerequisite established in prior work. Specifically, the distributed estimation of betweenness centrality was previously implemented and validated in [17,51], where an ego-betweenness centrality was applied to enable each node to locally estimate its centrality using only one-hop neighborhood information. This work is predicated on the assumption that centrality values are already available within the network and extends the methodology by integrating community detection into the topology control process.
Additionally, we propose and assess three distinct selection methods for central nodes based on betweenness centrality within each community. The selection methods include the k most central nodes, Community-Aware Highest Betweenness Intra-Centrality Neighbor (C-A H Intra C B N), and Community-Aware Highest Betweenness Centrality Neighbor (C-A H C B N). Furthermore, a comparative analysis is incorporated with the topology control method proposed in [17], referred to as “Two Highest Betweenness Centrality Neighbors” (2H C B N). The subsequent sections will provide a detailed exposition of each of these methods.

4.3.1. k-Most Central Nodes in Each Community

In this method, a specific number, denoted k, of the most central nodes within each community is selected based on their betweenness centrality ( C B ) values. In this study, we specifically assess two values of k, namely k = 1 and k = 2 . Furthermore, as previously mentioned, we identify the top 25% bridging nodes as routers [49]. These selected nodes will serve as routers and form the backbone.

4.3.2. Community-Aware Highest Intra-Centrality Neighbor (C-A H Intra C B N)

This proposed method entails the selection of a neighbor node with the highest intra C B value by each node in the network, thereby designating it as a router. In addition to the previously described methodology of selecting the top 25% of bridging nodes [49], the following steps are to be taken. As delineated in Equation (1), intra C B signifies the betweenness centrality of a node, evaluated exclusively within its community. Nodes that do not belong to the same community are assigned an intra C B value of 0 and therefore not considered for router selection. The approach of nodes selecting immediate neighbors as routers ensures that there are no isolated nodes left in the network, except for those without established peer links.

4.3.3. Community-Aware Highest Betweenness Centrality Neighbor (C-A H C B N)

In this method, each node calculates its betweenness centrality ( C B ) without taking into account the community of the node or the communities to which other nodes belong. Subsequently, each node selects its neighbor with the highest betweenness centrality value within the same community. In order to be considered eligible, neighboring nodes must belong to the same community as the node in question. Consequently, the node is only required to ascertain its community in order to restrict the selection to eligible neighbors.

4.3.4. Two Highest Betweenness Centrality Neighbors (2H C B N)

This mechanism is predicated exclusively on centrality metrics, eschewing any consideration of edge weights. In the 2H C B N method, each node selects its two neighbors with the highest betweenness centrality values as router nodes. As in C-A H C B N, 2H C B N is predicated on a CDS whose elements constitute the network backbone. This method does not take into account the community structure of the network. This decentralized approach enhances network performance and promotes greater energy efficiency in comparison to WMNs that lack topology control [17].

4.4. Network Connectivity Assessment

As previously employed in a related study [17], the efficacy of each method was assessed by evaluating two vital attributes of the resulting topologies: the fragmentation of the resulting backbone and the number of isolated nodes.
The quantification of graph fragmentation is achieved through the implementation of a metric delineated in [79] which conceptualizes fragmentation as the proportion of nodes that are disconnected from one another. It is asserted that the generated backbone should demonstrate an absence of fragmentation, thereby signifying that all selected router nodes must ensure the maintenance of direct or indirect connectivity. The presence of fragmentation in a network is indicative of its disconnection. However, while a connected backbone is vital, it does not necessarily ensure the absence of isolated nodes. To address this concern, a further evaluation of the number of isolated nodes associated with each proposed method is warranted. The utilization of these two evaluation measures in conjunction facilitates the selection of the optimal method concerning network connectivity.
As demonstrated in Figure 2, Figure 3 and Figure 4, the topologies generated by each proposed method are illustrated, with the corresponding backbones shown in each case. As illustrated, blue nodes denote the designated routers constituting the routing backbone, thereby ensuring end-to-end connectivity. Green nodes represent client nodes that are one-hop neighbors of the backbone and rely on routers to forward their data. Red nodes indicate isolated nodes, which are not directly connected to any router within one hop. Consequently, these nodes remain disconnected from the backbone. However, an exhaustive analysis of snapshots from all six proposed scenarios reveals consistent patterns.
The results obtained from each method are summarized in Table 2. This table includes the backbone fragmentation and the count of isolated nodes. The method of selecting k most central nodes in each community, with k = 1 and k = 2 , reveals the presence of fragmented backbones and numerous isolated nodes (see Figure 2). This observation indicates that the selection of routers is not optimal. Conversely, the C-A H Intra C N method achieves complete backbone connectivity without isolated nodes, selecting 49% of nodes as routers (see Figure 3). In a similar vein, the methods C-A H C B N and 2H C B N both attain full backbone connectivity, with 40% and 47% of the nodes selected as routers, respectively (see Figure 4). In summary, the C-A H C B N and 2H C B N methods have been shown to consistently yield superior network connectivity results. For this reason, they have been selected for further analysis in this study.

4.5. Analysis of the Resulting Topologies

In this section, an analysis of the resulting topologies obtained through the C-A H C B N control mechanism is carried out. To conduct the analysis, 50 simulations were executed, with each simulation lasting 500 s. Additionally, topology control was updated at an interval of 5 s for each mobility model, which comprised 100 nodes.
The initial segment of Table 3 presents the outcomes of the number of routers selected by the C-A H C B N method for the six mobility models. The results are expressed in terms of minimum, maximum, mean, and standard deviation values, denoted by σ . On average, approximately 39% of the nodes function as routers in all scenarios. The RWM scenario necessitates the implementation of a substantial number of routers, thereby substantiating the efficacy of the proposed method in conjunction with socially aware mobility models that emulate real-life community structures.
The second section of Table 3 presents a compilation of data concerning the number of state transitions (between routers and clients) that occurred in the nodes during the simulation for each scenario. As was the case in the initial section, the results are expressed with the minimum value, maximum, mean, and standard deviation, denoted by σ . As anticipated, scenarios such as Disaster Area and SWIM demonstrate a greater propensity for state transitions due to their elevated degree of mobility and dynamism, wherein nodes frequently undergo transitions between groups or communities. On average, 23 state changes occur during the simulation period in these scenarios, equivalent to a rate of 2.76 changes per minute. Conversely, the SMOOTH scenario exhibits the fewest alterations, with nodes predominantly relocating to proximate family neighborhoods. Consequently, the state change rate for this scenario averages 1.46 changes per minute. State changes directly impact node energy consumption. Temporary role assignments enable nodes to deactivate their routing functionalities intermittently, thereby averting protracted battery drainage.
The final part of Table 3 offers a summary of the mean number of edges in both reduced and full topologies (all nodes as routers) during the simulation. The C-A H C B N topology control has been demonstrated to achieve edge reduction percentages ranging from 31% to 44%. This has been shown to result in enhanced network performance, as detailed in Section 5.

5. Results and Discussion

In this section, an evaluation of the network’s performance following the application of different topology control mechanisms was conducted. The topology control mechanisms evaluated included no topology control, topology control without community awareness (2H C B N), and community-aware topology control (C-A H C B N), which is the proposed approach.
To assess these mechanisms, extensive simulations were performed using the ns-3.40 network simulator, considering both the reactive (on-demand) and proactive modes of the HWMP routing protocol. The network under consideration consists of 100 nodes that move according to various mobility models within an area of 1024 × 520 m, as described in Section 4.1.
For each scenario, four snapshots were considered, with varying numbers of simultaneously active UDP data flows ranging from 10 to 40, independently simulated. All UDP data flows utilized 512-byte packet lengths with a 20 millisecond interarrival time. The transmission time was configured to 200 s, leading to the transmission of 10,000 packets in each peer-to-peer data flow.
To ensure the reliability of the results, 50 statistically independent executions were performed for each data flow scenario. The mean values of the results from the 200 runs for each case were subsequently calculated and averaged. The results are presented with a confidence interval of 95%.

5.1. Reactive Mode Results

In this section, an evaluation of the reactive mode of the HWMP routing protocol is conducted. A multifaceted evaluation approach is employed to assess network performance, encompassing several pivotal parameters. These include the rate of routing management messages, the total number of packets received successfully, the total number of forwardings per successfully received packet, the network efficiency as reflected by the packet delivery ratio (PDR), and the nodes’ power consumption.
The evaluation process commences with an examination of the network in two distinct configurations: the first configuration is characterized by the absence of topology control, wherein all nodes function as routers, and the second configuration involves the implementation of topology control, utilizing the C-A H C B N and 2H C B N methods. In order to illustrate the advantages of applying topology control, the SWIM scenario is employed for this evaluation.
As demonstrated in Figure 5, the implementation of a topology control mechanism has been shown to result in substantial enhancements, including a reduction in routing messages (Figure 5a), a decrease in packet forwarding (Figure 5b), and an increase in successfully received packets (Figure 5c). Consequently, an enhancement in network efficiency is observed, as evidenced by an increase in the packet delivery ratio (Figure 5e). Conversely, due to the reduced number of routing messages and the decreased packet forwarding per received packet, a lower energy consumption is observed (see Figure 5f). The efficacy of implementing a topology control mechanism in a network can be demonstrated. The efficacy of the system is enhanced in all aspects, thereby mitigating prevalent issues such as packet collision and interference that are precipitated by the substantial density of nodes.
In future studies, the research team will focus on comparing metrics between 2H C B N and C-A H C B N. This will allow them to ascertain the impact of considering community structure in the topology control mechanism.

5.1.1. Rate of Routing Management Messages

In this subsection, the average rate of routing management messages concerning the number of data flows across all scenarios considered is examined, as illustrated in Figure 6. As predicted, an escalation in traffic load—that is to say, the quantity of data flows—results in an augmented rate of routing messages, particularly in the context of evaluating an on-demand routing protocol.
It is imperative to underscore that this diminution in routing messages exerts a direct influence on energy consumption within the network. This reduction is primarily attributed to the fact that nodes that are not selected as routers do not transmit routing management messages.
It is noteworthy that in the map-based scenario (see Figure 6e), both topology control mechanisms generate a comparatively low rate of routing messages (less than 60,000 packets) in contrast to the other scenarios. This phenomenon is primarily attributable to the spatial distribution of the nodes. In a map-based model, nodes predominantly move along linear paths, such as streets and sidewalks. This results in fewer dense regions compared to open areas, such as parks or shopping centers. Consequently, path resolution requires fewer routing messages.
As illustrated in Table 4, the proposed method, C-A H C B N, has been demonstrated to achieve an average percentage reduction in routing messages when compared to the previous proposal, 2H C B N, in a range of scenarios. This enhancement ranges from 17.64% in the map-based scenario to a substantial 38.29% in the SWIM scenario.

5.1.2. Total Data Forwardings

In this subsection, an analysis is conducted of the total number of data forwardings in all scenarios considered. As illustrated in Figure 7, the results for each scenario are presented as a function of traffic load.
As anticipated, with rising traffic load (number of data flows), the aggregate number of data transmissions concomitantly rises. This phenomenon aligns with the operational characteristics of on-demand routing protocols, which are designed to address data transmission demands by initiating route discovery and maintenance processes.
It is imperative to acknowledge that the implementation of topology control mechanisms leads to a decrease in the aggregate number of data forwardings. This decline is primarily attributable to the reduced selection of nodes as routers within the network, resulting in diminished route discoveries and data relay operations.
The specific impact of topology control methods, such as C-A H C B N and 2H C B N, on the total data forwarding can be observed in Figure 7. These methods can also be compared with the scenario without topology control. This reduction in data transmission serves to illustrate the enhanced efficiency of the network with the implementation of topology control mechanisms, thereby further underscoring the merits of these mechanisms in the management of data transmissions.

5.1.3. Successfully Received Packets

In this subsection, the number of successfully received packets is examined as a function of the number of active data flows across all scenarios. The results are presented in Figure 8.
The observed trend in the number of successfully received packets is consistent with network saturation. As the number of active data flows increases, the network approaches a state of saturation, resulting in a plateau in the number of received packets. The plateau effect is particularly evident in scenarios involving 40 simultaneous flows.
A substantial enhancement in the number of successfully received packets has been observed in a variety of scenarios, including SWIM, SLAW, map-based, and RWM (see Figure 8a,b,e,f). The efficacy of these enhancements can be attributed to the implementation of topology control methods, such as C-A H C B N and 2H C B N.
However, for the scenarios of the SMOOTH and Disaster Area (see Figure 8c,d), there is negligible to no substantial enhancement in the number of successfully received packets. The negligible variations observed in these scenarios are within the confidence intervals, indicating that the topology control methods have minimal impact in these specific scenarios. The Disaster Area scenario, distinguished by its dense regions, may exhibit a comparatively diminished capacity for improvement as a result of its distinct characteristics.
In essence, the implementation of topology control mechanisms has been demonstrated to enhance the network’s efficiency by increasing the number of successfully received packets in various scenarios. However, the impact of these mechanisms varies depending on the characteristics of the specific scenario.

5.1.4. Total Data Forwardings per Successfully Received Packet

In this subsection, the relationship between the number of forwarded packets and the number of packets successfully received in all scenarios is explored (see Figure 9). It has been observed that the proposed method C-A H C B N requires a smaller number of forwarded packets compared to the previous method 2H C B N.
In the majority of scenarios, there is an increasing trend in the number of forwarded packets as the number of data flows increases. This phenomenon can be attributed to an increase in packet retransmissions, which, in turn, results in a higher number of collisions within the network. This trend persists until a saturated state is attained, which typically occurs between 25 and 30 flows for the majority of mobility models. However, in the SLAW scenario (see Figure 9b), an early saturation state is observed, occurring at 20 data flows. This phenomenon can be attributed to the relatively high number of edges in the reduced topology for the SLAW scenario, as evidenced in Table 5. This results in increased interference and a higher number of forwardings per received packet.
As presented in Table 4, the proposed method C-A H C B N exhibits a mean percentage reduction in data forwardings per successfully received packet compared to the previous method 2H C B N for each mobility model. As previously discussed, the Disaster Area scenario demonstrates a comparatively diminished decrease in comparison to alternative scenarios, primarily attributable to its high degree of density.
In general, the proposed topology control method C-A H C B N has been demonstrated to be effective by reducing the number of forwarded packets per successfully received packet, resulting in improved network efficiency. However, the extent of this improvement varies depending on the specific characteristics of the scenario.

5.1.5. Network Efficiency in Terms of Packet Delivery Ratio

In this subsection, the network’s efficiency is examined in terms of the packet delivery ratio (PDR), a pivotal performance metric calculated by dividing the number of successfully received packets by the total number of transmitted packets. A parallel can be drawn between the trends observed in PDR and those depicted in Figure 8.
As demonstrated in Figure 10, the findings underscore substantial enhancements in PDR for the SWIM, SLAW, map-based, and RWM scenarios across all traffic loads. Conversely, the SMOOTH and Disaster Area scenarios (illustrated in Figure 10c,d) exhibit minimal to no efficiency enhancements. Specifically, the Disaster Area scenario demonstrates a marginal decline in performance, with a decrease of 1.43%, when operating under low traffic conditions (10 and 15 traffic flows). This decline merits discussion, as it is attributable to the intrinsic characteristics of the mobility model. The Disaster Area scenario represents a fragmented deployment, with several small, densely populated zones designed to emulate isolated groups of nodes responding to localized emergencies. In such configurations, inter-zone communication paths are often sparse or unstable. The additional structure imposed by the community-aware backbone can introduce routing overhead that is not effectively leveraged under light traffic. This can result in a slight degradation of packet delivery performance, particularly when the benefits of backbone coordination are underutilized due to the limited volume of data flows.This observation is reinforced by the data in Table 4 (sixth column), which confirms the marginal variation in PDR for this scenario.
It is noteworthy that columns 4 and 6 in Table 4 exhibit identical improvement values, a consequence of the direct proportionality between PDR and the number of successfully received packets. In general, the proposed topology control method C-A H C B N has been shown to enhance network efficiency, particularly in scenarios characterized by community structure, such as SWIM, SLAW, map-based, and RWM. However, the extent of the improvement in question is subject to variation depending on the characteristics inherent to particular scenarios.

5.1.6. Energy Consumption

The enhanced efficiency of the network, in conjunction with substantial decreases in the transmission of routing messages and the forwarding of packets, results in quantifiable energy consumption reductions throughout the network. In accordance with the approach delineated in [17], we assess energy consumption employing the model established in [80].
To facilitate a comprehensive analysis, the intermediate operating point of 20 active data flows is the focal point of this study. At this stage, the network is neither overload-prone nor operates under negligible traffic loads. In order to facilitate a more profound comprehension of this parameter, the average reduction in network energy consumption when employing the C-A H C B N method is presented in Table 4, in comparison to the 2H C B N.
Specifically, in the SLAW scenario, approximately 70% of the nodes consume less than 7 J under both methods. However, the remaining 30% of the nodes demonstrate energy savings when using the C-A H C B N method compared to 2H C B N. It is noteworthy that the map-based scenario achieves the lowest energy consumption. This is due to the limited volume of routing messages and packet forwarding, which reduces energy-intensive operations across the network.

5.2. Proactive Mode

In this section, the proactive mode of the HWMP routing protocol was examined. In this operational mode, one or more mesh stations are designated as roots, thereby serving as gateways for communication within the network. These root nodes facilitate the creation and maintenance of distance vector trees.
In order to enhance network performance, root stations are strategically placed in the geography of the network. To assess the impact of this configuration, multiple simulations were conducted with varying numbers of root stations—ranging from one to three—using the same configurations as in the previous reactive mode evaluations.

5.2.1. Rate of Routing Management Messages

For this parameter, a constant traffic load of 25 data flows is utilized, divided into two parts. The first part involves downloading 20 streams from root stations to randomly selected nodes, and the second part involves uploading 5 streams from randomly selected nodes to root stations.
As illustrated in Figure 11, the results demonstrate variations in the rate of routing management messages, contingent on the number of root stations present in all scenarios. Each mobility model exhibits a distinct pattern; however, a common trend is a reduction in routing messages with the C-A H C B N method compared to 2H C B N.
As illustrated in Table 6, the second column provides a quantitative summary of the average percentage reduction in this parameter when comparing C-A H C B N with 2H C B N. It is evident that the reduction percentage is less significant for the SLAW and disaster area scenarios, while the other scenarios display substantial reductions. This finding indicates the effectiveness of the C-A H C B N method.

5.2.2. Network Efficiency in Terms of Packet Delivery Ratio

Network efficiency, measured in terms of the Packet Delivery Ratio (PDR), is assessed with 25 data flows (similar to Section 5.2.1) and varying numbers of configured root stations: one, two, and three. As illustrated in Figure 12, the results are presented for all scenarios.
In most cases, a trend emerges in which an increase in the number of root stations leads to improved network efficiency. This outcome is attributed to the more balanced distribution of the network load between the gateways, resulting in fewer packet collisions and higher network efficiency.
As illustrated in Table 6 (3rd column), the mean enhancement in network efficiency attained by the C-A H C B N method in comparison with 2H C B N is evident. While the majority of scenarios demonstrate only marginal improvements, the map-based scenario is noteworthy with a substantial 34.02% enhancement.

5.2.3. Energy Consumption

For the analysis of energy consumption, we introduce three configured root stations and simulate 75 data flows (60 downloads and 15 uploads) to ensure representative results. To provide a quantitative perspective, Table 6 presents the average reduction in the overall energy consumption of the network achieved by C-A H C B N compared to 2H C B N in the fourth column. The fifth column provides these values specifically for non-root stations. It is clear to see that for all mobility models, energy consumption is reduced.

6. Conclusions

This paper introduces a community-aware topology control mechanism, C-A H C B N, for WSN, using centrality metrics. The mechanism identifies crucial nodes within communities (determined by the centrality of the betweenness) and those that facilitate communication between communities (identified by the centrality of the bridging), forming the backbone of the network. The efficacy of C-A H C B N was assessed in six distinct scenarios employing various mobility models, yielding an average reduction in active edges in the network ranging from 30.52% to 41.47%.
The proposed method, C-A H C B N, demonstrated improved network performance compared to the previous 2H C B N approach when subjected to different traffic loads. The improvements were most significant under low traffic loads (10–20 flows), with notable reductions in routing messages and forwarding overhead. This translated into enhanced efficiency and energy savings in both reactive and proactive modes. Under medium traffic loads (20–30 flows), the proposed method continued to outperform the baseline, though the magnitude of the improvement was more moderate. In high traffic scenarios (30–40 flows), performance remained competitive. In most scenarios, C-A H C B N performed better than 2H C B N, indicating robust and scalable behavior across varying network conditions. These results support the practical relevance of C-A H C B N for real-world wireless sensor networks, particularly those with dynamic topologies and diverse traffic patterns.
Despite the utilization of a centralized approach in the present proposal, future endeavors may involve the exploration of distributed community detection algorithms and centrality calculation methods. Furthermore, the incorporation of novel metrics, such as remaining node energy, device type, or geographical location, into centrality calculations has the potential to enhance the efficacy and adaptability of the mechanism.

Author Contributions

Conceptualization, A.V.-R. and L.J.d.l.C.L.; methodology, J.D.B., C.R.C., and A.V.-R.; software, J.D.B. and C.R.C.; validation, J.D.B. and C.R.C.; formal analysis, J.D.B. and A.V.-R.; investigation, J.D.B. and A.V.-R.; resources, J.D.B.; data curation, J.D.B. and C.R.C.; writing—original draft preparation, J.D.B. and C.R.C.; writing—review and editing, A.V.-R. and L.J.d.l.C.L.; visualization, J.D.B.; supervision, A.V.-R. and L.J.d.l.C.L.; project administration, A.V.-R.; funding acquisition, A.V.-R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Universidad de Cuenca, Vicerrectorado de Investigación e Innovación.

Data Availability Statement

The complete dataset of raw simulation results is available at https://github.com/juanbelesaca/Topology-Control-WSN.git (accessed on 15 July 2025).

Conflicts of Interest

The authors declare no conflicts of interest. The funder had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
WSNWireless Sensor Network
WMNWireless Mesh Network
HWMPHybrid Wireless Mesh Protocol
CDSConnected Dominating Set
RWMRandom Waypoint Mobility
SWIMSmall World In Motion
SLAWSelf-Similar Least-Action Human Walk
SMOOTHSimplified Mobility Model for Human Walks
ILIncident Location
PWTPatient Waiting Area
CCSCasualties Clearing Station
TOCTechnical Operation Command
MSLAWMap-Based Self-Similar Least-Action Human Walk
C B Betweenness Centrality
intra C B Intra-Centrality
inter C B Inter-Centrality
C B r i d Bridging Centrality
C-A H Intra C B NCommunity-Aware Highest Betweenness Intra-Centrality Neighbor
C-A H C B NCommunity-Aware Highest Betweenness Centrality Neighbor
2H C B N2 Highest Betweenness Centrality Neighbors
BCBridging Coefficient
PDRPacket Delivery Ratio
UDPUser Datagram Protocol
SUMOSimulation of Urban Mobility

References

  1. Duarte, F. How many IoT devices are there? In Exploding Topics Blog; Semrush Inc.: Boston, MA, USA, 2024; Available online: https://explodingtopics.com/blog/number-of-iot-devices (accessed on 14 August 2025).
  2. Aloi, G.; Di Felice, M.; Loscrì, V.; Pace, P.; Ruggeri, G. Spontaneous smartphone networks as a user-centric solution for the future internet. IEEE Commun. Mag. 2014, 52, 26–33. [Google Scholar] [CrossRef]
  3. Cui, X.; Huang, X.; Ma, Y.; Meng, Q. A load balancing routing mechanism based on SDWSN in smart city. Electronics 2019, 8, 273. [Google Scholar] [CrossRef]
  4. Khan, W.Z.; Xiang, Y.; Aalsalem, M.Y.; Arshad, Q. Mobile phone sensing systems: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 402–427. [Google Scholar] [CrossRef]
  5. Lata, A.A.; Kang, M.; Shin, S. FCM-OR: A local density-aware opportunistic routing protocol for energy-efficient wireless sensor networks. Electronics 2025, 14, 1841. [Google Scholar] [CrossRef]
  6. Pourbemany, J.; Zhu, Y.; Bettati, R. A Survey of Wearable Devices Pairing Based on Biometric Signals. IEEE Access 2023, 11, 26070–26085. [Google Scholar] [CrossRef]
  7. IEEE. IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 10: Mesh Networking (802.11s-2011); IEEE: New York, NY, USA, 2011. [Google Scholar]
  8. Wang, X.; Lim, A.O. IEEE 802.11 s wireless mesh networks: Framework and challenges. Ad Hoc Netw. 2008, 6, 970–984. [Google Scholar] [CrossRef]
  9. Henry, J.; Burton, M. 802.11 s Mesh Networking; Certified Wireless Network Professional: Durham, NC, USA, 2011. [Google Scholar]
  10. Singh, S.P.; Sharma, S. A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks. Procedia Comput. Sci. 2015, 45, 687–695. [Google Scholar] [CrossRef]
  11. Ghadi, Y.Y.; Mazhar, T.; Al Shloul, T.; Shahzad, T.; Salaria, U.A.; Ahmed, A.; Hamam, H. Machine learning solutions for the security of wireless sensor networks: A review. IEEE Access 2024, 12, 12699–12719. [Google Scholar] [CrossRef]
  12. Priyadarshi, R. Energy-efficient routing in wireless sensor networks: A meta-heuristic and artificial intelligence-based approach: A comprehensive review. Arch. Comput. Methods Eng. 2024, 31, 2109–2137. [Google Scholar] [CrossRef]
  13. Zhu, R.; Boukerche, A.; Long, L.; Yang, Q. Design guidelines on trust management for underwater wireless sensor networks. IEEE Commun. Surv. Tutor. 2024, 26, 2547–2576. [Google Scholar] [CrossRef]
  14. Salamea, P.U.; Siguencia, J.V.; Astudillo-Salinas, F.; Belesaca, J.D.; Tello-Oquendo, L.; Alvear, O. An Application Layer Protocol for the Transmission of Hydrometeorological Data over LoRaWAN. In Proceedings of the 2024 IEEE Eighth Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador, 15–18 October 2024; pp. 1–6. [Google Scholar]
  15. Saavedra, M.B.; Merchan, F.T.; Astudillo-Salinas, F.; Belesaca, J.D.; Barreto, J. Development of an IoT system prototype for the acquisition of biomechanical data of a speed skater. In Proceedings of the 2024 IEEE Eighth Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador, 15–18 October 2024; pp. 1–6. [Google Scholar]
  16. Wei, W.J.; Jovian, L.H.S.; How, B.L.C.; Richie, W.R.; Yuan, P.X.; Abhishek, N.V.; Abbas, M.F.B. Multi-Protocol Wireless Mesh Sensor Network. In Proceedings of the 2024 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), Singapore, 21–23 August 2024; pp. 1–6. [Google Scholar]
  17. Vázquez-Rodas, A.; Luis, J. A centrality-based topology control protocol for wireless mesh networks. Ad Hoc Netw. 2015, 24, 34–54. [Google Scholar] [CrossRef]
  18. Akyildiz, I.F.; Wang, X.; Wang, W. Wireless mesh networks: A survey. Comput. Netw. 2005, 47, 445–487. [Google Scholar] [CrossRef]
  19. Mane, M.A.; Deshmukh, A. Secure and Efficient Routing Approach for Airborne Mesh Network with Adaptive Channel Mechanism. Int. J. Innov. Res. Sci. Eng. Technol. 2017, 6, 10801–10807. [Google Scholar]
  20. Bari, S.; Anwar, F.; Masud, M. Performance study of hybrid Wireless Mesh Protocol (HWMP) for IEEE 802.11 s WLAN mesh networks. In Proceedings of the 2012 International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 3–5 July 2012; pp. 712–716. [Google Scholar]
  21. Majumder, A.; Roy, S. Performance Comparison of Adaptive Mobility Management Scheme with IEEE. In IoT and Analytics for Sensor Networks Proceedings of ICWSNUCA 2021; Springer: Singapore, 2021; Volume 244, pp. 83–95. [Google Scholar]
  22. Ren, S.; Liu, J.; Ge, S.S.; Li, D. HWMP-based secure communication of multi-agent systems. Ad Hoc Netw. 2024, 157, 103456. [Google Scholar] [CrossRef]
  23. Aziz, A.A.; Sekercioglu, Y.A.; Fitzpatrick, P.; Ivanovich, M. A survey on distributed topology control techniques for extending the lifetime of battery powered wireless sensor networks. IEEE Commun. Surv. Tutor. 2013, 15, 121–144. [Google Scholar] [CrossRef]
  24. Santi, P. Topology control in wireless ad hoc and sensor networks. ACM Comput. Surv. (CSUR) 2005, 37, 164–194. [Google Scholar] [CrossRef]
  25. Rashid, S.; Khan, M.A.; Saeed, A.; Hamza, C.M. A Survey on Prediction based Routing for Vehicular Ad-hoc Networks. In Proceedings of the 2021 International Congress of Advanced Technology and Engineering (ICOTEN), Taiz, Yemen, 4–5 July 2021; pp. 1–8. [Google Scholar] [CrossRef]
  26. Li, N.; Hou, J.C.; Sha, L. Design and analysis of an MST-based topology control algorithm. IEEE Trans. Wirel. Commun. 2005, 4, 1195–1206. [Google Scholar] [CrossRef]
  27. Wattenhofer, R.; Li, L.; Bahl, P.; Wang, Y.M. Distributed topology control for power efficient operation in multihop wireless ad hoc networks. In Proceedings of the INFOCOM 2001, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, AK, USA, 22–26 April 2001; Volume 3, pp. 1388–1397. [Google Scholar]
  28. Qi, X.; Yuan, P.; Zhang, Q.; Yang, Z. CDS-Based Topology Control in FANETs via Power and Position Optimization. IEEE Wirel. Commun. Lett. 2020, 9, 2015–2019. [Google Scholar] [CrossRef]
  29. Farooq, M.U.; Zeeshan, M. Connected Dominating Set Enabled On-Demand Routing (CDS-OR) for Wireless Mesh Networks. IEEE Wirel. Commun. Lett. 2021, 10, 2393–2397. [Google Scholar] [CrossRef]
  30. Wang, B.; Sun, Y.; Do-Duy, T.; Garcia-Palacios, E.; Duong, T.Q. Adaptive D-Hop Connected Dominating Set in Highly Dynamic Flying Ad-Hoc Networks. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2651–2664. [Google Scholar] [CrossRef]
  31. Rajaraman, R. Topology control and routing in ad hoc networks: A survey. ACM SIGACT News 2002, 33, 60–73. [Google Scholar] [CrossRef]
  32. Vazquez-Rodas, A.; Aviles-Parra, P.; Pinto-Nieto, J.; Belesaca, J.D.; Astudillo-Salinas, F. Topological Evaluation of Realistic Mobility Models for Spontaneous Wireless Networks Using Graph Theory Metrics. In Proceedings of the Proceedings of the Int’l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Montreal, QC, Canada, 30 October–3 November 2023; pp. 61–68. [Google Scholar]
  33. Johnson, D.B.; Maltz, D.A. Dynamic source routing in ad hoc wireless networks. In Mobile Computing; Springer: Boston, MA, USA, 1996; pp. 153–181. [Google Scholar]
  34. Rhee, I.; Shin, M.; Hong, S.; Lee, K.; Kim, S.J.; Chong, S. On the levy-walk nature of human mobility. IEEE/ACM Trans. Netw. (TON) 2011, 19, 630–643. [Google Scholar] [CrossRef]
  35. Mei, A.; Stefa, J. SWIM: A simple model to generate small mobile worlds. In Proceedings of the INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 2106–2113. [Google Scholar]
  36. Lee, K.; Hong, S.; Kim, S.J.; Rhee, I.; Chong, S. SLAW: A new mobility model for human walks. In Proceedings of the INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 855–863. [Google Scholar]
  37. Munjal, A.; Camp, T.; Navidi, W.C. SMOOTH: A simple way to model human walks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2011, 14, 34–36. [Google Scholar] [CrossRef]
  38. Aschenbruck, N.; Gerhards-Padilla, E.; Martini, P. Modeling mobility in disaster area scenarios. Perform. Eval. 2009, 66, 773–790. [Google Scholar] [CrossRef]
  39. Schwamborn, M.; Aschenbruck, N. Introducing geographic restrictions to the SLAW human mobility model. In Proceedings of the 2013 IEEE 21st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), San Francisco, CA, USA, 14–16 August 2013; pp. 264–272. [Google Scholar]
  40. Shlesinger, M.; West, B.; Klafter, J. Lévy dynamics of enhanced diffusion: Application to turbulence. Phys. Rev. Lett. 1987, 58, 1100. [Google Scholar] [CrossRef] [PubMed]
  41. Benhamou, S. How many animals really do the Levy walk? Ecology 2007, 88, 1962–1969. [Google Scholar] [CrossRef]
  42. Edwards, A.M.; Phillips, R.A.; Watkins, N.W.; Freeman, M.P.; Murphy, E.J.; Afanasyev, V.; Buldyrev, S.V.; da Luz, M.G.; Raposo, E.P.; Stanley, H.E.; et al. Revisiting Lévy flight search patterns of wandering albatrosses, bumblebees and deer. Nature 2007, 449, 1044–1048. [Google Scholar] [CrossRef]
  43. Gonzalez, M.C.; Hidalgo, C.A.; Barabasi, A.L. Understanding individual human mobility patterns. Nature 2008, 453, 779–782. [Google Scholar] [CrossRef]
  44. Chaintreau, A.; Hui, P.; Crowcroft, J.; Diot, C.; Gass, R.; Scott, J. Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mob. Comput. 2007, 6, 606–620. [Google Scholar] [CrossRef]
  45. Munjal, A.; Camp, T.; Navidi, W.C. Constructing rigorous MANET simulation scenarios with realistic mobility. In Proceedings of the 2010 European Wireless Conference (EW), Lucca, Italy, 12–15 April 2010; pp. 817–824. [Google Scholar]
  46. Newman, M.E.; Girvan, M. Finding and evaluating community structure in networks. Phys. Rev. E 2004, 69, 026113. [Google Scholar] [CrossRef]
  47. Lu, Z.; Sun, X.; Wen, Y.; Cao, G.; La Porta, T. Algorithms and applications for community detection in weighted networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 2916–2926. [Google Scholar] [CrossRef]
  48. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  49. Ramanathan, M.; Zhang, A.; Cho, Y.R.; Hwang, W. Bridging centrality: Identifying bridging nodes in scale-free networks. In Proceedings of the KDD’06, Philadelphia, PA, USA, 20–23 August 2006. [Google Scholar]
  50. Everett, M.; Borgatti, S.P. Ego network betweenness. Soc. Netw. 2005, 27, 31–38. [Google Scholar] [CrossRef]
  51. Becker, R.; Crescenzi, P.; Cruciani, A.; Kodric, B. Proxying betweenness centrality rankings in temporal networks. In Proceedings of the 21st International Symposium on Experimental Algorithms (SEA 2023), Barcelona, Spain, 24–26 July 2023; pp. 1–22. [Google Scholar]
  52. Montijano, E.; Oliva, G.; Gasparri, A. Distributed estimation and control of node centrality in undirected asymmetric networks. IEEE Trans. Autom. Control 2020, 66, 2304–2311. [Google Scholar] [CrossRef]
  53. Mostafaei, H.; Menth, M. Software-defined wireless sensor networks: A survey. J. Netw. Comput. Appl. 2018, 119, 42–56. [Google Scholar] [CrossRef]
  54. Galluccio, L.; Milardo, S.; Morabito, G.; Palazzo, S. SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 513–521. [Google Scholar]
  55. Egas Acosta, C.; Criollo, L.; Tipantuña, C.; Carvajal-Rodriguez, J. Software-defined networking-enabled efficient default route configuration in IEEE 802.15. 4 protocol: A smart algorithmic approach. Electronics 2024, 13, 1537. [Google Scholar] [CrossRef]
  56. Gengzhong, Z.; Qiumei, L. A Survey on Topology Control in Wireless Sensor Networks. In Proceedings of the 2010 Second International Conference on Future Networks, Sanya, China, 22–24 January 2010; pp. 376–380. [Google Scholar] [CrossRef]
  57. Li, M.; Li, Z.; Vasilakos, A.V. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues. Proc. IEEE 2013, 101, 2538–2557. [Google Scholar] [CrossRef]
  58. Huang, J.; Duan, Q.; Xing, C.C.; Wang, H. Topology control for building a large-scale and energy-efficient internet of things. IEEE Wirel. Commun. 2017, 24, 67–73. [Google Scholar] [CrossRef]
  59. Zhou, T.; Li, X.; Mao, S.; Cai, B.; He, J.; Zhao, M. Discrete Markov-Based Topology Control of Star-Wireless Sensor Network for Lifetime Maximization. In Proceedings of the 2023 35th Chinese Control and Decision Conference (CCDC), Yichang, China, 20–22 May 2023; pp. 4453–4459. [Google Scholar]
  60. Thammawichai, M.; Luangwilai, T. An energy-optimization topology control for three-dimensional wireless sensor networks. J. Commun. Netw. 2023, 25, 778–788. [Google Scholar] [CrossRef]
  61. He, A.; Li, S.; Bai, Y. Game theory based wsn clustering topology control algorithm for high-speed railway monitoring. In Proceedings of the 2023 IEEE International Conference on Image Processing and Computer Applications (ICIPCA), Changchun, China, 11–13 August 2023; pp. 38–41. [Google Scholar]
  62. Han, L.; Chen, X.; Leng, M.; Deng, Y.; Hao, T.; Yang, H. Research on energy consumption and identifying critical nodes of weighted scale-free topology in wireless sensor network. IEEE Access 2024, 12, 58473–58489. [Google Scholar] [CrossRef]
  63. Qirtas, M.M.; Faheem, Y.; Rehmani, M.H. Throwboxes in delay tolerant networks: A survey of placement strategies, buffering capacity, and mobility models. J. Netw. Comput. Appl. 2017, 91, 89–103. [Google Scholar] [CrossRef]
  64. Genda, K. Topology control method adopting optimal topology with minimum cumulative energy consumption over update interval in MANETs. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
  65. Van Khoa, V.; Shigeru, T. Topology Control for Wireless Sensor Network in Landslide Monitoring. In Proceedings of the 2019 58th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), Hiroshima, Japan, 10–13 September 2019; pp. 394–399. [Google Scholar] [CrossRef]
  66. Kas, M.; Appala, S.; Wang, C.; Carley, K.M.; Carley, L.R.; Tonguz, O.K. What if wireless routers were social? approaching wireless mesh networks from a social networks perspective. IEEE Wirel. Commun. 2012, 19, 36–43. [Google Scholar] [CrossRef]
  67. Meghanathan, N. Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network Graphs. In Proceedings of the 2015 12th International Conference on Information Technology-New Generations (ITNG), Las Vegas, NV, USA, 13–15 April 2015; pp. 243–248. [Google Scholar]
  68. Shifani, S.A.; Korde, V.; Vijay, S.; Shalout, I.; Indhumathi, V.; Revathi, R. Experimental Analysis of an IoT Based Secured Data Communication between Social Communities Over Wireless Sensor Network Environment. In Proceedings of the 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), Chennai, India, 12–13 December 2024; pp. 1–7. [Google Scholar]
  69. Hui, P.; Crowcroft, J.; Yoneki, E. Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. Mob. Comput. 2011, 10, 1576–1589. [Google Scholar] [CrossRef]
  70. Maccari, L.; Ghiro, L.; Guerrieri, A.; Montresor, A.; Cigno, R.L. On the distributed computation of load centrality and its application to DV routing. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 2582–2590. [Google Scholar]
  71. Maccari, L.; Ghiro, L.; Guerrieri, A.; Montresor, A.; Cigno, R.L. Exact distributed load centrality computation: Algorithms, convergence, and applications to distance vector routing. IEEE Trans. Parallel Distrib. Syst. 2020, 31, 1693–1706. [Google Scholar] [CrossRef]
  72. Maccari, L.; Cigno, R.L. Betweenness estimation in OLSR-based multi-hop networks for distributed filtering. J. Comput. Syst. Sci. 2014, 80, 670–685. [Google Scholar] [CrossRef]
  73. Jubair, A.M.; Hassan, R.; Aman, A.H.M.; Sallehudin, H.; Al-Mekhlafi, Z.G.; Mohammed, B.A.; Alsaffar, M.S. Optimization of clustering in wireless sensor networks: Techniques and protocols. Appl. Sci. 2021, 11, 11448. [Google Scholar] [CrossRef]
  74. Aschenbruck, N.; Ernst, R.; Gerhards-Padilla, E.; Schwamborn, M. BonnMotion: A mobility scenario generation and analysis tool. In Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, Malaga, Spain, 15–19 March 2010. [Google Scholar] [CrossRef]
  75. Sattar, N.S.; Arifuzzaman, S. Parallelizing Louvain Algorithm: Distributed Memory Challenges. In Proceedings of the 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 12–15 August 2018; pp. 695–701. [Google Scholar] [CrossRef]
  76. Blondel, V.D.; Guillaume, J.L.; Lambiotte, R.; Lefebvre, E. Fast unfolding of communities in large networks. Journal of Stat. Mech. Theory Exp. 2008, 2008, P10008. [Google Scholar] [CrossRef]
  77. Lu, H.; Halappanavar, M.; Kalyanaraman, A. Parallel heuristics for scalable community detection. Parallel Comput. 2015, 47, 19–37. [Google Scholar] [CrossRef]
  78. IEEE 802.11-2016; IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE: Piscataway, NJ, USA, 2016.
  79. Borgatti, S.P. Identifying sets of key players in a social network. Comput. Math. Organ. Theory 2006, 12, 21–34. [Google Scholar] [CrossRef]
  80. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii international Conference on System Sciences, Maui, HI, USA, 7 January 2000; pp. 1–10. [Google Scholar]
Figure 1. Process diagram for evaluating the topology control mechanism.
Figure 1. Process diagram for evaluating the topology control mechanism.
Electronics 14 03812 g001
Figure 2. Reduced topology and backbone generated with k most central nodes in each community method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology with k = 1 . (b) Backbone with k = 1 . (c) Reduced topology with k = 2 . (d) Backbone with k = 2 .
Figure 2. Reduced topology and backbone generated with k most central nodes in each community method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology with k = 1 . (b) Backbone with k = 1 . (c) Reduced topology with k = 2 . (d) Backbone with k = 2 .
Electronics 14 03812 g002
Figure 3. Reduced topology and backbone generated with C-A H Intra C B N method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology. (b) Backbone.
Figure 3. Reduced topology and backbone generated with C-A H Intra C B N method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology. (b) Backbone.
Electronics 14 03812 g003
Figure 4. Reduced topology and backbone generated with C-A H C B N method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology. (b) Backbone.
Figure 4. Reduced topology and backbone generated with C-A H C B N method selecting 25% most bridging nodes in SWIM model at t = 30 s. (a) Reduced topology. (b) Backbone.
Electronics 14 03812 g004
Figure 5. Results for all routers, and for 2H C B N and C-A H C B N topology control mechanisms for SWIM scenario. (a) Rate of routing management messages. (b) Total data forwardings. (c) Total number of successfully received packets. (d) Total data forwardings per successfully received packet. (e) Network efficiency in terms of PDR. (f) Nodes’ energy consumption CDF for 20 active flows.
Figure 5. Results for all routers, and for 2H C B N and C-A H C B N topology control mechanisms for SWIM scenario. (a) Rate of routing management messages. (b) Total data forwardings. (c) Total number of successfully received packets. (d) Total data forwardings per successfully received packet. (e) Network efficiency in terms of PDR. (f) Nodes’ energy consumption CDF for 20 active flows.
Electronics 14 03812 g005
Figure 6. Average rate of routing management messages as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 6. Average rate of routing management messages as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g006
Figure 7. Total data forwardings as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 7. Total data forwardings as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g007
Figure 8. Total number of successfully received data packets as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 8. Total number of successfully received data packets as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g008
Figure 9. Total data forwardings per successfully received packets as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 9. Total data forwardings per successfully received packets as a function of traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g009
Figure 10. Network efficiency in terms of PDR as a function of the traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 10. Network efficiency in terms of PDR as a function of the traffic load, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g010
Figure 11. Average rate of routing management messages as a function of the number of root stations, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 11. Average rate of routing management messages as a function of the number of root stations, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g011
Figure 12. Network efficiency in terms of PDR as a function of the number of root stations, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Figure 12. Network efficiency in terms of PDR as a function of the number of root stations, for all scenarios considered. (a) SWIM scenario. (b) SLAW scenario. (c) SMOOTH scenario. (d) Disaster Area scenario. (e) Map-based scenario. (f) RWM scenario.
Electronics 14 03812 g012
Table 1. Comparison of human mobility models relevant to WSN/WMN simulations.
Table 1. Comparison of human mobility models relevant to WSN/WMN simulations.
Mobility ModelComplexityRealism LevelKey FeaturesApplication Scenarios
Lévy Walk/TLW [34]LowModeratePower-law distributed movement steps; truncated variation simulates purposeful walksWildlife modeling, general-purpose random mobility
SWIM [35]LowHighProximity to home and popular spots; cell-based simulationUrban mobility, social interaction modeling
SLAW [36]HighVery HighSelf-similarity; mobility zones; fractal waypointsCampus, malls, theme parks, routine/irregular users
SMOOTH [37]MediumHighPopularity-based clusters; simplified SLAW behaviorOffice environments, clustered mobility
Disaster Area Model [38]MediumHighRole-specific movements; simulated emergency zonesEmergency response, disaster simulations
Map-Based SLAW [39]HighVery HighGeographical constraints; building-aware navigationRealistic urban topologies, signal propagation studies
Table 2. Results of network connectivity achieved for every proposed method in the SWIM scenario at t = 30 s.
Table 2. Results of network connectivity achieved for every proposed method in the SWIM scenario at t = 30 s.
MethodBackbone FragmentationIsolated NodesRouters Selected
k = 1 most central nodes in each community0.07411327%
k = 2 most central nodes in each community0.06671130%
C-A H Intra C B N0049%
C-A H C B N0040%
2H C B N0047%
Table 3. Results of reduced topology backbone for the proposed C-A H C B N method for all scenarios.
Table 3. Results of reduced topology backbone for the proposed C-A H C B N method for all scenarios.
Mobility ModelNumber of RoutersNumber of State ChangesAverage Number of Edges
Min.Max.Mean σ Min.Max.Mean σ All Router NodesC-A H C B NDifference
SWIM344840.282.9383523.366.14356.54232.6534.58%
SLAW314436.343.3652815.965.79541.14320.3140.77%
SMOOTH344941.432.8603212.26.65356.09245.9330.52%
Disaster Area314436.332.7364022.777.52486.65284.3141.47%
Map-based334637.663.1522613.355.34480.03267.7643.97%
RWM384942.192.5103215.787.61336.03224.1133.26%
Table 4. Average improvements with the C-A H C B N method compared to 2H C B N, for reactive mode.
Table 4. Average improvements with the C-A H C B N method compared to 2H C B N, for reactive mode.
Mobility ModelReduction in Routing MessagesReduction in Data ForwardingsIncrease in Received PacketsReduction in Forwardings per Successfully Received PacketIncrease in Network Efficiency in Terms of PDRReduction in Network Energy Consumption (20 Data Flows)
SWIM38.29%17.73%10.63%23.58%10.63%22.54%
SLAW20.55%14.23%17.25%9.96%17.25%13.93%
SMOOTH28.35%21.26%0.78%14.56%0.78%17.19%
Disaster Area19.81%10.64%−1.43%8.42%−1.43%14.69%
Map-based17.00%15.77%16.19%13.68%16.19%35.40%
RWM27.19%17.56%8.50%16.85%8.50%24.99%
Table 5. Average number of edges in topologies for 500 s simulation.
Table 5. Average number of edges in topologies for 500 s simulation.
ScenarioAll RoutersC-A H C B N
SWIM356.54232.65
SLAW541.14320.31
SMOOTH356.09245.93
Disaster Area486.65284.31
Map-based480.03267.76
RWM336.03224.11
Table 6. Average improvements with the C-A H C B N method compared to 2H C B N, for proactive mode.
Table 6. Average improvements with the C-A H C B N method compared to 2H C B N, for proactive mode.
Mobility ModelReduction in Routing
Messages
Increase in Network Efficiency
in Terms of PDR
Reduction in Energy Consumption with
3 Root Stations and 75 Active Flows
All NodesNon-Root Station Only
SWIM34.11%0.77%15.26%6.92%
SLAW3.01%1.00%2.12%1.42%
SMOOTH25.20%2.01%7.16%3.64%
Disaster Area8.61%5.76%9.16%8.66%
Map-based33.52%34.02%12.54%6.86%
RWM27.31%6.32%14.34%11.40%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Belesaca, J.D.; Vazquez-Rodas, A.; Criollo, C.R.; de la Cruz Llopis, L.J. Centrality-Based Topology Control in Routing Protocols for Wireless Sensor Networks with Community Structure. Electronics 2025, 14, 3812. https://doi.org/10.3390/electronics14193812

AMA Style

Belesaca JD, Vazquez-Rodas A, Criollo CR, de la Cruz Llopis LJ. Centrality-Based Topology Control in Routing Protocols for Wireless Sensor Networks with Community Structure. Electronics. 2025; 14(19):3812. https://doi.org/10.3390/electronics14193812

Chicago/Turabian Style

Belesaca, Juan Diego, Andres Vazquez-Rodas, Cristihan Ruben Criollo, and Luis J. de la Cruz Llopis. 2025. "Centrality-Based Topology Control in Routing Protocols for Wireless Sensor Networks with Community Structure" Electronics 14, no. 19: 3812. https://doi.org/10.3390/electronics14193812

APA Style

Belesaca, J. D., Vazquez-Rodas, A., Criollo, C. R., & de la Cruz Llopis, L. J. (2025). Centrality-Based Topology Control in Routing Protocols for Wireless Sensor Networks with Community Structure. Electronics, 14(19), 3812. https://doi.org/10.3390/electronics14193812

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop