Next Article in Journal
FPGA Acceleration of CNNs-Based Malware Traffic Classification
Previous Article in Journal
Novel Video-Laryngoscope with Wireless Image Transmission via Wi-Fi towards a Smartphone
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Optimization of Routing-Based Clustering Approaches in Wireless Sensor Network: Review and Open Research Issues

by
Asha Jerlin Manuel
1,
Ganesh Gopal Deverajan
2,
Rizwan Patan
3 and
Amir H. Gandomi
4,*
1
School of Information Technology and Engineering, Vellore Institute of Technology, Vellore 632014, India
2
School of Computing Science and Engineering, Galgotias University, Greater Noida 203201, India
3
Department of Computer Science and Engineering, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada 520007, India
4
Faculty of Engineering & Information Technology, University of Technology Sydney, Ultimo 2007, Australia
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(10), 1630; https://doi.org/10.3390/electronics9101630
Submission received: 25 August 2020 / Revised: 25 September 2020 / Accepted: 27 September 2020 / Published: 3 October 2020
(This article belongs to the Section Networks)

Abstract

:
In today’s sensor network research, numerous technologies are used for the enhancement of earlier studies that focused on cost-effectiveness in addition to time-saving and novel approaches. This survey presents complete details about those earlier models and their research gaps. In general, clustering is focused on managing the energy factors in wireless sensor networks (WSNs). In this study, we primarily concentrated on multihop routing in a clustering environment. Our study was classified according to cluster-related parameters and properties and is subdivided into three approach categories: (1) parameter-based, (2) optimization-based, and (3) methodology-based. In the entire category, several techniques were identified, and the concept, parameters, advantages, and disadvantages are elaborated. Based on this attempt, we provide useful information to the audience to be used while they investigate their research ideas and to develop a novel model in order to overcome the drawbacks that are present in the WSN-based clustering models.

1. Introduction

1.1. Wireless Sensor Networks

A wireless sensor network (WSN) network is characterized as a small-scale gathering for sensor hubs, especially for sensing, monitoring, capturing, and processing the information concerning an application. Therefore, generally, these hubs completely rely on battery backup, storage, data size, computation, and bandwidth [1]. Nowadays, WSN has become unavoidable in daily life; hence, many studies tend to focus on specific application properties [2].
Real-time applications have attracted attention among technocrats and analysts because of the recent breakthroughs in the sensor field. To overcome the difficulties in the sensor field, scientists and technologists have found an answer in the utilization of real-time WSN applications. Real-time sensors have the ability to detect, record, and send feedback immediately to the end client for future processing of all the gathered data. In particular, a real-time application addresses the presentation of basic applications that need limited delay latency. For the current situation, the real-time application involves the extensive application of WSN, which has much potential for applications in different kinds of research. The main advantage of the real-time application is its capability of screening the environment very quickly, providing an immediate response to the client, and easily controlling the outside environment. The outside environment is directly linked with the computer framework through multiple sensors, input and output gadgets, and actuators. WSN can empower the network limited delay guarantee, which is fundamental for an end-to-end packet delivery known as real-time WSN [3] as shown in Figure 1.
Events in real life can be changed into information, which can be saved, processed, and utilized for future purposes by sensor hubs in a WSN. Every sensor hub is changed in a particular manner as per their condition, for example, if the installation of a sensor node is underground, it should then have transceivers with high power transmission to block attenuation of noisy channels while on the off chance that the sensor is set in a marine situation [4]. At that point, a sensor’s external shell/encasement needs to withstand the impact of salty and damp environments and being waterproof would be another significant and advantageous component. Each change in the environment can be monitored by sensors and that information can be sent to the main server in which decision-making processes can happen in real-time. Catastrophic failures can be reduced by the sensor networks via constant and solid monitoring of the environment [5]. Hence, WSN consists completely of sensor hubs and can communicate wirelessly. Sensor node architecture is explained in the next sections [6].

1.1.1. Sensor Node Architecture

Advancements in the field of wireless communication have made improvements in WSN, such as gadgets known as sensor hubs, conceivable. Naturally in WSN, thousands of sensor nodes are utilized for the network because the lifetime of a sensor node basically relies on its battery, and these nodes are inclined to become damaged when they are circulated [7]. Sensors can be properly utilized in places in which it is difficult for a human to handle the environment. Small sensor hubs consist of three primary phases:
  • To receive the data;
  • Processing of data;
  • Data transfer through wireless communication.
Sensor hubs’ main advantages are low power, small size, sensing capacity, data transmission through wireless communication, and computation which is shown in Figure 2.

1.1.2. WSN Types

WSNs can be classified into five types depending on the situation for which the network is chosen.

Terrestrial WSN

This type of WSN has many minor hubs, which are randomly deployed in a particular region in which the communication is ad hoc.
Generally, two- or three-dimensional, grid, or optimal placement are utilized to organize these nodes. The main drawback of this type of WSN application is the impact that poor weather conditions, such as snow and rain, have on optical wireless communication interfaces.

Underground WSN

In this type of WSN, sensor hubs are placed underground for gathering data about underground conditions. The downside of a WSN is the restricted battery power, since under these types of conditions, it is extremely hard to monitor energy or changes in the environment.
The main drawback of wireless communication is the loss of signal during high potential conditions. To improve WSN reliability, productive routing algorithms are required for explaining the confinement of the WSN’s precision during the routing process [8].

Underwater WSN

Underwater WSNs (UWSNs) incorporate expensive sensor hubs for gathering data about underwater conditions; hence, these hubs can be placed directly underwater. Very poor network signals, limited bandwidths, and network delays are some of the restrictions in this type of network [9].

Mobile WSN

One of the main advantages of a mobile WSN is the automatic changing of the sensor hub’s position when the power changes in response to the environment.
These types of hubs are generally attached to the computer for communication. This type of hub can collect data from a wide range of regions or data from other hubs in the network. The primary limitations of this type of WSNs are high maintenance, low navigation, poor coverage of zones, and high accessible status [10].

Multimedia WSN

Multimedia WSN applications have modest sensors, and they can detect, compute, actuate, and communicate. Use of the WSN incorporates home observation, traffic management frameworks, and environmental checking.
These types of WSN devices are interconnected in wireless communication and are capable of recovering video and sound transmissions and scalar sensor information from the earth [11].

1.1.3. WSN-Main Prerequisites

Power Efficiency

WSN utilizes a sensor that results in low power use. The response time is exceptionally quick in view of its constraints.

Reliability

Many techniques are used for power reduction in WSN hubs, which bring about an expansion in the system’s lifetime and consistency.

Scalability

WSNs can extend this system to include hubs as required. Its extensions should be easy to manage.

Mobility

Mobility is an essential component of WSN. Since WSN is a remote system, no wire is utilized for this system. This is the reason mobility is a key component of WSN.

1.1.4. WSN-Security Vulnerabilities

WSNs are widely used for intelligent monitoring of many parameters, including vehicular actions on streets, temperature, humidity, passages and structures, water level, pressure, criminal surveillance in streets and alleyways, remote checking on numerous patients, and numerous different other applications [12,13,14]. As previously described before, each WSN organization is subject to and must be adjusted by considering the nature of the establishment.
At any rate, the main research challenge is real-time communication, which completely relies on an application, such as event-driven, nonstop, and question-driven applications. In these applications, if the data packets are beyond the cut-off, it is viewed as influencing the framework execution and quality [5,15,16].

1.1.5. WSN-IoT

Since the establishment of the IoT model, WSNs have been found to be its critical enabler. In IoT, all the sensor nodes can connect to the internet for sharing and receiving information, whereas in WSNs, there is no direct connection to the internet for the nodes. All nodes in WSN require a mediator to connect to the internet. Significant research has been done in recent years on bridging WSN into IoT. When it comes to bridging IoT and WSN there are plenty of security breaches that need to be addressed and hence there is a great scope of research in this area which has been addressed by some of the notable researchers in their papers [17,18,19].

1.2. Clustering

WSN consists of a huge number of sensors but has limited battery power. Naturally, WSN hubs can work under harsh and hazardous environmental conditions; however, the battery cannot be recharged or replaced in these situations. Hence, energy conservation is essential for the network. Generally, routing protocols have an immense effect on energy utilization in which energy utilization is considered the main consideration while designing the routing protocol [20].
Cluster-based routing protocols are known to be best in the concept of energy savings for any type of sensor in order to increase the network’s lifetime. A group of sensor hubs is generally eluded as clusters. In this group, an extraordinary hub called the cluster head (CH) and member hubs, known as ordinary nodes (ON), are used. The CH can select high energy and is utilized for data collection and transmission of other hubs to the base station (BS) [21]. In this type of protocol, the messages that pass through the system can be decreased [21,22] and the sensed data can be transmitted by sensor hubs to the corresponding CH. The BS can collect data from all of the available CHs in the network via an intermediate CH, which purely relies on the type of WSN architecture that is selected [23]. The CH sensors information after accepting the information from the cluster member; this process is accomplished in order to dispose of repetitive information so that just the outright information is transmitted. This type of transmission is done to spare energy since energy utilization is considered one of the prime factors in WSN selection [24].
Clustering techniques generally increase scalability and significantly reduce radio transmissions [25,26,27,28]. A definitive goal of clustering is to offer an answer that maintains dependability among sensors throughout the system’s activity [29].

1.2.1. Clustering—Design Challenges

In a large portion of the WSN open-air applications in some critical situations, such as those that are unattended, maintaining the battery is complicated. With this limitation, it is very difficult to extend the lifetime of the network.
Alongside the previously mentioned drawbacks, some different difficulties, which should be satisfactorily addressed while designing clustering algorithms exist, are listed below.
  • For clustering protocols, the number of clusters and formation processes are very essential. Balance among clusters is very important, and at the same time, message exchange during the formation of the clusters must be minimized.
  • The algorithm complexity increases linearly as the network develops.
  • CH selection is very important because it can directly affect the performance of the system.
  • The most ideal hub should be chosen with the goal that the system steadiness period and general network lifetime should be expanded.
  • In most of the strategies, CH choice depends on a few parameters, for example, energy level and hub location.
  • CH will receive the sensed data from the nodes on which the data aggregation process is performed. That process is the reason that these steps form the key structural challenge [27].
  • A clustering algorithm should handle all types of applications because WSNs are completely application dependent.
  • The clustering algorithm design must support defense applications in which data are highly confidential, for example, military applications and health monitoring [26]
  • Variable energy allocation becomes complicated in many of the researches.
  • While applying the clustering model in a larger network it becomes complicated and energy consumption will be gradually increased.
  • Clustering algorithms are combined with many hybrid models to improve the overall performance of the network. During that process interference of the network is also gradually increased.

1.2.2. Benefits of Clustering in WSN

  • Clustering can execute optimized management methodologies in the network.
  • From the sensor level, the topology of the network and communication overhead are managed by clusters because of hub associations with only the CHs.
  • Clustering can maintain the bandwidth for communication, and it can also prevent redundancy of exchange messages [30].
The section organization of this survey is divided into five parts. In Section 2, the earlier survey studies of clustering methodologies are discussed. In Section 3, an overview of routing protocol-based clustering models is discussed. In Section 4, a detailed discussion concerning clustering and clustering techniques in addition to the objectives, comparisons, pros and cons, and evaluation are discussed. In Section 5, the conclusion of the paper is presented.

2. Materials and Methods

There are numerous studies in WSNs addressing different subjects, for example, congestion control [31], quality-of-service (QoS) assurance [32], network lifetime maximization techniques, in-network aggregation techniques, and multiobjective optimization in addition to optimization algorithms.
A series of reviews that describe clustering, optimization, and clustering-based multihop routing protocols are presented in the following section.

2.1. Clustering-Based Routing Protocols

Rathi (2012) divided routing protocols into classical and swarm intelligence methods. At the beginning of this review, classification is described as dependent on a few factors, such as energy efficiency, path establishment, complexity in computation, and the structure of the network, among others. At that point, a grouping consisting of five general classes was introduced. For every one of the classic and swarm intelligence techniques, four classes were then introduced: (1) quality-of-service (QoS) awareness, (2) hierarchical, (3) data-centric, and (4) flow of network. At last, every classification was examined and discussed based on a few parameters, such as aggregation of data, location, and energy efficiency. Moreover, standard measurements were then introduced for the simulation [33].
Rostami (2018) contrasted different homogeneous and heterogeneous networks. This overview presented the difficulties of each analyzed protocol and contrasted them based on some clustering parameters, such as CH numbers, cluster counts and objects, complexity, and intercluster communication. When compared with homogeneous networks, the heterogeneous systems appear to provide better performance because they select the CH having high power, while in homogeneous systems, all hubs have an even operational and processing capability [34].
Abbasi (2007) presented the first overview and assessment of clustering protocols in WSNs. This overview contains two major categories, namely, convergence time and clustering attributes. Convergence time has variable and fixed parts, whereas clustering attributes have clustering-related properties and processes. After summing up the strategies and their significant objectives, as indicated by the proposed order, the techniques were assessed through parameters, such as cluster overlap and stability, rate of convergence, mobility of nodes, and location awareness [35].
Fanian (2016) introduced a study about techniques that were created according to the low-adaptive clustering hierarchy (LEACH) protocol. This survey depended solely on LEACH-based techniques, which were assessed in terms of balanced clustering, failure recovery, and the original LEACH. Comparisons were made with respect to clustering properties and processes and CH possibilities. At last, these factors were classified with respect to highlights, such as breakdown retrieval capabilities, multilevels, and configurations [36].
A review by Akkaya (2005) surveyed recent routing protocols and discovered classifications for different methods. Based on this survey, three main categorizations, namely location-based, hierarchical, and data-centric were defined. Every routing protocol was depicted and described under a suitable classification. In addition, protocols utilizing contemporary procedures, for example, QoS modeling and network flow, were additionally discussed [37].
Sha (2013) assigned a multipath routing protocol to WSNs, which are mainly infrastructure- and non-infrastructure-based networks. Each and every classification was studied and analyzed. At last, the methods in every classification were contrasted with respect to time for route setup, lifetime, efficiency, load balancing, and reliability [38].
In 2014, Afsar described an architectural perspective of survey clustering-based routing protocols. In the initial stage, clustering characteristics were explained, and after that, categorization of routing protocols was performed. Clustering techniques are generally classified into two categories, namely, equal and unequal sized clustering algorithms. Depending on their objectives, the clustering technique summary was then prepared and presented in this review. Finally, a comparison with respect to clustering features, such as algorithm complexity, cluster count and size, and mobility, is provided [39].
Riaz (2018) studied and presented an overview of clustering algorithms in which it is demonstrated that the major input parameters are initial energy, node degree, and density. During the CH selection process, the CH node should utilize minimum energy from the total energy consumption. Few of these protocols lead to the development of variable cluster sizes and counts, and sometimes, these protocols create a gap that is very close to the base station (BS) and consumes more energy during communication since the hubs take a longer path to arrive at the BS [40].
Pantazis (2013) focused on energy-efficient protocols and introduced a review of routing protocols that classifies the techniques into three general classes: (1) reliable routing, (2) communication model, and (3) topology model. Every technique presented in this overview is discussed based on advantages and disadvantages, robustness, route metric, scalability, periodic message, and mobility [41].
In a review by Ramesh (2011), various clustering methodologies were categorized and described and special attention to their CH selection procedures was emphasized. These methodologies were then contrasted with the necessity of clustering during each round for CH selection, appropriation of group heads over the system, cluster development required after every revolution of CH, balanced cluster creation, and parameters utilized and help highlight the importance of the CH determination technique on the presentation of these plans. The parameter utilization for this correlation was legitimized by thinking about the impacts of CH selection and its role in network energy efficiency [42].
Singh (2015) examined the advantages and impediments of cluster-based routing protocols using various methodologies. In this review, these techniques were classified based on block, grid, and chain. At last, methods were assessed in terms of cluster stability, scalability, energy efficiency, and delivery delay [43].
Arjunan (2019) introduced a study addressing unequal clustering techniques. These techniques were ordered into three main classes: (1) deterministic, (2) pre-set, and (3) probabilistic clustering algorithms. The presented protocols were described by characterization, targets, attributes, demerits, and merits. Deterministic algorithms were utilized for robust and reliable applications. A heuristic methodology was chosen in cases in which an optimal solution was needed for a specific environment. All mentioned protocols are contrasted with respect to cluster and CH properties [44].
Dehghani (2015) assessed clustering algorithms for energy saving. Every algorithm is described in detail and its advantages and disadvantages were thoroughly examined [45].
In a 2018 review by Sharma, heterogeneous routing algorithms were discussed. This survey describes four general heterogeneity-based classifications (1) computational, (2) energy, (3) link, and (4) different. Hub heterogeneity levels, CH selection, and sink position were the parameters selected for the comparative analysis of routing algorithms [46].
Liu (2012) introduced a study on network routing protocols and sketched out the advantages and goals of clustering techniques. This survey classified clustering attributes into four main classes: (1) cluster qualities, (2) CH attributes, (3) total proceedings of the protocol, and (4) clustering process. Regarding objectives and capabilities, the clustering method summary is presented. At last, the strategies dependent on the parameters that were adopted for every one of the four classifications and different parameters; for example, the stability of the cluster, scalability, and load balancing were compared [47].
Kaur (2017) examined a few clustering strategies that were previously investigated and referenced by considering in which circumstances these protocols would be suitable for use and in which cases productive outcomes would not be achieved. Some of these strategies were viewed based on distinctive clustering parameters, such as cluster development prerequisites, separation of detecting hubs from the BS, and threshold and residual energy in addition to computation of the ideal number of CHs [48].
In a review by Suhail (2017), general classification and scientific categorization of distributed clustering protocols were prepared. This overview additionally analyzed the bunching plans dependent on the stability and overlapping of the cluster, node location, and mobility [49].
Radha (2015) discussed different clustering techniques, for example, centralized, hybrid, and distributed techniques. This discussion could help researchers introduce a novel clustering algorithm that would be mainly focused on improving network lifetime and power factors [50].
Mitra (2012) analyzed the present condition of proposed clustering protocols with emphasis on their capacity and dependability necessities. In WSN, the energy constraints of hubs play a very crucial role in protocol design and implementation. Likewise, QoS measurements, for example, data loss tolerance, delay, and system lifetime uncover dependability issues when structuring recuperation components for clustering schemes. These significant attributes are frequently restricted as one regularly and negatively can affect the other [51].
Santhiya (2013) reviewed WSNs energy-efficient clustering algorithms. The “load-balanced clustering algorithm” was introduced for the balanced energy of clusters in both uniform and nonuniform distributions. Secure communication in clusters is very essential because if the clusters misbehave or are compromised, the entire network link then fails. To overcome this issue, cluster-based certificate disavowal for enrolling and evacuating hub authentications is recognized for dispatching attacks on the area. This process prevents the energy of sensor hubs from becoming exhausted in WSN and shields the sensor hubs from harmful attacks [52].
Dawood (2014) examined the scope of WSN clustering protocols. Moreover, this review subdivided the job of a clustering protocol to improve WSN exhibition. The review also examined the significance of improved QoS energy-based clustering protocols to maximize the battery power of WSN [53].
Kaur discussed different difficulties related to clustering and various strategies or procedures created to overcome these difficulties [54].
In 2014, Kumar reviewed various distinctive leveled clustering WSN algorithms from an energy efficiency perspective and furthermore, described the major ideas of clustering and its characteristics, focal points, impediments of clustering, and different clustering algorithms in its scientific categorization. This overview additionally presents relevant open issues and difficulties in progressive directing or clustering [55].

2.2. Optimization-Based Clustering Mechanisms

Several optimization-based clustering algorithms were developed in earlier days such as ant colony optimization (ACO), artificial bee colony optimization (ABCO), fuzzy logic (FL), genetic algorithm (GA), whale algorithm, particle swarm optimization (PSO), and so on.
Nayyar and Singh (2017) introduced an exhaustive review of ant colony optimization (ACO) for WSNs. This effort reviewed QoS parameters, such as energy utilization, bandwidth, delay, reliability, and data aggregation. Favorable circumstances and hindrances of ACO-based routing protocols for a WEN were further examined [56]. The major advantages of this process are that it can reduce energy consumption and will increase the bandwidth and message success ratio. The disadvantage is that it can increase the network delay.
Gambhir (2018) tried an “artificial bee colony optimization” (ABCO)-based LEACH algorithm with respect to assorted WSN situations by changing the number of rounds and corresponding number of sensor hubs. Many parameters, for example, dead and live hubs per round and packet to the BS per round were considered for execution assessment. Examination of every parameter starting with an ordinary LEACH was also introduced [57]. The major advantages of this process are that it can reduce energy consumption. The disadvantage is that it can increase the interference of the network.
In a review by Sambo (2019), a wide survey of the ongoing progressive methods dependent on computational intelligence (CI) or machine learning (ML) were examined. To accomplish this task, the calculations were grouped for different CL uses, which could be fuzzy logic (FL), genetic algorithm (GA), neural network (NN), reinforcement learning (RL), or swarm intelligence (SI). To assess and analyze these uses, several parameters, such as data aggregation, data delivery rate, and scalability, were selected [58]. The major advantages are that this method helps to increase the network lifetime and the quality of service of the network. Due to the combination of the hybrid model, it can increase the interference of the network.
Wang proposed a whale algorithm-based optimization model for WSN. The mathematical model of hub inclusion in WSN was created to accomplish full inclusion for an area of interest. For the model, switch learning is brought into the first whale swarm streamlining calculation to upgrade the underlying appropriation of the population. This strategy leads to an upgrade in hub searchability and accelerates the global search. The outcome of this work showed that this algorithm could viably improve the inclusion of hubs in WSN and enhance system execution [59]. The major compensation of this process is that it increases the energy efficiency of the network. The disadvantage is that it can increase the network’s end-to-end delay.
Hemalatha (2015) surveyed WSNs optimization techniques. This paper analyzed significant research issues regarding the optimization of energy and requirements for WSN optimization. This paper examined steering difficulties and requirements for WSN improvement. All the available optimization techniques are clearly discussed with their advantages and disadvantages [60]. All the available optimization techniques are clearly discussed with their advantages and disadvantages. The most common advantages and disadvantage of the network is that it increases the network lifetime and optimization-based models lead to an increase in the latency of the network.
In a review by Kaur (2015), a top to bottom investigation about power utilization was introduced. This work surveyed many significant methods for conserving power in WSNs. Emphasis was given to artificial intelligence (AI)-based power optimization methods including FL, NN, clustering, and network-based strategies [61]. The major advantage of the model is it can increase the accuracy of the network. The drawback is that it can reduce the precision of the network.
Parwekar’s (2018) study addressed difficult issues, such as node maintenance and localization and clustering among others. The fundamental point of optimization strategies is to give the inside solution enough time and furthermore to limit energy utilization along these lines by drawing out the lifetime of the system. This study obviously depicts the utilization of distinctive distributed optimization methods in the field of WSN [62]. The major advantages are that this method helps to increase the network lifetime and the quality of service of the network. Due to the combination of the hybrid model, it can increase the interference of the network.
In 2016, more introduced an energy optimization design by optimizing the system hubs working mode.to optimize the stages of WSN; this study stressed the use of the particle swarm optimization (PSO) technique. When compared to GA, PSO internally utilizes candidate answers to get a feasible answer to get reinforced molecules out of all multitude molecule change streamlined WSN. The PSO calculation is the most helpful strategy to advance the stages for example network coverage, hub position, grouping, and routing and data aggregation [63]. The major advantages of this process are that it can reduce energy consumption and will increase the bandwidth and message success ratio. The disadvantage is that it can increase the network delay.
A review by Sneha, Swathi (2016) examined various optimization methods, such as particle swarm optimization (PSO), artificial bee colony (ABC), ACO, and GA. These methods are used to improve the performances of various parameters, for example, reduced power consumption, optimal path, and target coverage. ACO and ABC yield high achievement rates and longer system lifetimes, especially for a fundamental system but for a thick system, they do not perform well [64,65]. The major advantages are that this method helps to increase the network lifetime and the quality of service of the network. Due to the combination of the hybrid model, it can increase the interference of the network.
Mangat (2012) presented a review on a PSO-based clustering investigation. The fundamental purpose behind picking the PSO technique for clustering is the small number of parameters that should be modified. Single form, with slight varieties, functions admirably in a wide assortment of uses. PSO has been utilized for approaches that can be utilized over a wide scope of uses, for example, image segmentation, design of the system, clustering of web usage data, signal processing, pattern recognition, classification, and multiobjective optimization. The hybridization of PSO with other transformative calculations, such as GA and differential evolution (DE) has been a powerful tool for improving PSO proficiency and precision [66]. The major advantage of the model is it can increase the accuracy of the network. The drawback is that it can reduce the precision of the network.

3. Cluster-Based Routing Protocol Classification—Overview

In this section, clustering is subdivided into three different categories: (1) parameter-based, (2) optimization-based, and (3) methodology-based clustering. First, parameter-based clustering is subdivided into two major classifications, including clustering-based both on primary and secondary parameters. Second, optimization-based clustering is subdivided into classical and hybrid optimization approaches. Finally, methodology-based clustering is subdivided into fuzzy-based and metaheuristic methods as given in Figure 3. All these classifications are thoroughly explained in Section 4.

3.1. Parameter-Based Clustering

3.1.1. Clustering Based on Primary Parameters

The major primary parameters consist of general objectives and clustering strategies for head selection. The major subsections consist of objectives.

Strategy for CH Selection

A short description is given to illustrate the general method for choosing a cluster head based on various strategies, such as those that benefit the crowd. This segment presents noteworthy ways to address the CH choice from the previously mentioned strategies. It is depicted in Figure 4.

Objective

Calculated different directing in addition to techniques containing numerous goals, for example, data aggregation, fault tolerance, scalability, network stability, node connectivity, load balancing, collision avoidance, network coverage, and network lifetime among others are some of the primary goals of calculated different directing. The remainder of the goals are considered optional and are set to help accomplish the principal targets. Optional destinations are of less significance [36].

3.1.2. Clustering Based on Secondary Parameters

In this section, secondary parameters are discussed briefly. The developed clustering model has several features and characteristics. The Figure 5 shows the details about those clustering methods.

Types of Node

Homogeneous and heterogeneous nodes are available for algorithms. CHs are generally chosen from heterogeneous sensor hubs if calculations utilize such hubs.

Cluster Size

Cluster size can be controlled or uncontrolled. This model is used to examine a technique to determine whether the creators focused on controlling cluster size. In general, the coverage area of the cluster is fixed according to the distance from the BS. Clustering algorithm density decides the cluster size for the determination of a range of clusters [41].

Mobility of Nodes

CH and normal nodes may have motion or be motionless. If a motion is available, it would be over a limited range.

Intercluster Communication

CHs and BS can be directly connected by either a one-hop or also by a multihop connection.

Intracluster Communication

Generally, in intracluster communication multihop transmission is employed. That choice is the smarter one for using multihop intracultural communication in which there are few CHs when part hubs are a long way from CHs or when there are more limitations on sensors. Consequently, the parameters were viewed as having the possibility that a single-hop or multinumber of hops could be used for assessment measures [40].

Rotating of the CH

This rule decides if a technique to utilize a system will supplant the hubs and assume the job of a CH. In specific techniques, CHs are occasionally supplanted. In some different techniques, they are supplanted after a predetermined timeframe or when the CH energy level reaches the predetermined limit. With the help of the energy threshold system, this technique, for the most part, attempts to bring system energy utilization together.

Methods

The clustering technique may be centralized or distributed but involves a centralized or hybrid distribution in some strategies.

3.2. Optimization-Based Clustering

Optimization-based clustering is classified into classical and hybrid optimization approaches.

3.2.1. Classical Optimization Approaches

The essential factors for classical optimization approaches are parameters from earlier developed models, including their limitations, utilizations, capabilities, and simulation environments are shown in Figure 6.

3.2.2. Hybrid Optimization Approaches

Fuzzy- and metaheuristic-based methods which is shown in Figure 7 are the major segments of hybrid optimization approaches. The considered elements introduced for attribute inspection of the two strategies consist of capabilities, drawbacks, input and output factors of fuzzy logic, rule evaluation, and setting method, defuzzification, and fuzzy logic utility.

3.3. Methodology-Based Clustering

In this section, methodology-based clustering consists of two sections, namely, fuzzy- and metaheuristic-based approaches. The figure provides the factors for both the fuzzy and metaheuristic algorithms.

3.3.1. Fuzzy-Based Approaches

This section provides factors that are used by the fuzzy-based approaches and it is shown in Figure 8. To portray each attribute of a fuzzy system, a few factors are considered in reviewed protocols, such as the principle of FL, capacities, fuzzy input and output factors, rule evaluation, capabilities, and limitations.

3.3.2. Metaheuristic-Based Approaches

This section examines the elements measured in metaheuristic-based methodologies that are introduced in this section and shown in Figure 9 for explaining the procedures, such as capabilities, constraints, factors concentrated in the protocols addressing ways to develop optimization algorithms, processes, reasons, and simulation environment, used in the earlier developed works.

4. Classification of Cluster-Based Routing Protocols

The choice of clustering method is very important for the WSN in order to fulfill its requirements, such as power utilization and reduction in energy consumption. Numerous strategies and calculations have been introduced for this reason in different classifications as mentioned in previous sections.
This section explains all the described classifications in Section 3.

4.1. Parameter-Based Clustering

This section is divided into the primary parameter- and secondary parameter-based clustering, which is explained in the next sections and is shown in Figure 10.

4.1.1. Clustering-Based Primary Parameters

SHPER: Scalable Hierarchical Power-Efficient Routing

Kandris (2011) introduced a new routing methodology known as scalable hierarchical power-efficient routing (SHPER), and perceived QoS-aware video routing (PEMuR) is a combination of video scheduling and energy-aware hierarchical routing mechanisms. Generally, based on the residual energy, CH is selected during the initial phases. There are two levels of CH, namely, lower- and upper-level CHs. Lower-level CH is far away from the BS, whereas upper-level CHs are close to the BS. From the residual and required energy, the routing index can be derived to transmit the information among sequential CHs [67].

HHRP: Heterogeneous Hierarchical Routing Protocol

Kim (2011) proposed a heterogeneous hierarchical structure that utilizes control and delivery paths between the BS and sensing hub. Multimedia data are generally transmitted via a delivery path between the sensing hub and BS with the help of a relay hub. Relay hubs are generally dependent on bandwidth, distance, and residual energy. A single relay hub for the delivery path can prevent congestion in the network. However, command paths can easily overlap with the relay hubs due to small data when compared with the actual data. Security keys are also used in this protocol to fight against attackers. While establishing the delivery path, recovery steps and isolation influences affect existing delivery paths, which basically increment intricacy and time [68].

EEQAHR: Energy-Efficient QoS Assurance Hierarchical Routing

In 2011, Lin introduced energy-efficient QoS assurance hierarchical routing (EEQAHR) for WMSNs. In this method, the relay hub is chosen based on the data correlation coefficient, residual energy, trust value, and hop count of a hub neighboring CH. The above-mentioned factors are stored by every node for the optimization factor table. A data correlation coefficient is used for combining information in order to diminish the measure of information transmission. The idea of a trust value metric can be obtained from an informal community investigation in which trust esteem is evaluated by checking legitimacy or by the implication of present and past conduct of neighboring hubs. After each round, the cluster structure is changed by offering portability to the CH, which maintains a strategic distance from producing system gaps and equalizing energy utilization. The proposed method prolongs the network lifetime; however, its reliance on high transmission power level may cause an obstruction in the nearby hubs [69].

4.1.2. Clustering-Based Secondary Parameters

This section describes secondary parameters and it’s shown in Figure 11.

Cluster-Based Routing Protocols for Energy Efficiency (CBRPEE)

Maimour (2014) presented another characteristic of a clustering procedure from the perspective of the data routing procedure. Node energy consumption management is very essential for maximizing the overall network lifetime. Load balancing techniques and global management systems are needed for prolonging the lifetime of the WSN. Clustering methodologies need to provide optimal traffic distribution in addition to low overhead CH rotation among all CHs, and the selected method should maintain network coverage and connectivity. Unequal clustering, in which intra- and intercluster communications (IICC) are known to be exceptionally encouraging, can occur. Be that as it may, viable methods should be created to manufacture such clusters without information on global network topology. For significant clustering, estimation of optimal parameters is highly essential; however, it is not a simple task in WSN because of its constraints [70].

IICC: Intra- and Intercluster Communication IICC

In a study by Goyal (2016), the use of IICC for underwater WSN (UWSN) to aggregate the data was proposed. This framework provides an ideal choice for CH in which optimal IICC depends on multipath and energy. The proposed work efficiently increases the system performance by improving the results of the following parameters, such as packet delivery ratio, energy efficiency, and delay; hence, the method is adaptive for many systems [71].

TSEENP: Threshold Sensitive Energy-Efficient Network Protocol

Samant (2017) presented a cluster reactive protocol known as the threshold sensitive energy-efficient network protocol (TSEENP), which is especially intended for critical application of time. As various hubs are required for cooperative communication, this protocol could be utilized for cluster formation. To examine the low-energy path for the clusters and hubs, vector quantization (VQ) is used. For primary issues of intra- and interclass communication, the TSEENP and TSEEN Vector Quantization Protocol (VQP) can be used, respectively [72].

4.2. Optimization-Based Clustering

This section is divided into classical and hybrid optimization approaches, which are explained below and shown in Figure 12.

4.2.1. Classical Approaches

Classical approaches mainly concentrate on CH selection. Some of the methods are discussed and analyzed and it’s given in Table 1.

LEACH: Low-Energy Adaptive Clustering Hierarchy

LEACH is known to be the first dynamic protocol and considers WSN requirements. This method generally utilizes randomly distributed motionless sensor nodes and is known to be a basic protocol for other advanced clustering protocols. LEACH is a distributed, hierarchical, one-hop, probabilistic protocol. In 2007, Zhixiang presented a protocol called TL-LEACH that consists of three useful stages namely, cluster head selection, settings, and data transfer. In the CH determination stage, the main level CHs are chosen randomly based on the threshold value,
R ( i )   =   { ( q + 1 ) × m o d ( 1 s ) × s i f   i G 0 o t h e r w i s e
In which
  • s →Expected percentage of CH nodes in the population of sensors;
  • q →Current round number;
  • G→Group of hubs which never transform into CHs in the last 1/s adjusts (turns).
At that point, the second-level CHs are chosen from the principal level CHs depending on energy. Initially, non-CH hubs become individuals from the principal level CHs. Next, the main level CHs become individuals from the second-level CHs in a process that is dependent on a brief separation. At long last, non-CH hubs transmit data to the principal level CHs during the data transfer phase. At that point, the principal level CHs transmit the aggregated information to the second-level CHs, which generally transmit the information to a BS [73].
In 2008, Hong introduced the concept of T-LEACH which is mainly based on the threshold values for cluster head selection and reallocation of the CH. T-LEACH aims to reduce the CH replacement count by using the residual energy of the network. The results improved energy efficiency when compared with earlier models. This protocol performs better than the general LEACH protocol [74].
Bagherzadeh (2009) introduced a density of sensor (DS)-LEACH protocol, which has setup and steady-state phases. The main functions of the setup phase are to introduce CH based on the density of hubs, scheduling based on time-division multiple access (TDMA), set-up the cluster, and show advertisements. This protocol mainly calculates the probability of becoming a CH. In the second phase, each hub that is not transformed into a cluster head chooses which cluster it should join and relies upon most received signal power. If the node is selected as a cluster head, the membership message is then sent to that cluster head. The remaining steps are like the LEACH protocol [75].
Jia (2010) presented the low-energy adaptive clustering hierarchy energy protocol (LEACH-EP). In this method, which is based on node energy, the CH can be selected for every node as done in the LEACH protocol. The main difference between the LEACH and LEACH-EP protocols is the threshold energy, which can be calculated with the help of residual energy in the current round, whereas average energy can be calculated in the previous round [76].
A study by Kang (2012) presented the low-energy adaptive clustering hierarchy with distance-based threshold (LEACH-DT) protocols for CH selection. In this protocol, the distance among CH and BS can decide the probability of the hub to become a CH or not. The LEACH-DT is like the LEACH protocol, but the distinction lies in the great level of the number of CHs(pi) as determined by the formula shown below:
R ( i ,   q )   =   { s 1 s × ( q   m o d ( 1 p 1 ) ) G i ( q ) = 0 0 G i ( q ) = 1
In which
  • G i ( q ) →Binary to confirm CH only once for all 1 s i of the rounds.
Equation (2) shows that CHs are selected by a distributed randomized function. Time is divided into rounds denoted as q . In every round q, the node i elects itself to become CH using the probability function given in Equation (2).
S i   =   k ( ε i / ( i = 1 N ε i ) )   ( 0 s i ) 1
ε i   =   ( 1 E C H ) × ( d i ) E n o n C H
In which
  • d i →Distance among hubs and BS;
  • E C H and E n o n C H →Residual energy of CH and non-CH nodes.
Equations (3) and (4) explain the energy consumption and Si provides balanced energy consumption, respectively. The balanced equation for the expected energy expense can be constructed using Equations (3) and (4).
This protocol uses direct and multihop transfers to send a message from the CH to the BS [77].
Wang (2012) presented a protocol called LEACH with a sliding window dynamic number (LEACH-SWDN) consisting of setup and steady-state phases. Initially, in the setup phase, each hub starts its current round in order to select the random number before the process from the sliding window is refreshed. This number cannot be chosen between 0 and 1 as it is expected to be dynamic. With respect to the performance of the network, the number may change. In the second phase, this protocol works as the same found in the LEACH protocol. Once the data is collected by the BS, the average energy calculation of each node is performed by the BS. This process is also used to increase energy efficiency in a significant way [78].
Amodu (2018) improved the LEACH protocol to produce an effective CH replacement method, which uses dual transmission power levels in order to amplify the transmitted signals. In this situation, when a hub turns into a CH, it uses high force enhancement, and when it is a non-CH hub, it uses low force intensification. This method utilizes the CH exchanging component that is dependent on the limit with the goal that the CH will continue to work well and not vary when the CH energy is higher than the threshold value. In any case, another CH is chosen, and the bunches are reshaped [79].

Maximum Energy Cluster Head (MECH)

Chang proposed a routing protocol called the maximum energy cluster head (MECH). This protocol has properties of a hierarchical tree and self-configuration. It improves the LEACH protocol from a few perspectives. MECH generally forms clusters that are dependent on the node count of the cluster child and coverage area. This protocol has a randomly distributed topology in addition to a hierarchical routing model for reducing the distance between the BS and CH [80].

Power-Efficient Clustering Routing Protocol (PECRP)

The author Liu proposed the power-efficient clustering routing (PECRP) protocol, which is utilized for significant distances and complicated data transfer for static hub-based networks. This protocol is the improved version of the LEACH protocol and is mainly used for CH selection. The system is based on multihop transmission with a combination of the circle domino effect. The major advantage of this model is the reduction in network delay that results in the maximization of the network’s lifetime [81].

Energy-Efficient Heterogeneous Clustering (EEHC)

Kumar (2009) presented the energy-efficient heterogeneous clustering (EEHC) protocol, which is subdivided into three hub forms: (1) ordinary, (2) propelled, and (3) super hubs. This convention incorporates two stages. In the setup stage, each progression looks precisely like those of the LEACH protocol. The main distinction is the use of three hub forms with three diverse energy levels. For CH selection, a weighted probability is used for the underlying energy of the hubs in contrast to the other protocols. This weight should be equivalent to the proportion of each hub’s initial energy to the underlying energy of ordinary hubs. The threshold value is also used for CH selection [82].

Flow-Balanced Routing (FBR)

A study by Tao (2013) introduced the flow-balanced routing (FBR) protocol to accomplish both coverage preservation and power efficiency for multihop WSNs. These protocols use four main algorithms: (1) rerouting, (2) multihop backbone construction, (3) network clustering, and (4) flow-balanced transmission. Sensors hubs are chosen to form clusters without any sensor overlap in the available network with the help of clustering algorithms. Multilevel backbone construction is done via a backbone clustering algorithm using sinks and CH although it may not be a tree. To normalize energy consumption, data are transferred via the multipath hop from the sensor hub to the sink using the FBR algorithm. Finally, this protocol is assessed by two matrices, known as network and coverage lifetime. The FBR protocol outperforms in both matrices when compared with other protocols [83].

Energy-Efficient Routing Algorithm (EERA)

Yin presented a novel approach, namely, the energy-efficient routing algorithm (EERA) that mainly focuses on expanding the network lifetime. The protocol has several subsections: (1) greedy algorithm for packet forwarding, (2) intracluster, and (3) an intracluster algorithm. These concepts are extremely applicable to high-density-based networks. By using this model consumption of energy during the data transfer between the source to the destination, energy consumption is greatly reduced, and the network’s overall performance is improved [84].

Layered Clustering Routing Protocol with Overlapping Cluster Heads (LCRPOCH)

In a study by Agrawal, a novel method called layered clustering routing protocol with overlapping cluster heads (LCRPOCH) with five stages was developed. In the first stage, sensors with a unique identification (ID) are distributed. In the second stage, the whole network can be split into constant cluster sizes. CH evaluation is done, and it forms layers in the third stage. The CH node can be selected based on the density and proximity of hubs. The next stage assesses and allocates CH overlapping. In the last stage, information is transferred to BS via CH in addition to CH overlap [85].

Low-Energy Fixed Clustering Algorithm (LEFCA)

Cengiz (2015) introduced a protocol called the low-energy fixed clustering algorithm (LEFCA). In this protocol, the clusters are constructed in the setup phase itself. Sensor hubs in the cluster will remain the same for the entire transmission. This protocol generally uses the clustering methodology by apportioning the hubs into fixed clusters. CH gathers all the information from the child node, which will then transmit to the BS. The main point to be noted in this protocol is to decide whether the CH will remain as a CH after completion of data transfer; this process is decided by the CH residual energy [86].

Hamilton Energy-Efficient Routing Protocol (HEER)

A study by Yi (2016) introduced the Hamilton energy-efficient routing (HEER) protocol with the idea of a Hamiltonian path. This protocol uses data aggregation that can be sent through a Hamiltonian path formed by whole CHs, and the protocol controls the size of the cluster by choosing CH hubs. For the first round only, the cluster can be created. For different rounds, CH cannot be changed; instead, the CH roles may change based on energy in the Hamiltonian path after a predetermined time period [87].

Hierarchical Distributed Management Clustering (HDMC)

In 2016, Shahraki presented the Hierarchical Distributed Management Clustering (HDMC) protocol for energy efficiency enhancement, coverage area lengthening, and fair distribution of energy consumption between nodes. Previous node records and current resources are used for CH selection. Bethatasit may, since a hub does not recognize neighboring hubs and their aim is to turn into a CH, a novel authority section is appointed for CH selection. This section helps the network select the CH based on earlier rounds and hubs in its degree to transmit its inclination data [88].

Energy-Aware Multihop Routing (EAMR)

Cengiz (2017) introduced a protocol called the Energy-Aware Multihop Routing (EAMR) protocol. In the setup phase of this protocol the CHs, their individuals, and there-distributor hubs are allotted so that from the outset every hub can randomly pick itself as a CH. Those distributor hubs are selected by the CH hub, so basically it will select the neighbor CH hub as its redistributor hub. This stage is performed just a single time toward the start of the EAMR. In the steady-state phase, the major processes are the transmission of the gathered information, CH reallocation, and redistributor hub selection [89].

4.2.2. Hybrid Optimization Methodologies

Hybrid optimization methodologies are a combination of fuzzy logic and metaheuristic algorithms. Recently developed approaches for these hybrid optimization techniques are described below and shown in Figure 12.

Fuzzy and Ant Colony Optimization-Based Combined MAC, Routing, and Unequal Clustering Cross-Layer Protocol for WSNs (FAMACROW)

Gajjar introduced a protocol, called the fuzzy an ant-colony-optimization-based combine media access control (MAC), routing, and unequal cross-layer protocol for WSNs (FAMACROW), for layering network nodes. This protocol has CH selection, clustering, and intercluster routing. CH inputs are residual energy, quality of communication, and neighboring hub count. As needed, each hub executes a feature info service (FIS) and calculates fuzzy yield by the name of Proficiency. The hub with the most noteworthy capability will turn into a CH in the assigned space. To prevent hot spot problems, unequal clustering is utilized in this protocol. This convention profits from ACO for data directing among groups and transmission to the BS [90].

Swarm-Intelligence-Based Fuzzy Routing Protocol (SIF)

Zahedi introduced a sensor intelligence routing (SIR) protocol based on the fuzzy-c-mean (FCM) protocol. FIS is used to select CH based on fuzzy parameters, such as distance from the BS, residual energy, and distance from the center of gravity in addition to the fuzzy outputs. In this convention, Mamdani’s standards FIS table is advanced before beginning the system tasks by consolidating the Firefly Algorithm (FA) and the SA calculations dependent on a target work that has been characterized for application [91].

Centralized Cluster-Based Routing Protocol Based on Sugeno Fuzzy Inference System (LEACH-SF)

Shokouhifar provided a centralized cluster-based routing protocol based on Sugeno Fuzzy Inference System (LEACH-SF) protocol for WSN. FCM is utilized for balanced cluster formation in order to select an appropriate cluster Sugeno fuzzy system. Sugeno fuzzy systems use local sensor information. Since tuning the fuzzy standards inside the framework is the most significant issue, it has a key role in the activity of LEACH-SF. ACO is used to upgrade the Sugeno fuzzy principles. The improvement method should be performed once before the LEACH-SF is put into action. Reproduction results showed that LEACH-SF can proficiently frame balance groups and augment organized lifetime. The proposed clustering method was intended for the systems with fixed sensor hubs. The main distinction is that LEACH-SF profits by the Sugeno-type FIS rather than Mamdani’s derivation strategy in SIF. What is more, the artificial bee colony (ABC) calculation was used to advance the Sugeno-type fuzzy principles table [92].

Fuzzy Shuffled Frog-Leaping Algorithm (FSFLA)

Fanian presented a fuzzy shuffled frog-leaping (FSFLA) algorithm, which uses a shuffled frog-leaping algorithm (SFLA) to streamline the Mamdani fuzzy standard-dependent application. This protocol uses four inputs for the fuzzy frameworks: (1) node histories, (2) neighboring node count, (3) remaining energy, and (4) distance from BS. The capacity of hubs to be selected as CHs is resolved after considering a trade-off between the significant parameters about hub conditions and their upgraded fuzzy standards. This protocol uses two specified thresholds to choose an applicant hub as a CH. The convention can be balanced by the application as a result of having two decided thresholds for turning up-and-comer hubs to the last CHs [93].

4.3. Methodology-Based Clustering

This section is divided into fuzzy- and metaheuristic-based methodologies, which are explained below and are shown in Figure 13.

4.3.1. Fuzzy-Based Approaches

Due to uncertain incidents occurring in the WSN environments and overlapping parameters affecting the roles of CHs, many protocols use fuzzy logic for clustering and selecting appropriate CHs. A number of these algorithms are discussed here.

LEACH Protocol Using Fuzzy Logic (LEACH-FL)

Ran (2010) presented the LEACH protocol using FL (LEACH-FL). In this protocol, CH selection is done with the help of fuzzy logic. This protocol is known to be an improved adaptation of the LEACH protocol with respect to info factors of the fuzzy BS distance, residual energy, and node probability to become CH. This convention uses a dispersed clustering procedure, and choosing CHs depends on fuzzy yields similar to LEACH. One-hop communication is used to transfer the data from CH to BS [94].

Energy-Aware Unequal Clustering Algorithm with Fuzzy (EAUCF)

In 2013, Bagci introduced an energy-aware unequal clustering algorithm with fuzzy (EAUCF), which addresses the hot spot issue. The EAUCF protocol diminishes the intragroup work of the CH that is either near the BS or has low residual battery power. A fuzzy logic approach was adopted to deal with vulnerabilities in CH range estimation. Results show that EAUCF performs better than different calculations with respect to the first hub biting the dust, half of the hubs being alive, and energy productivity measurements in all situations. Hence, EAUCF is a stable and energy proficient clustering algorithm to be used in any WSN application [95].

Multiobjective Fuzzy Clustering Algorithm (MOFCA)

Sert (2015) proposed the multiobjective fuzzy clustering algorithm (MOFCA) which is not just for energy proficient but is also conveyance-free for WSNs. This algorithm considers remaining vitality levels, separation to the sink, and density parameters in the computation of the CH rivalry range while using fuzzy logic for overcoming WSN vulnerabilities. As for assessments, this algorithm is more energy efficient. As expressed in the framework model, MOFCA incorporates fixed or portable hubs. In any case, this portability is reproduced by the change in the area of hubs without causing energy utilization. According to the assessment, MOFCA is much better than the existing calculations during the analyses done during this investigation [96].

Fuzzy-Based Unequal Clustering Protocol (FUCP)

In 2015, Gajjar 2015 presented the fuzzy-based unequal clustering protocol (FUCP) for remote sensor systems. In this protocol, the cluster selection uses fuzzy logic and is performed based on residual energy, quality of communication, and is centerless with respect to its neighbor. This protocol uses an unequal clustering approach mainly to remove the hot spot problem. Comparative analysis done with existing protocols and results shows that the FUCP is 40% more energy-efficient, ends 57% more packets to the BS, and extends network lifetime by 31% [97].

FL-Based Unequal Clustering (FBUC)

Logambigai (2016) presented a fuzzy logic-based unequal clustering algorithm. Here, the regular CHs of each hub are first decided randomly. Second, the regular CH uses fuzzy logic based on three parameters (distance to BS, leftover energy, and hub degree) to decide the span of the series. At that point, the last CHs would be the hubs with the most extreme fuzzy yield in their space. From that point on, the hubs use the logic and sources of info to compute the opportunities. In the final stage, the CH selection is done with the largest fuzzy yields [98].

Distributed Unequal Clustering Using FL (DUCF)

Baranidharan (2016) contributed another clustering algorithm called the distributed unequal clustering using fuzzy logic (DUCF). Unequal clustering is used for load balancing of nodes. The fuzzy inference FIS structure in DUCF uses the leftover energy, hub degree, and separation from the base station as information for the processing of CH selection. Load adjustment forms the core idea of this protocol, which is processed by the fluctuations in the group size of the CH hubs. This protocol also uses the Mamdani technique for fuzzy deduction and centroid strategy for defuzzification. The major advantages of this protocol are an improved network lifetime and load balancing capacity [99].

Energy Conserved Unequal Clusters with Fuzzy Logic (ECUCF)

A study by Sundaran (2017) proposed a protocol (energy conserved unequal clusters with fuzzy logic (ECUCF)) aimed at reducing hot spot problems and enhancing energy efficiency. To expand the lifetime of the system and increment energy proficiency of the WSNs, areas are framed relying upon the hubs’ adequate separation from the BS. Node proximity, residual energy, and distance from the BS are considered for CH selection. The major advantages of this protocol are improvements in the number of clusters, expansion of the coverage area, and enhancement of the hub’s energy efficiency [100].

4.3.2. Metaheuristic Methodologies

Figure 14 discusses about the different Metaheuristic methodologies available and each methodology is discussed in detail below.

Multipath Routing Protocol (MRP)

In this study, the author proposed an ACO-based multipath routing protocol (MRP) for reactive WSNs. While designing this algorithm, WSN characteristics are considered, such as limited energy sources. Based on tswhe residual energy MRP selects CH. The ACO algorithm is applied for multipath routing among CHs and sink nodes. These algorithms outperform other networking protocols in terms of prolonging network lifetime and energy efficiency [101].

Genetic Algorithm-Based Threshold Sensitive Energy-Efficient Routing Protocol (GATERP)

Mittal (2018) proposed the genetic algorithm-based threshold sensitive energy-efficient routing protocol (GATERP) for basic time applications. In this protocol, CH is chosen based on genetic algorithm-based parameters, such as cluster division and cohesion. The protocol utilizes an intercluster data transmission algorithm for the lifetime network increment. In order to improve load balancing capabilities, GA-based multihop communication is presented as it reduces energy consumption. Network performances have been measured in terms of energy consumption and energy efficiency [102].

Heuristic Algorithm for Clustering Hierarchy (HACH)

In 2017, Oladimeji proposed the heuristic algorithm for clustering the hierarchy (HACH). For every round, the selection is based on both CH and active hubs. Inactive hub selection uses a stochastic sleep scheduling system to decide the choice of hubs that can be placed into rest mode without unfavorably influencing system inclusion.
A clustering algorithm can use the novel heuristic hybrid operator to combine two unique answers to accomplish an improved arrangement that upgrades the appropriation of CH hubs and coordinates energy use in WSNs. This protocol improves network performance in terms of an extended lifetime under various energy heterogeneity settings [103].

HSA Cluster-Based Protocol (HSACP)

Hoang (2014) introduced the harmony search algorithm (HSA) algorithm. This algorithm can significantly minimize the distance among cluster members and CHs for the purpose of energy optimization. This protocol is utilized in a real-time environment. Comparative analyses have been made with known cluster protocols, such as the LEACH and Fuzzy C Means protocols. The HSA protocol outcome shows that it can be used for centralized cluster-based WSN, especially in emergency environments [104].

S-EECP: Stable Energy-Efficient Clustering Protocol

In 2016, Mittal proposed the stable energy-efficient clustering protocol (S-EECP) in which residual energy is used for CH selection. This protocol generally reduces inappropriate load balancing. The dissipation of energy in CH can be reduced with the help of an intercluster data transmission algorithm. The dual-hop communication concept is used to reduce energy consumption. This protocol outperforms other existing algorithms in terms of stability period, energy values, and load balancing. Node mobility is a significant point for WSN, which is not considered in this protocol [105].

Single-Hop Energy-Efficient Clustering and Multihop Energy-Efficient Clustering Protocols (S-EECP and M-EECP)

Kumar (2013) proposed the single-hop and multihop energy-efficient clustering protocols (S-EECP and M-EECP, respectively). For S-EECP, the weighted probability is used for CH selection. This probability relies upon the proportion among the network’s average and hub’s residual energies. Energy is the primary factor for CH selection. In this situation, the hub, which has more residual energy than the network, is chosen as the CH. In the case of M-EECP, collected data can be sent to the BS via multihop communication [106]. Three types of sensors with various battery levels are used to assess network lifetime. This method has been compared with many earlier methods, and the results prove that it performs better than those methods in terms of energy efficiency and load balancing [106].

Distance-Based Residual Energy-Efficient Stable Election Protocol (DRESEP)

Mittal (2015) proposed a distance-based residual energy-efficient stable election protocol (DRESEP) protocol for an event-based data collection model. The aim of these algorithms is to send collected data from sensor nodes to the CH, which rely on perceived changes [107]. In order to accomplish energy minimization, dual-hop communication is used. It surpasses the other existing protocols in terms of network lifetime and optimization [108,109,110].

5. Conclusions

A major powerful solution for maintaining the energy efficiency of a sensor network is via energy constraints of sensor hubs and the functionalities of the clustering model. In this review, the current protocols and algorithms are analyzed. Those protocols are classified into parameter-, optimization-, and methodology-based clustering. Primary and secondary parameters in terms of clustering features are considered. At this point, every class of techniques was assessed and examined by the introduced parameters. With the end goal of providing valuable data and motivating researchers, this appraisal expects to present another viewpoint and a beginning stage for investigative techniques by considering classified approaches for easy comprehension of inadequacies in the procedures. In the future, we plan to extend this work into different fields of WSN, for example, body area network, battery-powered sensor systems, and mobile sink planning.

Author Contributions

Conceptualization, A.J.M. and G.G.D.; data curation, G.G.D.; formal analysis, A.J.M.; methodology, A.J.M. and G.G.D.; project administration, G.G.D; resources, R.P.; software, A.J.M.; supervision, R.P. and A.H.G.; validation, A.J.M. and A.H.G.; writing—original draft preparation, A.J.M. and G.G.D.; writing—review and editing, R.P. and A.H.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chijioke, W.; Jamal, A.A.; Mahiddin, N.A. Wireless Sensor Networks, Internet of Things, and Their Challenges. Int. J. Innov. Technol. Explor. Eng. 2019, 8, 2278–3075. [Google Scholar]
  2. Kim, B.S.; Park, H.; Kim, K.H.; Godfrey, D.; Kim, K.I. A survey on real-time communications in wireless sensor networks. Wirel. Commun. Mob. Comput. 2017, 2017, 1864847. [Google Scholar] [CrossRef] [Green Version]
  3. Ali, A.; Ming, Y.; Chakraborty, S.; Iram, S. A comprehensive survey on real-time applications of WSN. Future Internet 2017, 9, 77. [Google Scholar] [CrossRef] [Green Version]
  4. Albaladejo, C.; Sánchez, P.; Iborra, A.; Soto, F.; López, J.A.; Torres, R. Wireless sensor networks for oceanographic monitoring: A systematic review. Sensors 2010, 10, 6948–6968. [Google Scholar] [CrossRef]
  5. Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
  6. Tandel, H.; Shah, R. A Survey Paper on Wireless Sensor Network. Int. J. Sci. Res. Dev. 2017, 5, 907–909. [Google Scholar]
  7. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  8. Rawat, P.; Singh, K.D.; Chaouchi, H.; Bonnin, J.M. Wireless Sensor Networks: Recent developments and potential synergies. J. Supercomput. 2013, 68, 1–48. [Google Scholar] [CrossRef]
  9. Akyildiz, I.F.; Pompili, D.; Melodia, T. Challenges for efficient communication in underwater acoustic sensor networks. ACM Sigbed Rev. 2004, 1, 3–8. [Google Scholar] [CrossRef]
  10. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  11. Swetha, R.; Santhosh Amarnath, V.; Anitha Sofia, V.S. Wireless Sensor Network: A Survey. Int. J. Adv. Res. Comput. Commun. Eng. 2018, 7, 114–117. [Google Scholar]
  12. Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS: Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
  13. Shi, E.; Perrig, A. Designing secure sensor networks. IEEE Wirel. Commun. 2004, 11, 38–43. [Google Scholar]
  14. Geetha, V.A.; Kallapur, P.V.; Tellajeera, S. Clustering in wireless sensor networks: Performance comparison of leach & leach-c protocols using ns2. Procedia Technol. 2012, 4, 163–170. [Google Scholar]
  15. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless sensor network survey. Comput. Netw. 2008, 52, 2292–2330. [Google Scholar] [CrossRef]
  16. Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef] [Green Version]
  17. Zhu, Q.; Wang, R.; Chen, Q.; Liu, Y.; Qin, W. Iot gateway: Bridgingwireless sensor networks into internet of things. In Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China, 11–13 December 2010; pp. 347–352. [Google Scholar]
  18. Kuo, Y.W.; Li, C.L.; Jhang, J.H.; Lin, S. Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sens. J. 2018, 18, 5187–5197. [Google Scholar] [CrossRef]
  19. Pirbhulal, S.; Zhang, H.; E Alahi, M.E.; Ghayvat, H.; Mukhopadhyay, S.C.; Zhang, Y.T.; Wu, W. A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 2017, 17, 69. [Google Scholar] [CrossRef]
  20. Sen, J. A survey on wireless sensor network security. arXiv 2010, arXiv:1011.1529. [Google Scholar]
  21. Hassan, A.A.H.; Shah, W.M.; Iskandar, M.F.; Mohammed, A.A.J. Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study. Int. J. Appl. Eng. Res. 2017, 12, 11350–11360. [Google Scholar]
  22. Hassan, A.A.H.; Shah, W.; Husein, A.M.; Talib, M.S.; Mohammed, A.A.J.; Iskandar, M. Clustering approach in wireless sensor networks based on k-means: Limitations and recommendations. IJRTE 2019, 7, 119–126. [Google Scholar]
  23. Somasundaram, R.; Thangavel, T. An Enhanced Energy Efficient Unequal Layered Clustering Algorithm for Large Scale Wireless Sensor Networks. Int. J. Soft Comput. Eng. IJSCE 2013, 3, 2231–2307. [Google Scholar]
  24. Adhikary, D.R.D.; Mallick, D.K. An Energy Aware Unequal Clustering Algorithm using Fuzzy Logic for Wireless Sensor Networks. J. ICT Res. Appl. 2017, 11, 55–76. [Google Scholar] [CrossRef] [Green Version]
  25. Gajendran, M.; Basavaraj, M. WSN Clustering Based on EECI (Energy Efficient Clustering using Interconnection) Method. Int. J. Innov. Technol. Explor. Eng. 2019, 9, 3564–3571. [Google Scholar]
  26. Zeb, A.; Islam, A.M.; Zareei, M.; Al Mamoon, I.; Mansoor, N.; Baharun, S.; Komaki, S. Clustering analysis in wireless sensor networks: The ambit of performance metrics and schemes taxonomy. Int. J. Distrib. Sens. Netw. 2016, 12, 4979142. [Google Scholar] [CrossRef] [Green Version]
  27. Mamta, V. Clustering Techniques in Wireless Sensor Network. Int. J. Comput. Appl. Technol. Res. 2014, 6, 3381–3384. [Google Scholar]
  28. Wu, J.; Zhang, L.; Bai, Y.; Sun, Y. Cluster-based consensus time synchronization for wireless sensor networks. IEEE Sens. J. 2014, 15, 1404–1413. [Google Scholar] [CrossRef]
  29. Khediri, S.E.; Nasri, N.; Wei, A.; Kachouri, A. A new approach for clustering in wireless sensors networks based on LEACH. Procedia Comput. Sci. 2014, 32, 1180–1185. [Google Scholar] [CrossRef] [Green Version]
  30. Jan, B.; Farman, H.; Javed, H.; Montrucchio, B.; Khan, M.; Ali, S. Energy efficient hierarchical clustering approaches in wireless sensor networks: A survey. Wirel. Commun. Mob. Comput. 2017, 2017, 6457942. [Google Scholar] [CrossRef] [Green Version]
  31. Singh, S.K.; Singh, M.P.; Singh, D.K. Routing protocols in wireless sensor networks—A survey. Int. J. Comput. Sci. Eng. Surv. 2010, 1, 63–83. [Google Scholar] [CrossRef]
  32. Zungeru, A.M.; Ang, L.M.; Seng, K.P. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison. J. Netw. Comput. Appl. 2012, 35, 1508–1536. [Google Scholar] [CrossRef]
  33. Rathi, N.; Saraswat, J.; Bhattacharya, P.P. A review on routing protocols for application in wireless sensor networks. arXiv 2012, arXiv:1210.2940. [Google Scholar] [CrossRef]
  34. Rostami, A.S.; Badkoobe, M.; Mohanna, F.; Hosseinabadi, A.A.R.; Sangaiah, A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2018, 74, 277–323. [Google Scholar] [CrossRef]
  35. Abbasi, A.A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30, 2826–2841. [Google Scholar] [CrossRef]
  36. Fanian, F.; Rafsanjani, M.K.; Bardsiri, V.K. A survey of advanced LEACH-based protocols. Int. J. Energy Inf. Commun. 2016, 7, 1–16. [Google Scholar] [CrossRef]
  37. Akkaya, K.; Younis, M.A. survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 2005, 3, 325–349. [Google Scholar] [CrossRef] [Green Version]
  38. Sha, K.; Gehlot, J.; Greve, R. Multipath routing techniques in wireless sensor networks: A survey. Wirel. Pers. Commun. 2013, 70, 807–829. [Google Scholar] [CrossRef]
  39. Afsar, M.M.; Tayarani-N, M.H. Clustering in sensor networks: A literature survey. J. Netw. Comput. Appl. 2014, 46, 198–226. [Google Scholar] [CrossRef]
  40. Riaz, M.N. Clustering algorithms of wireless sensor networks: A survey. Int. J. Wirel. Microwave Technol. IJWMT 2018, 8, 40–53. [Google Scholar]
  41. Pantazis, N.A.; Nikolidakis, S.A.; Vergados, D.D. Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2012, 15, 551–591. [Google Scholar] [CrossRef]
  42. Ramesh, K.; Somasundaram, D.K. A comparative study of clusterhead selection algorithms in wireless sensor networks. arXiv 2012, arXiv:1205.1673. [Google Scholar] [CrossRef]
  43. Singh, S.P.; Sharma, S.C. A survey on cluster-based routing protocols in wireless sensor networks. Procedia Comput. Sci. 2015, 45, 687–695. [Google Scholar] [CrossRef] [Green Version]
  44. Arjunan, S.; Pothula, S. A survey on unequal clustering protocols in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 2019, 31, 304–317. [Google Scholar] [CrossRef]
  45. Dehghani, S.; Pourzaferani, M.; Barekatain, B. Comparison on energy-efficient cluster-based routing algorithms in wireless sensor network. Procedia Comput. Sci. 2015, 72, 535–542. [Google Scholar] [CrossRef] [Green Version]
  46. Sharma, D.; Ojha, A.; Bhondekar, A.P. Heterogeneity consideration in wireless sensor networks routing algorithms: A review. J. Supercomput. 2019, 75, 2341–2394. [Google Scholar] [CrossRef]
  47. Liu, X. A survey on clustering routing protocols in wireless sensor networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef]
  48. Kaur, L.; Kad, S. Clustering Techniques in Wireless Sensor Network: A Review. Int. J. Comput. Appl. 2017, 179, 30–34. [Google Scholar]
  49. Suhail, M. A Survey on Clustering Algorithms of Wireless Sensor Network. Int. J. Adv. Res. Electron. Commun. Eng. 2017, 6, 261–266. [Google Scholar]
  50. Radha, D.N.; Rashmi, K. Survey on Clustering Algorithms in Wireless Sensor Networks. Int. J. Res. Appl. Sci. Eng. Technol. 2015, 6, 49–52. [Google Scholar]
  51. Mitra, R.; Nandy, D. A survey on clustering techniques for wireless sensor network. Int. J. Res. Comput. Sci. 2012, 2, 51. [Google Scholar] [CrossRef] [Green Version]
  52. Santhiya, S.; Thamaraiselvi, A. Survey on Energy Efficient Clustering Algorithms for wireless Sensor Network. Int. J. Latest Trends Eng. Technol. 2013, 3, 57–60. [Google Scholar]
  53. SheikDawood, M.; Jayalakshmi, P.; Abdul Sikkandhar, R.; Athisha, G. A Survey on Energy Efficient Clustering Protocols for Wireless Sensor Network. Int. J. Comput. Sci. Mob. Comput. 2014, 3, 1158–1163. [Google Scholar]
  54. Kaur, S.; Mir, R.N. Energy efficiency optimization in wireless sensor network using proposed load balancing approach. Int. J. Comput. Netw. Appl. 2016, 3, 108–117. [Google Scholar] [CrossRef]
  55. Kumar, V.; Dhok, S.B.; Tripathi, R.; Tiwari, S. A review study of hierarchical clustering algorithms for wireless sensor networks. Int. J. Comput. Sci. Issues 2014, 11, 92. [Google Scholar]
  56. Nayyar, A.; Singh, R. Ant colony optimization (ACO) based routing protocols for wireless sensor networks (WSN): A survey. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 148–155. [Google Scholar] [CrossRef] [Green Version]
  57. Gambhir, A.; Payal, A.; Arya, R. Performance analysis of artificial bee colony optimization-based clustering protocol in various scenarios of WSN. Int. Conf. Comput. Intell. Data Sci. 2018, 132, 183–188. [Google Scholar] [CrossRef]
  58. Wohwe Sambo, D.; Yenke, B.O.; Förster, A.; Dayang, P. Optimized clustering algorithms for large wireless sensor networks: A review. Sensors 2019, 19, 322. [Google Scholar] [CrossRef] [Green Version]
  59. Wang, L.; Wu, W.; Qi, J.; Jia, Z. Wireless sensor network coverage optimization based on whale group algorithm. Comput. Sci. Inf. Syst. 2018, 15, 569–583. [Google Scholar] [CrossRef] [Green Version]
  60. Hemalatha, P.; Gnanambigai, J. A Survey on Optimization Techniques in Wireless Sensor Networks. Int. J. Adv. Res. Comput. Eng. Technol. 2015, 4, 4304–4309. [Google Scholar]
  61. Kaur, P.; Kumar, V. A Survey of Energy Optimization Techniques in Wireless Sensor Networks. Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 393–396. [Google Scholar]
  62. Parwekar, P.; Rodda, S.; Kalla, N. A study of the optimization techniques for wireless sensor networks (WSNs). In Information Systems Design and Intelligent Applications; Springer: Singapore, 2018; pp. 909–915. [Google Scholar]
  63. More, S.; Nighot, M. Survey paper on Optimization of Wireless Sensor Networks using Artificial Intelligence Techniques. Int. J. Innov. Res. Comput. Commun. Eng. 2016, 4, 21105–21112. [Google Scholar]
  64. Swati, S.; Kanika, S. Review Paper on Optimization Techniques in Wireless Sensor Network. Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 2016, 4, 25–28. [Google Scholar]
  65. Mangat, V. Survey on particle swarm optimization based clustering analysis. In Swarm and Evolutionary Computation; Springer: Berlin/Heidelberg, Germany, 2012; pp. 301–309. [Google Scholar]
  66. Ehsan, S.; Hamdaoui, B. A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Commun. Surv. Tutor. 2011, 14, 265–278. [Google Scholar] [CrossRef]
  67. Kandris, D.; Tsioumas, P.; Tzes, A.; Nikolakopoulos, G.; Vergados, D.D. Power conservation through energy efficient routing in wireless sensor networks. Sensors 2009, 9, 7320–7342. [Google Scholar] [CrossRef]
  68. Kim, J.M.; Seo, H.S.; Kwak, J. Routing protocol for heterogeneous hierarchical wireless multimedia sensor networks. Wirel. Pers. Commun. 2011, 60, 559–569. [Google Scholar] [CrossRef]
  69. Lin, K.; Rodrigues, J.J.; Ge, H.; Xiong, N.; Liang, X. Energy efficiency QoS assurance routing in wireless multimedia sensor networks. IEEE Syst. J. 2011, 5, 495–505. [Google Scholar] [CrossRef]
  70. Maimour, M.; Zeghilet, H.; Lepage, F. Cluster-based routing protocols for energy-efficiency in wireless sensor networks. In Proceedings of the 2011 International Conference on Computer Science and Network Technology, Harbin, China, 24–26 December 2010; pp. 167–188. [Google Scholar]
  71. Goyal, N.; Dave, M.; Verma, A.K. Energy efficient architecture for intra and inter cluster communication for underwater wireless sensor networks. Wirel. Pers. Commun. 2016, 89, 687–707. [Google Scholar] [CrossRef]
  72. Samant, T.; Mukherjee, P.; Mukherjee, A.; Datta, A. TEEN—V: A solution for intra-cluster cooperative communication in wireless sensor network. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, Tamil Nadu, India, 10–11 February 2017; pp. 209–213. [Google Scholar]
  73. Zhixiang, D.; Bensheng, Q. Three-layered routing protocol for WSN based on LEACH algorithm. In Proceedings of the IET Conference on Wireless, Mobile and Sensor Networks 2007 (CCWMSN07), Shanghai, China, 12–14 December 2007; pp. 72–75. [Google Scholar]
  74. Hong, J.; Kook, J.; Lee, S.; Kwon, D.; Yi, S. T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks. Inf. Syst. Front. 2009, 11, 513. [Google Scholar] [CrossRef]
  75. Bagherzadeh, J.; Samadzamini, M. A clustering algorithm for wireless sensor networks based on density of sensors. In Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, Kuala Lumpur, Malaysia, 14–16 December 2009; pp. 594–598. [Google Scholar]
  76. Jia, J.G.; He, Z.W.; Kuang, J.M.; Mu, Y.H. An energy consumption balanced clustering algorithm for wireless sensor network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Shenzhen, China, 23–25 September 2010; pp. 1–4. [Google Scholar]
  77. Kang, S.H.; Nguyen, T. Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 2012, 16, 1396–1399. [Google Scholar] [CrossRef]
  78. Wang, A.; Yang, D.; Sun, D. A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. Comput. Electr. Eng. 2012, 38, 662–671. [Google Scholar] [CrossRef]
  79. Mahmood, D.; Javaid, N.; Mahmood, S.; Qureshi, S.; Memon, A.M.; Zaman, T. MODLEACH: A variant of LEACH for WSNs. In Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, 28–30 October 2013; pp. 158–163. [Google Scholar]
  80. Chang, R.S.; Kuo, C.J. An energy efficient routing mechanism for wireless sensor networks. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA’06), Vienna, Austria, 18–20 April 2006; Volume 2, p. 5. [Google Scholar]
  81. Liu, T.; Li, F. Power-efficient clustering routing protocol based on applications in wireless sensor network. In Proceedings of the 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, 24–26 September 2009; pp. 1–6. [Google Scholar]
  82. Kumar, D.; Aseri, T.C.; Patel, R. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Comput. Commun. 2009, 32, 662–667. [Google Scholar] [CrossRef]
  83. Tao, Y.; Zhang, Y.; Ji, Y. Flow-balanced routing for multi-hop clustered wireless sensor networks. Ad Hoc Netw. 2013, 11, 541–554. [Google Scholar] [CrossRef] [Green Version]
  84. Yin, G.; Yang, G.; Yang, W.; Zhang, B.; Jin, W. An energy-efficient routing algorithm for wireless sensor networks. In Proceedings of the 2008 International Conference on Internet Computing in Science and Engineering, Harbin, China, 28–29 January 2008; pp. 181–186. [Google Scholar]
  85. Agrawal, T.; Kushwah, R.S. Layered Clustering Routing Protocol with Overlapping Cluster Heads in WSN. In Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 244–248. [Google Scholar]
  86. Cengiz, K.; Dağ, T. Low energy fixed clustering algorithm (LEFCA) for wireless sensor networks. In Proceedings of the 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 16–19 December 2015; pp. 79–84. [Google Scholar]
  87. Yi, D.; Yang, H. HEER–A delay-aware and energy-efficient routing protocol for wireless sensor networks. Comput. Netw. 2016, 104, 155–173. [Google Scholar] [CrossRef] [Green Version]
  88. Shahraki, A.; Rafsanjani, M.K.; Saeid, A.B. Hierarchical distributed management clustering protocol for wireless sensor networks. Telecommun. Syst. 2017, 65, 193–214. [Google Scholar] [CrossRef]
  89. Cengiz, K.; Dag, T. Energy aware multi-hop routing protocol for WSNs. IEEE Access 2017, 6, 2622–2633. [Google Scholar] [CrossRef]
  90. Gajjar, S.; Sarkar, M.; Dasgupta, K. FAMACROW: Fuzzy and ant colony optimization based combined mac, routing, and unequal clustering cross-layer protocol for wireless sensor networks. Appl. Soft Comput. 2016, 43, 235–247. [Google Scholar] [CrossRef]
  91. Zahedi, Z.M.; Akbari, R.; Shokouhifar, M.; Safaei, F.; Jalali, A. Swarm intelligence based fuzzy routing protocol for clustered wireless sensor networks. Expert Syst. Appl. 2016, 55, 313–328. [Google Scholar] [CrossRef]
  92. Shokouhifar, M.; Jalali, A. Optimized sugeno fuzzy clustering algorithm for wireless sensor networks. Eng. Appl. Artif. Intell. 2017, 60, 16–25. [Google Scholar] [CrossRef]
  93. Fanian, F.; Rafsanjani, M.K. Memetic fuzzy clustering protocol for wireless sensor networks: Shuffled frog leaping algorithm. Appl. Soft Comput. 2018, 71, 568–590. [Google Scholar] [CrossRef]
  94. Ran, G.; Zhang, H.; Gong, S. Improving on LEACH protocol of wireless sensor networks using fuzzy logic. J. Inf. Comput. Sci. 2010, 7, 767–775. [Google Scholar]
  95. Bagci, H.; Yazici, A. An energy aware fuzzy approach to unequal clustering in wireless sensor networks. Appl. Soft Comput. 2013, 13, 1741–1749. [Google Scholar] [CrossRef]
  96. Sert, S.A.; Bagci, H.; Yazici, A. MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks. Appl. Soft Comput. 2015, 30, 151–165. [Google Scholar] [CrossRef]
  97. Gajjar, S.; Talati, A.; Sarkar, M.; Dasgupta, K. FUCP: Fuzzy based unequal clustering protocol for wireless sensor networks. In Proceedings of the 2015 39th National Systems Conference (NSC), Greater Noida, India, 14–16 December 2015; pp. 1–6. [Google Scholar]
  98. Logambigai, R.; Kannan, A. Fuzzy logic based unequal clustering for wireless sensor networks. Wirel. Netw. 2016, 22, 945–957. [Google Scholar] [CrossRef]
  99. Baranidharan, B.; Santhi, B. DUCF: Distributed load balancing unequal clustering in wireless sensor networks using fuzzy approach. Appl. Soft Comput. 2016, 40, 495–506. [Google Scholar] [CrossRef]
  100. Sundaran, K.; Ganapathy, V.; Sudhakara, P. Fuzzy logic based unequal clustering in wireless sensor network for minimizing energy consumption. In Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Chennai, India, 23–24 February 2017; pp. 304–309. [Google Scholar]
  101. Yang, J.; Xu, M.; Zhao, W.; Xu, B. A multipath routing protocol based on clustering and ant colony optimization for wireless sensor networks. Sensors 2010, 10, 4521–4540. [Google Scholar] [CrossRef] [Green Version]
  102. Mittal, N.; Singh, U.; Sohi, B.S. An energy-aware cluster-based stable protocol for wireless sensor networks. Neural Comput. Appl. 2019, 31, 7269–7286. [Google Scholar] [CrossRef]
  103. Oladimeji, M.O.; Turkey, M.; Dudley, S. HACH: Heuristic Algorithm for Clustering Hierarchy protocol in wireless sensor networks. Appl. Soft Comput. 2017, 55, 452–461. [Google Scholar] [CrossRef]
  104. Hoang, D.C.; Yadav, P.; Kumar, R.; Panda, S.K. Real-time implementation of a harmony search algorithm-based clustering protocol for energy-efficient wireless sensor networks. IEEE Trans. Ind. Inform. 2013, 10, 774–783. [Google Scholar] [CrossRef]
  105. Mittal, N.; Singh, U.; Sohi, B.S. A stable energy efficient clustering protocol for wireless sensor networks. Wirel. Netw. 2017, 23, 1809–1821. [Google Scholar] [CrossRef]
  106. Kumar, D. Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks. IET Wirel. Sens. Syst. 2013, 4, 9–16. [Google Scholar] [CrossRef]
  107. Mittal, N.; Singh, U. Distance-based residual energy-efficient stable election protocol for WSNs. Arab. J. Sci. Eng. 2015, 40, 1637–1646. [Google Scholar] [CrossRef]
  108. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet Things J. 2019, 6, 5132–5139. [Google Scholar] [CrossRef] [Green Version]
  109. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. I-sep: An improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J. 2019, 7, 710–717. [Google Scholar] [CrossRef]
  110. Gandomi, A.H.; Yang, X.S.; Talatahari, S.; Alavi, A.H. (Eds.) Metaheuristic Applications in Structures and Infrastructures; Elsevier: Waltham, MA, USA, 2013; pp. 1–23. [Google Scholar]
Figure 1. Wireless sensor network (WSN) architecture.
Figure 1. Wireless sensor network (WSN) architecture.
Electronics 09 01630 g001
Figure 2. Sensor node architecture.
Figure 2. Sensor node architecture.
Electronics 09 01630 g002
Figure 3. Classification of clustering-based routing protocols.
Figure 3. Classification of clustering-based routing protocols.
Electronics 09 01630 g003
Figure 4. Clustering-based primary parameters.
Figure 4. Clustering-based primary parameters.
Electronics 09 01630 g004
Figure 5. Clustering-based secondary parameters.
Figure 5. Clustering-based secondary parameters.
Electronics 09 01630 g005
Figure 6. Classical optimization approaches.
Figure 6. Classical optimization approaches.
Electronics 09 01630 g006
Figure 7. Hybrid optimization approaches.
Figure 7. Hybrid optimization approaches.
Electronics 09 01630 g007
Figure 8. Fuzzy-based approaches.
Figure 8. Fuzzy-based approaches.
Electronics 09 01630 g008
Figure 9. Metaheuristic-based approaches.
Figure 9. Metaheuristic-based approaches.
Electronics 09 01630 g009
Figure 10. Clustering protocols based on primary parameters.
Figure 10. Clustering protocols based on primary parameters.
Electronics 09 01630 g010
Figure 11. Clustering protocols based on secondary parameters.
Figure 11. Clustering protocols based on secondary parameters.
Electronics 09 01630 g011
Figure 12. Hybrid optimization-based routing protocols.
Figure 12. Hybrid optimization-based routing protocols.
Electronics 09 01630 g012
Figure 13. Fuzzy-based approaches.
Figure 13. Fuzzy-based approaches.
Electronics 09 01630 g013
Figure 14. Metaheuristic methodologies.
Figure 14. Metaheuristic methodologies.
Electronics 09 01630 g014
Table 1. Classical optimization-based routing protocols.
Table 1. Classical optimization-based routing protocols.
S. No.Names of AlgorithmsEnergy ConsumedEnergy EfficiencyNetwork DelayNetwork ThroughputNetwork LossOverall QoS
1LEACH [28]ModerateModerateModerateModerateHighModerate
2TL-LEACH [73]LowHighModerateHighModerateModerate
3T-LEACH [74]LowHighModerateHighModerateHigh
4DS-LEACH [75]LowHighModerateHighLowHigh
5LEACH-EP [76]LowHighModerateHighModerateModerate
6LEACH-DT [77]LowHighModerateHighModerateModerate
7LEACHSWDN [78]LowHighModerateHighLowModerate
8MODLEACH [79]ModerateModerateModerateLowLowHigh
9MECH [80]LowHighModerateHighModerateModerate
10PECRP [81]LowHighModerateHighLowHigh
11EEHC [82]LowHighModerateHighLowHigh
12FBR [83]HighLowModerateLowLowHigh
13EERA [84]HighLowModerateLowLowHigh
14LCRPOCH [85]LowHighModerateLowModerateModerate
15LEFCA [86]LowHighModerateLowModerateModerate
16HEER [87]LowHighModerateLowLowModerate
17HDMC [88]ModerateModerateModerateLowLowModerate
18EAMR [89]LowHighModerateLowLowModerate

Share and Cite

MDPI and ACS Style

Manuel, A.J.; Deverajan, G.G.; Patan, R.; Gandomi, A.H. Optimization of Routing-Based Clustering Approaches in Wireless Sensor Network: Review and Open Research Issues. Electronics 2020, 9, 1630. https://doi.org/10.3390/electronics9101630

AMA Style

Manuel AJ, Deverajan GG, Patan R, Gandomi AH. Optimization of Routing-Based Clustering Approaches in Wireless Sensor Network: Review and Open Research Issues. Electronics. 2020; 9(10):1630. https://doi.org/10.3390/electronics9101630

Chicago/Turabian Style

Manuel, Asha Jerlin, Ganesh Gopal Deverajan, Rizwan Patan, and Amir H. Gandomi. 2020. "Optimization of Routing-Based Clustering Approaches in Wireless Sensor Network: Review and Open Research Issues" Electronics 9, no. 10: 1630. https://doi.org/10.3390/electronics9101630

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop