Abstract
Under a dense and large IoT network, a star topology where each device is directly connected to the Internet gateway may cause serious waste of energy and congestion issues. Grouping network devices into clusters provides a suitable architecture to reduce the energy consumption and allows an effective management of communication channels. Although several clustering approaches were proposed in the literature, most of them use the single-hop intra-clustering model. In a large network, the number of clusters increases and the energy draining remains almost the same as in un-clustered architecture. To solve the problem, several approaches use the k-hop intra-clustering to generate a reduced number of large clusters. However, k-hop proposed schemes are, generally, centralized and only assume the node direct neighbors information which lack of robustness. In this regard, the present work proposes a distributed approach for the k-hop intra-clustering called Distributed Clustering based 2-Hop Connectivity (DC2HC). The algorithm uses the two-hop neighbors connectivity to elect the appropriate set of cluster heads and strengthen the clusters connectivity. The objective is to optimize the set of representative cluster heads to minimize the number of long range communication channels and expand the network lifetime. The paper provides the convergence proof of the proposed solution. Simulation results show that our proposed protocol outperforms similar approaches available in the literature by reducing the number of generated cluster heads and achieving longer network lifetime.
Keywords: IoT, WSN, multi-hop clustering, distributed clustering, dynamic intra-clustering
1. Introduction
IoT networks cover progressively more aspects of our daily life and represent a convergence field of multiple technologies. The basic idea is to allow the variety of devices, or things, present around us (smartphones, sensors, cameras, laptops, Radio-Frequency Identification tags (RFID), etc.) to interact and cooperate to achieve a common goal and make users lives easier [1]. With extensive attention, IoT has rapidly spread to various fields of interest, i.e., smart healthcare, smart city, smart home, intelligent transportation systems and many other applications [2]. Such systems could be seen as a large number of heterogeneous devices that need to access and be accessible from the Internet [3]. This paradigm enables new technologies [4,5] such as heterogeneous types of big data, Cloud and Fog Computing, Data Centers, etc. IoT devices perform more functionalities than mere sensing, leading to a fast depletion of the available energy where battery recharging is often costly or economically disadvantageous. Therefore, energy efficiency is a basic concept that should be incorporated into the overall networks infrastructure [6].
Network clustering is a technique that has been widely used in wireless networks. Indeed, grouping sensor nodes into clusters is an effective way to improve the network performance due to its ability to extend the networks lifetime [7,8] and increase the scalability of the network [9]. Figure 1 illustrates a simplified example of devices connecting with the Base Station (BS) using a flat architecture (Figure 1a) versus connecting through a cluster based scheme (Figure 1b). This figure shows how the number of direct communication channels with the BS can be considerably higher using a flat network. The clustering is used as a functional solution for managing the multi-channel communications [10]. Many channel management mechanisms were proposed to improve the radio capacity of the network [11,12]. However, in a flat and dense network, the base station may not satisfy the simultaneous connection resulting in a waste of wireless communication resources and energy.
Figure 1.
Connections toward the base station (a) using a flat architecture with individual connections, (b) using a structured and cluster-based architecture.
Several previously proposed clustering protocols focus on the multi-hop inter-clustering [7,9,13] between the cluster heads (CH’s) and the base station to increase the network durability, however only few consider the intra-cluster communication (between devices and their CH). Usually, existing intra-clustering schemes [14,15,16] assume a direct connection between Cluster Members (CMs) and their CHs, therefore, a high number of clusters are formed. In a large scale network, the distance between nodes and their CHs may not be short enough for communication. Therefore, direct communication becomes obstructive and k-hop intra-clustering communication should be applied to ensure the network scalability. The k-hop intra-clustering model received a considerable interest from the research community [17,18,19] since it expresses (in a better way) the features of well-organized network. Indeed, k-hops intra-clustering model reduces the number of clusters which reduces the number of long-range communication channels and increases network durability [9]. The objective of k-hop clustering is to organize nodes into clusters where the path between cluster members and their corresponding cluster head is shorter than k hops of distance. It provides a robust topology in dynamic networks since cluster members may not be in direct contact with their CH, hence reconfiguration events (cluster head election and re-affiliations) are limited [20]. The maximum number of hops k inside each cluster could be easily determined according to the targeted application requirements and the deployment area’s nature. The proposed algorithm uses a weight based mechanism during the clustering process which consists of selecting the node with the maximum weight among its k-hop neighborhood as a CH. The weight of each node is based on three parameters, namely: the two-hop connectivity ratio, the remaining energy and the communication quality. A k-hop routing tree is elaborated within each cluster in a distributed fashion, where CMs use the Received Signal Strength Indicator (RSSI) to join the tree and select their parents by following the shortest routing path leading to the corresponding CH. Therefore, the k-hop clusters topology will further improve the energy efficiency and extend the network lifespan.
1.1. Network Architecture
The architecture of an IoT network is usually composed of two layers: the Access Network (AN) and the Backbone Network (BN). The AN contains two kinds of components (Figure 2): the Internet gateways (access points, base stations, NB, eNB, gNB [21], etc.) and a variety of deployed devices. The Base Stations (BS) acts as a gateway that allows network devices to connect with the Internet. On the other hand, the BN is mainly composed of the Internet that streams the collected data to a particular distant service (for network monitoring or saving and processing). In the k-hop intra-clustering, nodes of the same cluster exchange their information using a short-range communication. The IEEE 802.15.4 standard is commonly used for this purpose [22] and is adopted by many low-cost wireless interfaces such as Bluetooth [2], Zigbee [23], WirelessHART [24], 6LoWPAN [25], Z-Wave [26], etc. Where the energy consumption is reduced and devices can work for years without replacement. In contrast, to access the Internet getaway (typically the BS), network devices usually use long-range communication technologies [27], such as Wi-Fi (IEEE 802.11 [28]), LTE, LTE-M [29], etc. Long-range communication presents significantly high energy consumption and constraints devices lifetime to few days. The choice of the communication interface depends on the system application. Moreover, advanced communication technologies for Low Power Wide Area (LPWA) [30] were proposed in the literature to manage even wider communication areas, such as BLE (Bluetooth Low Energy) [31], WAVENIS [22], LoRaWAN (LoRa) [32] and Narrowband IoT (NB-IoT) [30]. Table 1 shows a brief comparison of some prevalent existing communication technologies with their associate application.
Figure 2.
IoT network architecture.
Table 1.
Comparison of characteristics of different communicatioTn interfaces.
| Protocol | Frequency Band | Data Rate | Range | Energy Consumption | Usage Area |
|---|---|---|---|---|---|
| Wi-Fi [28] | 2.4/5.0 GHz | 54 Mb/s | 30 m | Medium | Home entertainment, Industrial |
| Bluetooth [2] | 2.4 GHz | 1 Mb/s | 10 m | Low | Industrial, Traffic management |
| IEEE 802.15.4 [23] | 868−915 MHz/2.4 GHz | 250 kb/s | [10, 100] m | Low | Industrial, Traffic management, Smart home, vehicle monitoring |
| LTE [29] | 2.6 GHz | 10 Mb/s | ≤15 km | High | Mobil telecommunications, Smart Cities |
| Wireless HART [24] | 2.4−2.5 MHz | 250 kb/s | [1, 100] m | Low | Healthcare, Industry automation |
| BLE [31] | 2.4 MHz | 1 Mb/s | 200 m | Very Low | Healthcare, Home entertainment |
| Z-WAVE [26] | 1 GHz | 40 kb/s | 30 m | Low | Home automation applications |
| WAVENIS [22] | 865−916 GHz | 100 kb/s | ≤4 km | Very Low | Chemical and healthcare applications |
| LoRaWAN [32] | 868−900 GHz | 50 kb/s | ≤15 km | Very Low | Smart City, industrial Monitoring, Agriculture |
| NB-IoT [30] | 180 kHz | 234.7 kb/s | ≤35 km | Low | Industrial Monitoring, Smart City |
1.2. Motivation
As discussed in the introduction, when each network device is directly connected to the gateway, numerous energetic and radio channel access problems are faced, especially in dense and large networks [33]. Clustering the network by using direct connections among nodes and their CH engenders a high number of small clusters [34]. K-hop intra-clustering has demonstrated many advantages to avoid the congestion problems and prolong the network lifetime [5,35]. However, k-hop intra-clustering protocols are mostly centralized and only consider the node direct neighbors information, which lacks robustness. Indeed, with a centralized k-hop scheme, the BS is a central point of failure, i.e., a potential BS failure will obstruct the execution of the whole protocol. A loss of a critical node or a communication error could eventually cause a severe clustering failure because some data are usually of higher importance in a centralized approach. Moreover, when the network scales up, the BS may become a performance bottleneck. In this regard, this paper presents a new distributed k-hop intra-clustering protocol that takes into consideration the two-hop neighbors connectivity information. The main objective is to optimize the set of CHs in order to reduce the number of long-range communication channels to avoid congestion issues and extend the network lifetime.
The main contributions of this work are as follows:
A new connectivity metric is introduced to elect the set of appropriate CHs. The novelty of this metric is taking into account the two-hop connectivity of the current node and its surrounding neighborhood (instead of using the traditional direct neighbors connectivity), in order to strengthen the clusters stability.
The design of the algorithm is inspired from the distributed self-stabilizing systems. We prove that the algorithm converges within rounds, which represents the upper bound of the time complexity, n is the number of network nodes and k is the depth threshold of the clusters. This perspective allows network devices to efficiently tolerate potential failures that can occur locally in the dynamic topology.
The proposed approach generates clusters with an energy efficient topology by reducing the distance between nodes and their respective CH. The adopted approach is peculiar in that it constructs the intra-cluster links in a distributed manner rather than using a centralized algorithm executed by the CH.
The remainder of this paper is structured as follows: Section 2 describes some related works. The network model and the algorithm objectives are presented in Section 3. Section 4 is dedicated to the presentation of our contribution. The energy model and transmission reliability are presented in Section 5. Section 6 is devoted to the convergence proof of the proposed scheme. The complexity of the algorithm is analyzed in Section 7. Section 8 describes the experimental settings and the simulation results. We conclude our work in Section 9.
2. Literature Review
Several researches focus on clustering techniques for wireless networks [8,20,22,36,37,38,39]. In this section, we present some of the prevalent one-hop and k-hop intra-clustering approaches designed for wireless networks (Table 2). Many researchers have addressed the one-hop intra-clustering [5,40,41,42] in order to design an energy efficient network. Low Energy Adaptive Clustering Hierarchy (LEACH) [43] is one of the first and most well-known energy efficiency clustering algorithms in this field. In LEACH, each sensor joins the closest one-hop away CH. The role of CH is rotated randomly and periodically over nodes to extend the network lifetime. This work has motivated many variations and improvements such as EP-LEACH [44], FL-LEACH [45] and MH-LEACH [46].
Table 2.
Clustering algorithms properties comparison.
| Algorithm | Topology | Number of CH’s | Intra Clustering | Inter Clustering | Load Balancing | Energy Consideration | Benchmarks |
|---|---|---|---|---|---|---|---|
| LEACH [43] | Distributed | Undetermined | Single-hop | Single-hop | No | No | MTE |
| EP-LEACH [44] | Distributed | Undetermined | Single-hop | Single-hop | No | Yes (CH-election) | LEACH, TEEN |
| FL-LEACH [45] | Distributed | Determined | Single-hop | Single-hop | Yes | No | LEACH |
| Wu et al. [47] | Centralized | Undetermined | Single-hop | Single-hop | Yes | No | Not specified |
| MH-LEACH [46] | Distributed | Undetermined | Multi-hop | Single-hop | No | Yes (Multi-Hop transmission) | LEACH |
| E-PEGASIS [48] | Centralized | Determined | Multi-hop | Single-hop | No | No | PEGASIS, LBEERA |
| EE3C [50] | Centralized | Undetermined | Multi-hop | Multi-hop | Yes | No | Not specified |
| K-ECDS [49] | Distributed | Undetermined | Multi-hop | Multi-hop | No | No | ECDS, HEED |
| Singh et al. [14] | Centralized | Undetermined | Multi-hop | Multi-hop | Yes | Yes (CH-rotation) | EEUC, EUCA |
| Turgut [19] | Distributed | Undetermined | Multi-hop | Single-hop | Yes | No | Not specified |
| Mezghani [34] | Distributed | Undetermined | Multi-hop | Single-hop | Yes | Yes (intra-cluster routing) | MTE, HEED, APTEEN, EDC, THC, VCA |
Xiao et al. [44] improved LEACH protocol by introducing the energy harvesting capability in the CHs election, which minimizes the energy consumption of devices. Authors in [45] proposed an amelioration of LEACH that shares the same heuristic and integrates a fuzzy inference system to determine the desired number of CHs in the network by only using the network density as an input. Chung-Wei [47] proposed a bio-inspired clustering algorithm. The idea is to use a multi-metric optimization algorithm to find a sub-optimal set of cluster heads and balance the number of CMs over clusters in order to reduce energy consumption.
The one-hop intra-clustering provides a convenient solution to structure the network. However, for large networks many clusters are formed. Therefore, isolated devices may appear and connectivity may be difficult to ensure. Multi-hop (or k-hop) intra-clustering alleviate the problem by producing a consistent structure in dynamic and large scale environments. MH-LEACH [46] or Multi-Hop LEACH is a novel extension of LEACH that supports the k-hop intra-clustering to increase energy efficiency. In this approach, cluster members send their data to the cluster heads through multi-hop communication and the CH aggregates data directly to the BS. The objective is to reduce the intra-cluster energy consumption by using multi-hop communications. However, in addition to the disadvantages of LEACH, this technique does not provide load balancing during the routing process.
E-PEGASIS [48] is a chain-based intra-clustering mechanism that aims to reduce the redundancy of data transmitted toward the BS. The algorithm finds a dominating set in the network and uses an ant colony optimization to elect the sub-optimal routing chain from the dominating nodes. This approach is an energy efficient solution. However, the time complexity required to organize the nodes into chain is costly. In [49], authors presented a k-hop Energy Constrained intra-clustering technique based on the Dominating Sets theory called K-ECDS. The proposed algorithm considers the energy limitation and models the problem of optimally choosing cluster heads based on the quality of communication channels and nodes cardinality. The clustering is distributed and aims to scale the network.
Authors in [14] proposed a new energy efficient hierarchical clustering using an intra-cluster communication scheme to improve the lifetime of the wireless networks. The proposed method uses an uneven clustering technique to alleviate the hot spot problem. The BS divides the network into three unequal clusters level, the CHs selection is based on the residual energy and the number of neighbours. The multi-hop intra-clustering is only applied in clusters located faraway from the BS. This protocol reduces the number of clusters and the messages overhead. However, the clustering is centralized, a potential BS failure will lead to the failure of the whole protocol. Authors in [19] presented a multi-hop intra-cluster clustering architecture. Initially, nodes enter a sleeping period and compute a wake up time slot according to their degree and the average distance to their neighbors. Nodes with a large set of neighbors and low average distance are awakened in an earlier execution time to be privileged for the CH election. Although the CHs selection provides more energy efficiency and balanced cluster formation, the clustering time is prolonged.
Mezghani [34] proposed a distributed multi-hop intra-clustering approach based on Khalimsky topology. The network is divided into k-hop large dynamic clusters. The CH election is distributed and weight based, the weight of each node is based on the residual energy, nodes degree and the neighbors communication probability. The node with the highest weight in its neighborhood is selected as a CH. The cluster topology is performed using the triangulation theory of Khalimsky to ensure optimal intra-clustering routing and reduce the energy consumption.
Traditional centralized intra-clustering algorithms often need knowledge of the entire network information. A loss of a critical node or a communication error could eventually cause a severe clustering failure because some data are usually of higher importance in a centralized approach. Therefore, our proposal is fully distributed allowing network nodes to act simultaneously and independently in order to make the network fault-tolerant.
3. Network Model and Algorithm Objective
In this study, the wireless network is assumed to be composed of a set of devices represented by a graph , where V is the set of network nodes and E is the set of edges that represents the communication and interfering links. denotes the set of k-hop neighbors of the node , represents the set neighbors at distance - from i. denotes neighbors of node i at one hop. is the degree of node i, i.e., number of nodes in the neighborhood of node i. The distance between the node i and the node j is (the number of hops in the shortest path between i and j). Nodes use multi-hop communication to relay their data toward their CH. We assume that all devices have the same transmission range (communication links are symmetric). Network devices use a single channel transceiver, i.e., they cannot receive from multiple senders or send and receive at the same time.
The objective of our proposed solution is to optimize the number of CHs and reduce the waste of energy caused by the long-range communication channels and decrease the risk of congestion. More precisely, we aim to find the smallest set C of selected cluster heads using a two-hop neighbors connectivity metric, while respecting a particular maximum hops constraint k between each node and its cluster head. Considering that is the set of nodes that belong to the cluster coordinated by the cluster head . The objective of the proposed mechanism is formulated as follows:
where
| (1) |
The communication over multi-hop short-range is usually more energy efficient than directly transmitting in a single-hop long-range communication [51]. Larger intra-cluster hops extends the coverage of the CHs, which reduces the number of elected CHs and the energy dissipation. However, in case of dense network, the interference rate will also increase, which expands the waste of energy due to collusion problems that may occur.
4. Proposed Approach
In this section, we present our distributed k-hop intra-clustering approach for wireless networks named Distributed Clustering based 2-Hop Connectivity (DC2HC). The clustering approach consists of grouping nodes with high connectivity into k-hop clusters. As cluster heads consume more energy compared with other nodes, the number of CHs should be reduced [49]. Therefore, DC2HC aims to produce an optimized number of clusters while maintaining the network coverage, reducing the number of isolated nodes and providing more extended network durability. The algorithm adopts a weight based mechanism during the cluster heads election process. This latter consists of selecting as a CH node with the maximum weight in its k-hop neighborhood. Multi-hop spanning trees [52] are formed inside each cluster where CMs use the Received Signal Strength Indicator (RSSI) to select their parents in the routing path leading to the corresponding CH. Therefore, clusters will be constructed with a topology that consumes less energy. Nodes weight combines three metrics:
- Two-hop connectivity ratio (TCR): this parameter represents the connectivity ratio of a node relative to its neighborhood. The value of a given node i is calculated using Equation (2). Each node computes the average connectivity within its two hop neighborhood () using , then compares the obtained value with the local degree to define the . A negative value () reflects the low connectivity proportion of the node i relatively to its surrounding environment. Higher value means that node i is surrounded by a large number of neighbors and these neighbors are well connected with many other nodes, thus i is a suitable CH candidate to maintain network connectivity. Therefore, it covers the largest number of nodes within the maximum hop constraint k and generates more fault tolerant and stable cluster topology. Indeed, in case of potential CH failure, the neighborhood of this node is well connected and the replacement of the current CH does not affect the cluster performance.
(2) - Residual energy (): the remaining energy of network nodes is introduced in the CH election process. The ratio of remaining energy of a node i is computed as:
where is the initial energy of the current device and is its remaining energy.(3) -
Communication link quality (RSSI): DC2HC uses Radio Signal Strength Indicator (RSSI) as a metric to measure the quality of communications. The RSSI value (the received transmission power ) can be represented by the Log Distance Path Loss Model [53] as follows:
(4) represents the power of the transmitter’s radio signal in dBm. The distance d between the sender and the receiver is measured in meter. is the path loss exponent that depends on the environmental conditions ( in the free space propagation model). is a Gaussian random variable used in case of shadowing effect. Otherwise, it equals zero.
Therefore, the weight of a node i, based on the previous parameters, is computed as follow:
| (5) |
where represent the weighted coefficients of the corresponding metrics with the constraint . The contribution and importance of each parameter, relatively to the others, is indicated by its corresponding weighted coefficient. They are adjusted according to the system requirements and the network environment. A particular weight coefficient may be adjusted relatively to the others to obtain an optimal result for a particular network configuration. For example, in a low density environment, the residual energy should be favored. In case of a dense network, the connectivity should be favored. Whereas, in a noisy environment, the communication link quality needs to be considered. However, the proposed scheme is designed to work under a typical network with various configurations to cover different use-case scenarios. Therefore, in this experiment, all the weight coefficients are considered equal.
In DC2HC, the clustering is completely distributed where each node has only a partial view of the network which consists of its two-hop neighbors knowledge. The algorithm is designed by a set of rules of the form [If then ], where the is a predicate defined over the node partial information. If the predicate is true, then the node is said to be enabled to make a move (execute an action). This algorithm structure is inspired from the self-stabilization algorithms that are considered as advantageous approaches for tolerating transient faults in a network [54], which is desirable in an environment with a dynamic topology. We assume that each node i has a unique identifier and maintains a set of variables that constitute the Local State Values of the node (): node identifier (), its weight , (the relative CH of the current node), (the weight of the relative CH), that indicates the distance to (in term of hops), , and its parent in the shortest data aggregation path. The structure of is illustrated in Figure 3. Each node has a clustering record list that contains a set of neighbors information required by the clustering process. Nodes store the received clustering information ( beacons) in this list.
Figure 3.
Example of Local State Values () structure.
Table 3 summarizes various notations used in the proposed approach. DC2HC is composed of three phases: the initialization phase, cluster heads election phase, and maintenance phase.
Table 3.
Notation used in the proposed approach.
| Symbol | Description |
|---|---|
| Identity of device i | |
| Weight of i (computed using Equation (5)) | |
| Relative Cluster Head of i | |
| Weight of | |
| Distance between i and (in term of hops) | |
| Parent of i in the aggregation path toward the relative CH | |
| Transmitting range of i | |
| Degree of i (Number of node in the neighborhood of i) | |
| Local State Variable of i | |
| Clustering Record List (Neighbors clustering information received) | |
| Two-hop connectivity ration of i |
4.1. Initialization Phase
The BS broadcasts a periodic beacon signal at the initial stage. Based on the received signal, nodes can estimate the transmission quality to the BS (the RSSI value). After receiving this beacon, each node broadcasts a periodic message in its transmitting range. After receiving a message, a node updates its local state and replies by sending an beacon. When the new node i receives beacons from its neighborhood, it updates the list and computes its weight using Equation (5), then rebroadcasts a clustering message that contains the updated information. The beacon is broadcasted every time that a local information changes, so that network nodes can maintain consistent and updated information about their local environment. The initialization process is described in Algorithm 1. Figure 4 summarizes the initialization phase.
| Algorithm 1 Initialization phase. |
Figure 4.
Sequence diagram of the initialization phase.
4.2. Cluster Head Election Phase
The pseudo-code of the clustering process is presented in Algorithm 2. We assume that no potential failure occurs during the execution of the CHs election phase. First, to elect a cluster head, a node i browses the list and compares its weight with the weight of its neighbors and with the weight of CHs that dominate its neighbors (rule ). If is the greatest weight, i updates (elect itself as a cluster head) and set (execute ), then broadcasts a beacon that contains the new CH information. Otherwise, i chooses the node with the highest weight value in list as its new CH. In the case where two or more nodes have the same highest weight, the node identifier is used as a tie-breaker, i.e., the device that has the highest is elected as CH. Rule prevents the formation of poorly structured clusters, it allows network nodes to choose the most appropriate cluster head in their k-hop neighborhood. Otherwise, the node chooses the second weightiest node in and so on until finding the weightiest CH with less than k hops of distance. If no meets these requirements, then the current node elects itself as a new CH to avoid isolated node scenario. Node i updates with the identifier of the chosen node from (R1) and selects the path with the minimum number of hops toward the CH according to the information received from its one hop neighborhood (using rule (R3)). Consequently, nodes will be constrained to join the closest cluster that includes the weightiest CH, which prevents the formation of a height number of small clusters. The cluster heads election process is illustrated in Figure 5.
| Algorithm 2 Cluster Head election phase. |
|
Figure 5.
The cluster head election phase.
Figure 6 shows an execution scenario of the clustering process with in a small network (modeled by a graph). Green nodes represent the CHs and the white nodes represent the cluster members. Tables (b,d,f,h) in Figure 6 show the different nodes parameter. Figure 6a,g present, respectively, the initial network state and the final clustered network. Initially, network nodes have received the signal message from the BS and exchanged their clustering information. At each stage, the variables of each node used during the clustering are illustrated in the corresponding matrix. Notice in Figure 6a, the weight of nodes 1 and 11 are the highest among all the nodes in their lists. During the following round (Figure 6c) these two nodes execute rule to update their value (became CHs) and rule to update the distance . Next, nodes 1 and 11 send an announcement beacon to their neighbors. When the neighbors of these nodes receive the message, they update their lists and join the CH with the highest weight using rule , then execute to select the shortest path toward their CHs using neighbors information. At this stage, two clusters are formed in the network: , . Next (Figure 6e), as new members joined the cluster, the members send message that contains the updated cluster information to their surrounding neighbors. Therefore, in the last state (Figure 6g) the same situation can be repeated for the rest of the nodes. The remaining unallocated nodes have received the clustering information and updated their lists. These nodes join the cluster with the weightiest CH, then update their distance using () to form the final two hops clusters.
Figure 6.
Execution scenario of Distributed Clustering based 2-Hop Connectivity (DC2HC) clustering process.
4.3. Maintenance
In a dynamic wireless network, frequent topology changes can occur due to device mobility, battery draining, lack of coverage, etc. The clustered structure must be resilient to eventual node disconnections factor. Our approach adopts a continuous clustering maintenance, where devices periodically exchange control information. This mechanism is suitable for a dynamic scenario where disconnection events frequently occur [20]. The DC2HC re-clustering process can be locally driven and does not affect the entire network when disconnection events occur. Frequently updated control information enables a faster reaction to disconnection events. Thus, the clustered structure is more efficient and stable. The cluster maintenance phase is described as follows:
4.3.1. Cluster Leaving
Each node monitors its local environment through the periodically exchanged beacon messages to keep track of the neighborhood members. When a node leaves the cluster (following a disconnection factor), it stops transmitting; the surrounding neighbors detect this event and remove this node from their lists. If the leaving node is a cluster head, rule (R1) will be activated and CMs re-execute this rule to elect a new CH and perform the necessary updates. Otherwise (the case where the leaving node is not a CH), rule (R3) will be activated and CMs having it as forwarder (to access the CH in multi-hop fashion) will choose another path to relay their information. The cluster leaving process is illustrated in Figure 7.
Figure 7.
The cluster head leaving process.
4.3.2. Cluster Joining
When a node i decides to join a cluster, it executes the initialization phase and broadcasts a join request to the nearest neighbors. These neighbors reply by sending an beacon that contains the clustering information. The new node saves the received information in its list and computes its weight value . If it has the largest weight among all the members, then it elects itself as the new CH and broadcasts an announcement message, so that the surrounding neighbors can perform the necessary changes (set the new node as their new CH). Otherwise, the new node joins the cluster of the weightiest CH in its k-hop neighborhood. Next, i selects the closest node to the CH (node with the lowest RSSI value) as its new parent to relay the collected data.
In the case where no reply packet is received, i.e., the new node is inside an isolated region, the new node i elects itself as a cluster head (to avoid isolated node scenario), updates its local state () and broadcasts a packet, since other nodes may have joined this region while i was executing the joining procedure. The cluster joining process is shown in Figure 8.
Figure 8.
The cluster head joining process.
5. Energy Model and Transmission Reliability
Wireless network devices perform many functionalities (i.e., sensing, processing, transmitting and receiving information). Among all those functionalities, wireless communication is the one, which depletes most of the energy [36]. Therefore, in this study, we do not consider the energy dissipated in the data processing. The energy consumption model for the proposed DC2HC is adopted from the radio model used in [40], it assumes a simple communication model for the radio hardware battery consumption. In this model, the transmitter consumes an amount of power to run the radio electronics and the power amplifier. On the other side, the receiver consumes energy to detect and decode the radio signal as illustrated in Figure 9. Radio model parameters are illustrated in Table 4.
Figure 9.
Radio energy consumption model.
Table 4.
Simulation parameters used in the experiment setting.
| Parameter | Value |
|---|---|
| Network size () | 1000 × 1000 m |
| Node density | |
| Distribution of nodes | Random |
| connectivity model | Unit Disk Graph (UDG [59]) |
| Transmitting range () | 70 m |
| Maximum hop constraint k | |
| 1/3, 1/3, 1/3 | |
| 50 nJ/bit | |
| 10 pJ/ bit/ M | |
| 0.0013 pJ/ bit/ M | |
| Data packet size | 100 bytes |
| Initial energy | 1 Joule |
Equation (6) computes the energy required to transmit a data packet with l bits over a distance d, where is the power dissipation to run the transmitter circuitry for transmission or reception. represents the power amplifier and depends on the distance to the receiver. is the power consumption of the free space propagation, is the power consumption of multi-path propagation and is a threshold distance. When the distance between the transmitter and the receiver is lower than , the free space model is used. Otherwise, the multi-path model is used. is calculated as:
| (6) |
where:
Equation (7) represents the dissipated energy by the receiver in receiving ‘l’ bits of data.
| (7) |
Transmission reliability plays an essential criterion to improve the QoS of an application. The well-known available Link Quality Estimators (LQEs) are shown in Figure 10. Among all these estimators, Radio Signal Strength Indicator (RSSI), Link Quality Indicator (LQI) and Packets Received Rate (PRR) are the most common metrics used to estimate transmission quality [36]. RSSI measures the power signal of the received packets. LQI indicates the correctness of the received packets based on the first eight bits of that packet. LQI is an efficient estimator, but the RSSI perform good results with a small number of measurements and converge faster than LQI. PRR is considered as the best indicator for link quality [55]. However, it requires more time and energy to perform an accurate quality value. For these reasons, RSSI is chosen as the link quality estimator in this study. Lower RSSI value implies a weaker signal. It is measured in decibel, the closer this value is to zero the better the signal is. For example, −50 dBm is a good signal and dBm is fairly reasonable.
Figure 10.
Available link quality estimators (LQE’s) [56].
6. Convergence
Since the network structure is dynamic, the clustering algorithms must have a quick convergence time (Convergence time: represents the duration from when a node starts the execution of the clustering algorithm until the cluster is finally constructed. At the convergence point, no more executions are performed by the node until the end of the clustering process). The convergence time of the algorithm is measured in terms of rounds. Each round is estimated by a number of movements. Therefore, in this section we will prove that our algorithm requires a finite number of movements in the clustering process, which implies its convergence. We assume that the network starts from an arbitrary configuration.
Lemma 1.
Let be the node that has the highest weight value in G (i.e., . i makes at most 2 movements (executes (R1) and (R3)).
Proof.
We show that node i executes a finite number of movements. □
We assume that the value of is not updated. Since i is the weightiest node in G, it has the highest weight among all its neighbors (). The rule is enabled at node i, it will update the value (CH). Next, is executed, i updates the distance , afterward, no more rules are executed by node i, so it will not make another move. and will have the same values during the setup phase.
Lemma 2.
Neighbors at distance from the node with the highest weight will execute a finite number of movements.
Proof.
We show that the k-hop neighbors of i execute a finite number of movements (at most movements) before reaching the final state (Final state (or stable state): represents the state where the node has reached the convergence point. From this state, the node has a correct clustering variable () and all the algorithm rules are disabled for this node). □
After that, node i (the node with the highest weight) reaches a stable state (Lemma 1). Rule R1 and R3 will be enabled for its direct neighborhood , these neighbors will update their value (), then execute R3 to update the distance (2 movements). After that, no more rule will be enabled in the neighborhood of i ( has reached a final state).
This execution will be repeated by all nodes . Each node will execute at most 2 movements ( and ) then finish their execution. Hence, the same scenario is repeated for the rest of nodes until it covers all the nodes in the sub-graph that contains i and its k-hop neighborhood. Thus, the k-hop neighbors of the node with the highest weight reach the final state after at most movements and will not be able to execute any more movements.
Lemma 3.
The stability of DC2HC is ensured.
Proof.
Since node i with the highest weight in the network executes a finite number of movements (Lemma 1) and the k-hop neighbors of node i also execute a finite number of movements (Lemma 2). This implies that the sub-graph composed by the set of nodes reaches a stable state after a finite number of movements. Let be the graph obtained by removing the first stabilized sub-graph from G. The execution given above in G can be repeated in , the second sub-graph that contains the node with the highest weight in stabilizes with the same reasoning, so all the nodes of the graph will follow this reasoning. This implies that the total number of moves executed by DC2HC is finite. □
7. Complexity
In the previous section, we demonstrated that the proposed approach terminates within a finite number of movements (). However, the convergence complexity is not provided. In this section, the complexity of the proposed algorithm is examined in both theoretical and simulation-based analyses.
7.1. Theoretical Analysis
In the following, we assume the worst configuration from which our algorithm can start. Then we study the complexity of DC2HC.
There is a known configuration from which DC2HC fails to provide good results (the worst-case scenario). This scenario is when nodes are related and organized in a straight line and their are monotonically increasing or decreasing as illustrated in Figure 11. In this configuration (network with low density), the maximum degree of each node is: . In this case, network nodes will have the same weight and the election of cluster head depends on nodes . Although, this configuration is unlikely to occur in a real-world network. It will allow the computation of the complexity in the worst case.
Figure 11.
Worst-case scenario ().
In the following, we prove that the time complexity of DC2HC is at most rounds, where is the number of nodes on the network.
Lemma 4.
Let i be the node with highest weight in G then:
- (a)
After 2 rounds and in all following rounds, i is a cluster head ( and ).
- (b)
After rounds and in all following rounds, the neighbors of node i at distance form a cluster, where .
Proof.
First, we demonstrate that (a) is true. In the first round, as i is the node with the highest weight in G, it has the high weight value among all its neighbors.
□
This node executes rule R1 to become a CH. In the second round, i executes rule R2 to update the distance value . After that, no more rules are activated at node i, so it will not execute another move in the following rounds. Property (b) means that the sub-graph that contains node i and its neighbors at distance reaches a stable state after at most rounds. In the 3rd round, when node i finishes its execution, rule R1 will be enabled for its neighborhood. These neighbors join the cluster of node i. Next, they execute R3 to update their distance (round 4). After round 4, no more rules can be activated in the neighborhood of i, so they will not execute other movements in the following rounds.
The argument given above is repeated for the neighbors at distance from i (i.e., neighbors of i will reach a stable state after rounds). Therefore, to form a cluster, two rounds are required to elect the CH and rounds to form the cluster. By induction, each node with the highest weight and its neighbors finish their execution after at most rounds.
Lemma 5.
The maximum number of clusters that can be generated with DC2HC in the worst case configuration is where .
Proof.
DC2HC divides the graph G into several spanning trees where each tree has the node with the highest weight as its root (the cluster head) and its neighbors at a distance represent the rest of this tree (cluster). Therefore, the minimum number of nodes that can be in a cluster is . In the worst-case scenario (the graph shown in Figure 11), a related graph can contain clusters. As each cluster is represented by only one CH, the graph can contain at most cluster heads. One is added to the previous threshold to cover the case where . Thus, we obtain , which represents the maximum number of CHs formed by DC2HC in the worst-case configuration. □
Lemma 6.
DC2HC algorithm converges after at most rounds.
Proof.
According to Lemma 4, the subset that contains the node with the highest weight and its neighbors at a distance () stabilizes after at most successive rounds. The same process is repeated in the graph . As G contains at most clusters (Lemma 5) and each cluster takes rounds to reach a stable state. Thus, the proposed protocol requires at most ( rounds to form all the clusters in the network. □
Lemma 7.
DC2HC algorithm has a linear time complexity of rounds.
Proof.
Based on Lemma 6, the upper bound of the time needed for the execution of DC2HC is rounds. Thus, it is obvious that the time complexity (convergence time) of the algorithm is . As , the proposed algorithm converges after at most rounds. □
Lemma 8.
DC2HC algorithm has a linear space complexity.
Proof.
Each node has to maintain the 2-hop neighbors information in its data structure. Therefore, the space complexity of each node will not increase as long as the local density remains constant. The space complexity of DH2HC is , where represents the 2-hop local density. As , the complexity of the proposed algorithm is linear, which is needed in a resource constrained environment. □
The number of nodes inside clusters depends upon the network density and the k- constraint. Indeed, in the case of complete graph, all nodes can be grouped within a singleton cluster. Hence, the maximum number of nodes in a cluster is n, where n is the number of nodes in the network. However, this situation may not often occur in real world networks. Therefore, by considering a related graph, the maximum number of clusters that can be generated by the proposal is (Lemma 5), thus, the minimum limit of member inside each cluster is equal to .
7.2. Clustering Property
To prove that the proposed approach works properly. Clustering properties (safety and liveness) need to be satisfied.
7.2.1. Safety Property
The safety property ensures that network nodes are grouped into clusters and each cluster has only one CH to avoid overlapping between clusters.
Lemma 9.
The safety property is verified.
Proof.
Each ordinary node elects the node with the highest weight among its multi-hop neighbors as its cluster head and the variable holds only one value based on list. Thus, a node can only belong to one cluster at a time and is covered by a unique CH. As a result, the safety property is satisfied. □
7.2.2. Liveness Property
The liveness property ensures that the clustering progresses normally and reaches a final state after a finite time.
Lemma 10.
The liveness property is satisfied.
Proof.
According to Lemma 3 and Lemma 6, the proposed algorithm executes a finite number of movements and converges after at most rounds. Hence, the liveness property is satisfied.
8. Simulation
8.1. Experimental Settings
The performances of the proposed approach are analyzed and compared using a simulator implemented in java using Java Universal Network/Graph (JUNG) [57] a Java based library that allows the modeling, analysis, and visualization of a wireless network as a graph. The network topology is composed of a variable number of nodes () distributed across a square area of size = 1000 × 1000 m. A random distribution is assumed to generate a random network topology, which is typically used in clustering approaches in the literature to approximate a real deployment scenario. Conventional sensor network usually uses wireless communication standard with low power consumption [58], such as IEEE 802.15.4 Zigbee (with a maximum transmitting distance of 100 m) or the 802.11n [28] (with a transmitting distance of 70 m). Therefore, based on the wireless communication standards used by regular wireless networks, in this experiment, we assume that network nodes have a transmission range of m. We use the classic Unit Disk Graph (UDG) connectivity model [59] where communication links are symmetric, i.e., a wireless communication link exists between two nodes i and j if they are within each other’s transmission range (). The energy model used is described in Section 5, node has 1 joule of initial energy and the size of a data packet is bytes. The k-hop clustering decreases the number of reconfiguration events that may occur inside the cluster [20]. Therefore, instead of using a periodic CH rotation for load balancing. In this study, the CH rotation occurs when the weight of the current CH is exceeded by one of its k-hop neighbors, which means that the current cluster has undergone a considerable topology changes. This mechanism avoids the quick alternation of CHs and further reduces the number of clustering messages generated. The experiment parameters are listed in Table 4. Increasing the number of communication hops inside each cluster generates long routing paths which may extensively increase the data transmission delay. Thereby, the performance of our clustering algorithm is analyzed by considering . The k-hop constraint ought to be specified depending on the application requirements to improve the network performance. The proposed scheme is experimented with varying maximum hop values and different nodes density to analyze the network performance under different scenarios.
In the following section, the performance of our approach DC2HC is compared with two ubiquitous and recent protocols that belong to the same family of multi-hop clustering. MH-LEACH [46] and Mezghani protocol [34] are both used for the k-hop intra-clustering and their primary objective is to reduce the waste of energy and the number of generated clusters. Owing to these characteristics, these protocols are selected for the performance comparison to our proposed protocol.
Five parameters are used for the performance analysis of the simulated protocols, namely, the cluster heads cardinality, the energy consumption, number of exchanged messages, the average network lifetime and the number of dead nodes. The same parameters are used to compare the three protocols. Each simulation result is the average of 10 measurements for each used metric with varying density and node distributions.
8.2. Experimental Results
8.2.1. Cluster Head Cardinality
It represents the average number of generated clusters. This metric allows the evaluation of clustering efficiency. Low CHs cardinality reveals good characteristics of the clustering scheme as it represents the number of communication channels established with the BS. Moreover, reducing the CHs cardinality limits the usage of long-range communication channels which reduces the risk of congestion and improve the energy consumption. Figure 12 shows the average number of cluster heads generated by DC2HC, Mezghani [34] and MH-LEACH [46] protocols under different nodes density . We observe that MH-LEACH generates the highest cardinality. Indeed, MH-LEACH uses a probabilistic technique for load balancing the CH task among nodes. This technique does not consider the residual energy or the surrounding environment of nodes. When the density converges from 200 to 800 () with , the environment tends to be more connected which enlarges the set of neighbors within the transmitting range of each node. Therefore, in Figure 12b,c, we observe that clusters cardinality of MH-LEACH start to decrease in the range between because the coverage of CHs regroups more nodes. Mezghani protocol considers the residual energy of nodes which improves the cardinality when (improved by an average of 43.7% compared to MH-LEACH). However, the clustering process only considers the average one-hop degree of nodes, accordingly, when , the protocol slightly degrades in performance. The proposed scheme uses the k-hop clustering which minimizes the CHs cardinality and avoids having remote nodes within a forced singleton clusters. According to Figure 12, the proposed scheme shows better performance, it reduces the cardinality by an average of 18.3% and 62% when compared to Mezghani and MH-LEACH respectively. Table 5 shows the average gain of DC2HC compared to Mezghani and MH-LEACH in terms of CHs cardinality.
Figure 12.
Average cluster head cardinality using the k-hop intra-clustering (a) , (b) , (c) .
Table 5.
Synthesis of the average CH’s cardinality gains compared with Mezghani and MH-LEACH.
| Clustering Algorithm | Intra-Cluster Topology | ||
|---|---|---|---|
| Single-hop | Two-hop | Three-hop | |
| Mezghani | 6.9% | 21.1% | 27% |
| MH-LEACH | 55.3% | 64.2% | 67.3% |
8.2.2. Average Exchanged Messages and Consumed Energy
As wireless communication is the most expensive operation in wireless networks and depletes most of nodes energy, the number of exchanged messages and the consumed energy are strongly associated and have a significant impact on devices lifespan. Figure 13 and Figure 14, respectively, show the average energy consumed by network nodes and the average number of exchanged messages during the clustering process with according to nodes density increase and considering . The curves’ shape show that the energy consumed by network devices is proportional to the number of exchanged messages. In general, as the density increases the energy consumed and the number of messages, generated by the three approaches, increase as well. The multi-hop communications reduce the energy consumption by reducing the communication distance from CMs to their CH, especially when the size of the network scales. Figure 13 demonstrates that whatever the number of deployed nodes, DC2HC consumes less energy than the other protocols. This improvement can be attributed to the small number of elected CHs and reduced CH rotation that decreases the number of clustering messages exchanged. The number of exchanged messages is reduced by 36.5% and 6.9% compared to Mezghani protocol and MH-LEACH protocol respectively. The energy consumption is also reduced by an average of 21.7%, which is suitable for increasing the network lifetime. Table 6 summarizes the gains obtained by DC2HC when compared to Mezghani and MH-LEACH in terms of energy consumption.
Figure 13.
Average energy consumption of the three approaches with (a) , (b) , (c) .
Figure 14.
Average number of exchanged messages during the clustering process (a) , (b) , (c) .
Table 6.
Synthesis of energy consumption gains compared with Mezghani and MH-LEACH.
| Clustering Algorithm | Intra-Cluster Topology | ||
|---|---|---|---|
| Single-hop | Two-hop | Three-hop | |
| Mezghani | 28.7% | 37% | 37.1% |
| MH-LEACH | 10.6% | 13.8% | 3.1% |
8.2.3. Average Network Lifetime
Several works define the network lifetime as the period from network initialization to the round when the last node dies [9,46]. This parameter is important because it shows how long network nodes are able to run the protocol. Moreover, the early death of nodes can lead to a disconnection of some part of the network. Therefore, to evaluate the lifetime of the network, we considered the round at which the first node die (FND) and last node die (LND). Figure 15 shows the time at which the first node died according to different level of density. Typically, when the density increases, the connectivity among nodes increases, which reduces the CHs cardinality and balances the energy consumption among CMs. In MH-LEACH nodes die quickly because the protocol does not consider the residual energy of nodes. According to Figure 15, when the density is greater than 200 () the FND round of MH-LEACH tends to stabilize between 1400 and 1600 rounds. Mezghani protocol reveals better performance compared to MH-LEACH (improved by 45.2%) due to the reduced number of generated CHs (Figure 12) and to the usage of Khalimsky theory [34] to elaborate an energy efficient cluster topology. According to Figure 15a, DC2HC shows the highest durability, where the FND node reached 2876 round, whereas, in Mezghani and MH-LEACH it only reached 2591 and 1565 rounds, respectively. When increasing the maximum hop constraint (), the performance of the three simulated protocols increase due to the usage of the multi-hop clustering, which reduces the energy consumption. The curve allure of DC2HC in Figure 15b shows an improvement in performance compared to the other approaches. Indeed, the proposed scheme generates a low cardinality of dense clusters based on the neighborhood value. DC2HC uses the two hop neighbors information to favor nodes located in a well-connected region to be elected as a CH, it uses a multi-hop routing tree inside each cluster to improve the intra-cluster communications. Therefore, the connectivity among clusters is improved which reduces the waste of energy devoted to wireless transmission. Consequently, D2MHC achieves a gain factor of 13.3% and 58.5% compared to Mezghani and MH-LEACH respectively.
Figure 15.
First node death according to different nodes density with (a) single-hop, (b) multi-hop.
Figure 16 shows the round at which all network nodes died versus the network density () considering . In MH-LEACH, the role of CHs is rotated randomly and periodically which reduces the number of setup messages, therefore, MH-LEACH behaves better than Mezghani protocol. However, using DC2HC allows a further extension of nodes lifetime since it minimizes the set of cluster heads and, thus, it reduces the waste of energy devoted to long range communications. Moreover, it limits the number of CH rotation which reduces the clustering messages and the overall energy consumption offering the network a longer lifetime. Our proposed protocol outperforms Mezghani and MH-LEACH protocols in terms of network lifetime by 26.3% and 13.3% respectively.
Figure 16.
Last node death according to different nodes density with (a) , (b) , (c) .
Figure 17 depicts the total number of nodes that remain alive over execution time considering the number of deployed nodes . Although the performances of the three protocols initially look similar, we observe that DC2HC has more alive nodes than the other algorithm with the growth of rounds. MH-LEACH selects the set of CHs based on random probabilities and does not consider nodes residual energy, which results in a faster death of network nodes. At the end of the clustering process only few nodes are remaining alive. Nevertheless, using our protocol allows network nodes to last for longer period. Whereas with the other protocols, nodes died faster. Table 7 summarizes the gains obtained by DC2HC when compared to Mezghani and MH-LEACH in terms of energy consumption.
Figure 17.
Average number of alive nodes over execution time with deployed nodes and (a) , (b) , (c) .
Table 7.
Network lifetime gains compared with Mezghani and MH-LEACH.
| Clustering Algorithm | Intra-Cluster Topology | |||
|---|---|---|---|---|
| FND | LND | |||
| Single-hop | Multi-hop | Single-hop | Multi-hop | |
| Mezghani | 30.5% | 24.2% | 16.4% | 10.2% |
| MH-LEACH | 14.4% | 14.7% | 75.1% | 41.8% |
9. Conclusions and Future Works
Energy consumption is a challenging design in the conception of wireless networks. Long distance communication channels used by cluster heads to reach the base station consume a significant amount of energy and accelerate the appearance of dead nodes and congestion problems. In this context, we present a new distributed approach for k-hop intra-clustering called Distributed Clustering based 2-Hop Connectivity (DC2HC) for large networks. The approach optimizes the set of representative cluster heads and extends the network lifetime. The cluster heads election is performed based on the two-hop neighbors connectivity of nodes to strength the cluster connectivity. It also considers the residual energy of nodes to balance the energy consumption among larger clusters. We proved that the proposed approach has a linear time complexity of rounds, where is the number of nodes in the network. Various simulation experiments have been performed to evaluate the performance of the proposed scheme with different parameters. Simulation results show that the proposed algorithm provides better performance compared to similar algorithms. The cluster heads cardinality is reduced by 40.1%, the energy consumption is enhanced by 21.7% and the network lifetime is extended by 20.8%. As future work, we plan to study the effect of introducing the State of Health () of rechargeable batteries [60] during the clustering and integrating an optimized attack prevention schemes [61] to avoid the sudden death of network device and further increase the network durability.
Author Contributions
M.S.B. conceived the idea, performed the analysis and wrote the first draft of the paper; H.M. and S.H. reviewed, edited and finalized the writeup of the paper. Z.A. assisted with the experiment design, the data processing and revision. All authors have read and agreed to the submitted version of the manuscript.
Funding
This research was funded by UAEU-UPAR, grant number 31T102-UPAR-1-2017.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Atzori L., Iera A., Morabito G. The internet of things: A survey. Comput. Netw. 2010;54:2787–2805. doi: 10.1016/j.comnet.2010.05.010. [DOI] [Google Scholar]
- 2.Al-Fuqaha A., Guizani M., Mohammadi M., Aledhari M., Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015;17:2347–2376. doi: 10.1109/COMST.2015.2444095. [DOI] [Google Scholar]
- 3.Siow E., Tiropanis T., Hall W. Analytics for the internet of things: A survey. ACM Comput. Surv. (CSUR) 2018;51:1–36. doi: 10.1145/3204947. [DOI] [Google Scholar]
- 4.Sethi P., Sarangi S. Internet of Things: Architectures, Protocols, and Applications. J. Electr. Comput. Eng. 2017;2017:1–25. doi: 10.1155/2017/9324035. [DOI] [Google Scholar]
- 5.Sadek R. Hybrid energy aware clustered protocol for IoT heterogeneous network. Future Comput. Inf. J. 2018;3:166–177. doi: 10.1016/j.fcij.2018.02.003. [DOI] [Google Scholar]
- 6.Liaqat M., Gani A., Anisi M., Ab Hamid S., Akhunzada A., Khan M., Ali R. Distance-based and low energy adaptive clustering protocol for wireless sensor networks. PLoS ONE. 2016;11:1–29. doi: 10.1371/journal.pone.0161340. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 7.Toor A., Jain A. Energy aware cluster based multi-hop energy efficient routing protocol using multiple mobile nodes (MEACBM) in wireless sensor networks. AEU-Int. J. Electron. Commun. 2019;102:41–53. doi: 10.1016/j.aeue.2019.02.006. [DOI] [Google Scholar]
- 8.Rostami A., Badkoobe M., Mohanna F., Hosseinabadi A., Sangaiah A., Sangaiah A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2018;74:277–323. doi: 10.1007/s11227-017-2128-1. [DOI] [Google Scholar]
- 9.Sert S., Alchihabi A., Yazici A. A two-tier distributed fuzzy logic based protocol for efficient data aggregation in multihop wireless sensor networks. IEEE Trans. Fuzzy Syst. 2018;26:3615–3629. doi: 10.1109/TFUZZ.2018.2841369. [DOI] [Google Scholar]
- 10.Ozger M., Alagoz F., Akan O. Clustering in multi-channel cognitive radio ad hoc and sensor networks. IEEE Commun. Mag. 2018;56:156–162. doi: 10.1109/MCOM.2018.1700767. [DOI] [Google Scholar]
- 11.Batta M.S., Harous S., Louail L., Aliouat Z. A Distributed TDMA Scheduling Algorithm for Latency Minimization in Internet of Things; Proceedings of the IEEE International Conference on Electro Information Technology (EIT); Brookings, SD, USA. 20–22 May 2019; pp. 108–113. [Google Scholar]
- 12.Batta M.S., Aliouat Z., Harous S. A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT; Proceedings of the IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON); New York, NY, USA. 10–12 October 2019; pp. 768–774. [Google Scholar]
- 13.Cengiz K., Dag T. Energy aware multi-hop routing protocol for WSNs. IEEE Access. 2018;6:2622–2633. doi: 10.1109/ACCESS.2017.2784542. [DOI] [Google Scholar]
- 14.Singh S., Kumar P., Singh J., Alryalat M. An energy efficient routing using multi-hop intra clustering technique in WSNs; Proceedings of the IEEE Region 10 Conference (TENCON); Penang, Malaysia. 5–8 November 2017; pp. 381–386. [Google Scholar]
- 15.Kumaresan K., Kalyani S. Energy efficient cluster based multilevel hierarchical routing for multi-hop wireless sensor network. J. Ambient. Intell. Humaniz. Comput. 2020:1–10. doi: 10.1007/s12652-020-01700-0. [DOI] [Google Scholar]
- 16.Batta M.S., Mabed H., Aliouat Z. International Symposium on Modelling and Implementation of Complex Systems. Springer; Berlin/Heidelberg, Germany: 2020. Dynamic Clustering Based Energy Optimization for IoT Network; pp. 77–91. [Google Scholar]
- 17.Ahmed T., Abdur M., Zaman A., Amjad M. A Scalable K-hop Clustering Algorithm for Pseudo linear MANET. Int. J. Comput. Appl. 2018;180:62–68. [Google Scholar]
- 18.Batta M.S., Aliouat Z., Mabed H., Harous S. LTEOC: Long Term Energy Optimization Clustering for Dynamic IoT Networks; Proceedings of the IEEE 11th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON); New York, NY, USA. 28–31 October 2020. [Google Scholar]
- 19.Turgut I. Analysing Multi-hop Intra-Cluster Communication in Cluster-Based Wireless Sensor Networks. Nat. Eng. Sci. 2019;4:43–51. [Google Scholar]
- 20.Sucasas V., Radwan A., Marques H., Rodriguez J., Vahid S., Tafazolli R. A survey on clustering techniques for cooperative wireless networks. Ad. Hoc. Netw. 2016;47:53–81. doi: 10.1016/j.adhoc.2016.04.008. [DOI] [Google Scholar]
- 21.Sim M., Lim Y., Park S.H., Dai L., Chae C. Deep learning-based mmWave beam selection for 5G NR/6G with sub-6 GHz channel information: Algorithms and prototype validation. IEEE Access. 2020;8:51634–51646. doi: 10.1109/ACCESS.2020.2980285. [DOI] [Google Scholar]
- 22.Kaur S., Mir R. Clustering in wireless sensor networks-a survey. Int. J. Comput. Netw. Inf. Secur. 2016;8:38. doi: 10.5815/ijcnis.2016.06.05. [DOI] [Google Scholar]
- 23.Meka S., Fonseca B. Improving route selections in ZigBee wireless sensor networks. Sensors. 2020;20:164. doi: 10.3390/s20010164. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Maass A., Nevsic D., Postoyan R., Dower P. Lp stability of networked control systems implemented on WirelessHART. Automatica. 2019;109:108514. doi: 10.1016/j.automatica.2019.108514. [DOI] [Google Scholar]
- 25.Bouaziz M., Rachedi A. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Comput. Commun. 2016;74:3–15. doi: 10.1016/j.comcom.2014.10.004. [DOI] [Google Scholar]
- 26.Yassein M., Mardini W., Khalil A. Smart homes automation using Z-wave protocol; Proceedings of the International Conference on Engineering & MIS (ICEMIS); Agadir, Morocco. 22–24 September 2016; pp. 1–6. [Google Scholar]
- 27.Xu L., O’Hare G.M., Collier R. A smart and balanced energy-efficient multihop clustering algorithm (smart-beem) for mimo iot systems in future networks. Sensors. 2017;17:1574. doi: 10.3390/s17071574. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 28.Molina-Masegosa R., Gozalvez J., Sepulcre M. Comparison of IEEE 802.11 p and LTE-V2X: An Evaluation With Periodic and Aperiodic Messages of Constant and Variable Size. IEEE Access. 2020;8:121526–121548. doi: 10.1109/ACCESS.2020.3007115. [DOI] [Google Scholar]
- 29.Lauridsen M., Kovacs I., Mogensen P., Sorensen M., Holst S. Coverage and capacity analysis of LTE-M and NB-IoT in a rural area; Proceedings of the IEEE 84th Vehicular Technology Conference (VTC-Fall); Montreal, QC, Canada. 18–21 September 2016; pp. 1–5. [Google Scholar]
- 30.Sinha R., Wei Y., Hwang S. A survey on LPWA technology: LoRa and NB-IoT. ICT Express. 2017;3:14–21. doi: 10.1016/j.icte.2017.03.004. [DOI] [Google Scholar]
- 31.Darroudi S.M., Gomez C. Bluetooth low energy mesh networks: A survey. Sensors. 2017;17:1467. doi: 10.3390/s17071467. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 32.Chiani M., Elzanaty A. On the LoRa modulation for IoT: Waveform properties and spectral analysis. IEEE Internet Things J. 2019;6:8463–8470. doi: 10.1109/JIOT.2019.2919151. [DOI] [Google Scholar]
- 33.Sung Y., Lee S., Lee M. A Multi-Hop Clustering Mechanism for Scalable IoT Networks. Sensors. 2018;18:961. doi: 10.3390/s18040961. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 34.Mezghani M. An efficient multi-hops clustering and data routing for WSNs based on Khalimsky shortest paths. J. Ambient. Intell. Humaniz. Comput. 2019;10:1275–1288. doi: 10.1007/s12652-018-0950-9. [DOI] [Google Scholar]
- 35.Elhoseny M., Farouk A., Zhou N., Wang M.M., Abdalla S., Batle J. Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wirel. Pers. Commun. 2017;95:3733–3753. doi: 10.1007/s11277-017-4023-8. [DOI] [Google Scholar]
- 36.Xu L., Collier R., O’Hare G.M. A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet Things J. 2017;4:1229–1249. doi: 10.1109/JIOT.2017.2726014. [DOI] [Google Scholar]
- 37.Dehkordi S., Farajzadeh K., Rezazadeh J., Farahbakhsh R., Sandrasegaran K., Dehkordi M. A survey on data aggregation techniques in IoT sensor networks. Wirel. Netw. 2020;26:1243–1263. doi: 10.1007/s11276-019-02142-z. [DOI] [Google Scholar]
- 38.Zanjireh M., Larijani H. A survey on centralised and distributed clustering routing algorithms for WSNs; Proceedings of the IEEE 81st Vehicular Technology Conference (VTC Spring); Glasgow, UK. 11–14 May 2015; pp. 1–6. [Google Scholar]
- 39.Song F., Ai Z., Zhang H., You I., Li S. Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems. IEEE Trans. Ind. Inf. 2020 doi: 10.1109/TII.2020.3029766. [DOI] [Google Scholar]
- 40.Al-Janabi T.A., Al-Raweshidy H.S. Optimised clustering algorithm-based centralised architecture for load balancing in IoT network; Proceedings of the International Symposium on Wireless Communication Systems (ISWCS); Bologna, Italy. 28–31 October 2017; pp. 269–274. [Google Scholar]
- 41.Song L., Chai K., Chen Y., Schormans J., Loo J., Vinel A. QoS-aware energy-efficient cooperative scheme for cluster-based IoT systems. IEEE Syst. J. 2017;11:1447–1455. doi: 10.1109/JSYST.2015.2465292. [DOI] [Google Scholar]
- 42.Li J., Silva B.N., Diyan M., Cao Z., Han K. A clustering based routing algorithm in IoT aware Wireless Mesh Networks. Sustain. Cities Soc. 2018;40:657–666. doi: 10.1016/j.scs.2018.02.017. [DOI] [Google Scholar]
- 43.Heinzelman W., Chandrakasan A., Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002;1:660–670. doi: 10.1109/TWC.2002.804190. [DOI] [Google Scholar]
- 44.Xiao M., Zhang X., Dong Y. An effective routing protocol for energy harvesting wireless sensor networks; Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC); Shanghai, China. 7–10 April 2013; pp. 2080–2084. [Google Scholar]
- 45.Nayak P., Devulapalli A. A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens. J. 2015;16:137–144. doi: 10.1109/JSEN.2015.2472970. [DOI] [Google Scholar]
- 46.Ammar A., Dziri A., Terre M., Youssef H. Multi-hop LEACH based cross-layer design for large scale wireless sensor networks; Proceedings of the International wireless communications and mobile computing conference (IWCMC); Paphos, Cyprus. 5–9 September 2016; pp. 763–768. [Google Scholar]
- 47.Wu C., Chiang T., Fu L. An ant colony optimization algorithm for multi-objective clustering in mobile ad hoc networks; Proceedings of the IEEE Congress on Evolutionary Computation (CEC); Beijing, China. 6–11 July 2014; pp. 2963–2968. [Google Scholar]
- 48.Ghosh S., Mondal S., Biswas U. Enhanced PEGASIS using ant colony optimization for data gathering in WSN; Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES); Chennai, India. 25–26 February 2016; pp. 1–6. [Google Scholar]
- 49.Albath J., Thakur M., Madria S. Energy constraint clustering algorithms for wireless sensor networks. Ad Hoc Netw. 2013;11:2512–2525. doi: 10.1016/j.adhoc.2013.05.016. [DOI] [Google Scholar]
- 50.Deshpande V., Patil A. Energy efficient clustering in wireless sensor network using cluster of cluster heads; Proceedings of the International conference on wireless and optical communications networks (WOCN); Bhopal, India. 26–28 July 2013; pp. 1–5. [Google Scholar]
- 51.Luo J., Wu D., Pan C., Zha J. Optimal energy strategy for node selection and data relay in WSN-based IoT. Mob. Netw. Appl. 2015;20:169–180. doi: 10.1007/s11036-015-0592-5. [DOI] [Google Scholar]
- 52.Addario-Berry L., Broutin N., Goldschmidt C., Miermont G. The scaling limit of the minimum spanning tree of the complete graph. Ann. Probab. 2017;45:3075–3144. doi: 10.1214/16-AOP1132. [DOI] [Google Scholar]
- 53.Abbasi A., Younis M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007;30:2826–2841. doi: 10.1016/j.comcom.2007.05.024. [DOI] [Google Scholar]
- 54.Neggazi B., Guellati N., Haddad M., Kheddouci H. Efficient Self-Stabilizing Algorithm for Independent Strong Dominating Sets in Arbitrary Graphs. Int. J. Found. Comput. Sci. 2015;26:751–768. doi: 10.1142/S0129054115500422. [DOI] [Google Scholar]
- 55.Xu L., O’Grady M.J., O’Hare G.M., Collier R. Reliable multihop intra-cluster communication for Wireless Sensor Networks; Proceedings of the International Conference on Computing, Networking and Communications (ICNC); Honolulu, HI, USA. 3–6 February 2014; pp. 858–863. [Google Scholar]
- 56.Baccour N., Kouba A., Mottola L., Zuniga M.A., Youssef H., Boano C.A., Alves M. Radio link quality estimation in wireless sensor networks: A survey. ACM Trans. Sens. Netw. (TOSN) 2012;8:1–33. doi: 10.1145/2240116.2240123. [DOI] [Google Scholar]
- 57.OMadadhain J., Fisher D., Smyth P., White S., Boey Y. Analysis and visualization of network data using JUNG. J. Stat. Softw. 2005;10:1–35. [Google Scholar]
- 58.Kim D., Jung M. Data transmission and network architecture in long range low power sensor networks for IoT. Wirel. Pers. Commun. 2017;93:119–129. doi: 10.1007/s11277-016-3482-7. [DOI] [Google Scholar]
- 59.Schmid S., Wattenhofer R. Algorithmic models for sensor networks; Proceedings of the IEEE International Parallel Distributed Processing Symposium (IPDPS); Rhodes Island, Greece. 25–29 April 2006; pp. 450–461. [Google Scholar]
- 60.Li X., Wang Z., Zhang L., Zou C., Dorrell D. State-of-health estimation for Li-ion batteries by combing the incremental capacity analysis method with grey relational analysis. J. Power Sources. 2019;410:106–114. doi: 10.1016/j.jpowsour.2018.10.069. [DOI] [Google Scholar]
- 61.Liagkou V., Kavvadas V., Chronopoulos S.K., Tafiadis D., Christofilakis V., Peppas K. Attack detection for healthcare monitoring systems using mechanical learning in virtual private networks over optical transport layer architecture. Computation. 2019;7:24. doi: 10.3390/computation7020024. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.

















