Next Article in Journal
An Ensemble Energy Consumption Forecasting Model Based on Spatial-Temporal Clustering Analysis in Residential Buildings
Next Article in Special Issue
Increasing the Energy-Efficiency in Vacuum-Based Package Handling Using Deep Q-Learning
Previous Article in Journal
Intelligent Street Lighting in a Smart City Concepts—A Direction to Energy Saving in Cities: An Overview and Case Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Clustering Routing Method for Wireless Sensor Networks Considering the Locust Search Scheme

by
Alma Rodríguez
1,2,3,*,
Marco Pérez-Cisneros
1,
Julio C. Rosas-Caro
2,
Carolina Del-Valle-Soto
2,
Jorge Gálvez
1 and
Erik Cuevas
1
1
Departamento de Electrónica, Universidad de Guadalajara, CUCEI, Av. Revolución 1500, Guadalajara C.P. 44430, Jalisco, Mexico
2
Facultad de Ingeniería, Universidad Panamericana, Álvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico
3
Desarrollo de Software, Centro de Enseñanza Técnica Industrial Colomos, Calle Nueva Escocia 1885, Providencia 5a Sección, Guadalajara C.P. 44638, Jalisco, Mexico
*
Author to whom correspondence should be addressed.
Energies 2021, 14(11), 3019; https://doi.org/10.3390/en14113019
Submission received: 12 April 2021 / Revised: 7 May 2021 / Accepted: 17 May 2021 / Published: 23 May 2021
(This article belongs to the Special Issue Artificial Intelligence in Energy Management)

Abstract

:
Multiple applications of sensor devices in the form of a Wireless Sensor Network (WSN), such as those represented by the Internet of Things and monitoring dangerous geographical spaces, have attracted the attention by several scientific communities. Despite their interesting properties, sensors present an adverse characteristic: they manage very limited energy. Under such conditions, saving energy represents one of the most important concepts in designing effective protocols for WSNs. The objective of a protocol is to increase the network lifetime through the reduction of energy consumed by each sensor. In this paper, a robust clustering routing protocol for WSNs is introduced. The scheme uses the Locust Search (LS-II) method to determine the number of cluster heads and to identify the optimal cluster heads. Once the cluster heads are recognized, the other sensor elements are assigned to their nearest corresponding cluster head. Numerical simulations exhibit competitive results and demonstrate that the proposed protocol allows for the minimization of the energy consumption, extending the network lifetime in comparison with other popular clustering routing protocols.

1. Introduction

Recently, wireless communications have been widely used since they provide a robust and flexible way to transmit information. Wireless communications refer to the association between mobility and connectivity, considering the air as a transmission medium. [1]. Wireless sensor networks represent the most popular technology among the existing wireless schemes. To operate wireless sensor networks, efficient processes from a computational and energetical point of view are required. Under such conditions, communication protocols are methodological structures that allow guaranteeing the efficiency of such processes.
A wireless network of sensors involves a set of electromechanical devices distributed within a defined geographical section. These elements can provide important information about the area in which they are distributed. This information is exchanged and transmitted among the sensors of the network by using a certain transmission channel [2]. The performance of wireless sensors depends on battery management. This fact represents the main problem since it determines its energy autonomy. Therefore, it is important to use a base station (BS) to improve information processing through a centralized transmission. In the context of WSNs, the BS is also referred to as the sink or fusion center due to its aggregation capabilities.
Cluster-based or hierarchical routing are popular schemes with interesting characteristics such as efficiency and scalability in communications. The generic ideas of hierarchical routing have been integrated with several methodologies to save energy in WSNs. In the structure of a hierarchical method, nodes with high energy are only considered for processing and transmit information [3]. On the other hand, nodes with low energy are used to collect information in regions near the target. Hierarchical routing corresponds to a powerful approach to diminish the energy consumption inside the cluster structure through the aggregation of information. Hierarchical routing methods integrate processes to reduce the size of the transmission packet to the determined sink [4].
Under such conditions, the assignation of nodes with special purposes can significantly increase the lifetime of the network and the scalability of the architecture. Cluster Heads (CHs) are special nodes used as references in cluster-based or hierarchical schemes. Scalability represents an important property in WSNs. This concept is an open problem that has not been resolved in most of the routing methods due to the constraints imposed by the initial assumptions. In a generical WSN approach, cluster-based protocols consider a single sink and some cluster heads in order to extend their influence of the covering space [5]. With this architecture, WSNs maintain low scalability producing expensive processes in terms of energy consumption. Incrementing the number of nodes or the influence diameter of the network provokes an energetical overload and a bottleneck in the transmission of the information.
An efficient protocol should present mechanisms to save energy in each node. The objective is to increase the frequency of the recharging process from the batteries. This fact is important since the recharging process is usually difficult and even not possible. Under this architecture, software processes inside the nodes distribute the power load among different nodes [6]. Hierarchical routing incorporates two roles in the behavior of each node. The existence of such operation modes allows considerable energy saving. These different transmission modes, as cluster head and generical sensor, can be important when this architecture is also implemented in all layers [7].
On the other hand, optimization strategies such as metaheuristic methods refer to optimization methods that can solve complex systems. These algorithms are extracted from the observation of biological or social processes, that according to a determined perspective, can be interpreted as search strategies. Due to its high application potential, several metaheuristic methods have been introduced in the literature. Some of the most popular metaheuristic schemes involve schemes such as the Differential Evolution (DE) method [8], Genetic Algorithms [9], the Particle Swarm Optimization (PSO) [10], the Artificial Bee Colony (ABC) algorithm [11], the Gravitational Search Algorithm (GSA) [12], and the Grey Wolf Optimizer [13], to name a few. Metaheuristic methods do not assume continuity differentiability, convexity, or determined initial conditions. These properties represent the most important advantages in comparison to other optimization approaches. Although these schemes produce interesting results, they maintain different difficulties when used to solve high multimodal formulations.
The Locust Search (LS-II) [14] scheme is a metaheuristic technique extracted from the modeling of the biological behavior of the desert locusts. A locust entity behaves considering two opposite processes: solitary and social. Under the solitary process, elements avoid being in contact with other entities with the objective to explore new promising areas for food sources. On the other hand, the social process considers the high concentration of the entities to consume the areas with abundant food resources. This mechanism of concentration involves the attraction of entities located in areas of low food levels to those elements that are in positions with the best food sources. With the combination of both behaviors, the LS-II approach presents very effective global and local search properties. These characteristics have motivated its use in a wide variety of complex optimization formulations such as parameter estimation of chaotic systems [15], image processing [16], and pattern recognition [17], to name a few.
In this paper, a novel clustering routing protocol for Wireless Sensor Networks is presented. The approach is designed based on the Locust Search (LS-II) method. In the proposed protocol, the number of cluster head nodes and their selection is identified by the LS-II approach. Once cluster heads nodes are selected, the rest of the sensor nodes are assigned to their nearest cluster head. Under such conditions, the network structure is constantly modified by the LS-II until finding the optimal distribution of the node structure that reduces the transmission distance. Numerical simulations exhibit competitive configurations, which demonstrate that our routing protocol obtains minimal energy consumption, improving the lifetime and extending the stability period of the network in comparison with other popular clustering routing protocols.
The main contributions of this research can be summarized as follows: (1) a new clustering routing protocol for Wireless Sensor Networks is proposed, (2) the scheme translates the clustering routing task in an optimization formulation, (3) the solution of the optimization problem (number of cluster head nodes and their selection) is identified by the Locust Search (LS-II) method which has never been used for these purposes.
The next sections of the paper are structured as follows. In Section 2, the related work is discussed. In Section 3, the main characteristics of the Locust Search (LS-II) method are analyzed. Section 4 explains our clustering protocol. Section 5 exhibits the numerical simulations of our protocol compared with other well-known methods. Finally, the conclusions are discussed in Section 6.

2. Related Work

Multiple applications of WSNs, such as those represented by the Internet of Things and monitoring dangerous geographical spaces, have motivated the enhancement of different aspects of WSNs, namely, topology optimization [18], distributed and decentralized detection [19,20,21], multipath routing protocols [22], and communication failures [23,24]. From the wide range of enhancements, routing protocols have attracted the attention of several scientific communities due to their applications in energy savings. From all routing protocols, clustering schemes represent the most popular approaches to manage energy consumption. A clustering scheme allows the efficient administration of the energy consumption for the working cycle of WSNs [25,26]. The Low Energy Adaptive Clustering Hierarchy Protocol (LEACH) [27] corresponds to the most well-known clustering protocol scheme in the case of homogeneous WSNs. In its operation, the LEACH method considers a set of cluster heads (CHs) which are randomly identified while the rest of the sensor nodes are frequently interchanged as CHs or generic nodes. Therefore, the energy consumption is uniformly distributed in each node with the objective to extend the network operation. Multiple other protocols that use the LEACH method as a part of their structure have been proposed in the literature producing distinct levels of performance [28,29,30,31,32]. Another popular routing protocol represents the Vice-CH-enabled (VCH) scheme [33]. It reduces energy consumption by the use of a two-step process. In the mechanism of VCH, the CH nodes are selected, considering only the nodes that currently maintain power possibilities. The numerical results produced by VCH indicate that its operative properties are better than those included in the LEACH protocol [34].
The LEACH and VCH schemes are designed to work with homogeneous WSNs. In spite of interesting characteristics, they present a low performance when they are used in Heterogeneous Wireless Sensor Networks (HWSNs). For this reason, elements of both approaches have been incorporated to design other new routing protocols [35,36] that can operate appropriately with HWSNs. From these schemes, the Stable Election Protocol (SEP) [37] protocol is one of the most popular. Under the operation of SEP, it is considered two-node prototypes: advanced elements and normal nodes. Advanced elements have a higher probability than normal nodes to present a CHs behavior. Therefore, the SEP approach considers distinct threshold patterns according to the node behavior. With this mechanism, SEP manages the energy of advanced elements efficiently and eliminates the consumption of normal nodes to extend the lifetime of the network. The mechanisms of the SEP protocols have been used to produce several other approaches. Some interesting methods involve the Modified Stable Election Protocol (M-SEP) [38]. Under the operation of the M-SEP, the consumed energy of each node is evaluated with regard to the complete network to identify the nodes that have a high potential to become CHs. Therefore, nodes with a better energy level have a higher probability of being CHs than those that present low energy levels. The incorporation of this process by M-SEP considerably enhanced the life cycle of the network and its transmission rate. The P-SEP [39] protocol is another method based on the original SEP approach. The P-SEP determines probabilistically the uncertainty of the energy contained in each node through the modeling of this level according to its behavior. With this information, it is avoided the selection of a node with a lower energy that is lower than a threshold value. Therefore, only the elements that surpass this threshold have a possibility to become CHs nodes. With a similar mechanism as P-SEP, the clustering protocol Distributed Energy-Efficient Clustering Algorithm (DEEC) [40] has been designed as an effective method to operate HWSNs. In DEEC, it is also employed a threshold limit to identify the CHs. The sensor energy level limits the period of time that a sensor behaves as a CH. The mechanism of DEEC considers that high energy elements generate stable transmission behaviors.
As an alternative to traditional schemes, the design of clustering protocols has also been conducted considering metaheuristic algorithms [41,42,43]. According to the existent literature, metaheuristic approaches have exhibited better performance levels than those schemes based on classical computing strategies in terms of robustness and accuracy. Under the metaheuristic methodology, the problem of clustering protocol is turned into an optimization formulation where an objective function is modeled to estimate the quality of a solution. With the information provided by the objective function, the metaheuristic method tries different sensor configurations until finding the solution that obtains a longer lifetime of the network [44,45]. In the literature, different clustering protocols have been designed following metaheuristic concepts. Some representative schemes involve the Energy Centers using Particle Swarm Optimization (EC-PSO) [46]. Under EC-PSO, the CHs are initially determined considering a geometric approach. Then, the PSO method is applied to select the sensor that will assume the role of the CH node from the network. The EC-PSO scheme also considers a process to avoid the selection of nodes that maintain low energy levels. Another important approach is the Genetic-Algorithm-Based Energy-Efficient Clustering (GAEEC) [47]. Under this protocol, a Genetic Algorithm is considered to select the CH nodes through a similarity metric. Therefore, the GA method employs as an objective function a model that evaluates the transmission cost produced by each node according to its energy level. In recent years, a routing protocol that considers the Grey Wolf Optimizer has been also introduced. Under this protocol, distinct objective functions are considered to evaluate the node properties of each sensor. The values provided by each objective function represent weights that are dynamically adapted according to the distance from the nodes of the network. Under this approach, it is identified the node configuration that reduces the total sum of weights. In spite of their interesting results, these metaheuristic methods present a critical disadvantage, such as premature convergence. It refers to the act of detecting a suboptimal node configuration as the best solution for an optimization problem. Different from other protocols based on metaheuristic principles, our proposed approach is the mechanism to determine the CH nodes. In our LS-II scheme, candidate solutions are encoded to automatically identify the number of CHs. Under this approach, it is avoided the consideration of a fixed percentage of CHs or a predefined probability to obtain the CHs. Since the LS-II method prevents premature convergence, our technique ensures that the optimal number of CHs is selected and not a suboptimal configuration. The proposed scheme models a distinct objective function to guide the search process towards the node configuration, which better fits the constraints imposed by energy savings and load balancing.
Due to the large number of acronyms involved, a list of them and their meaning is presented in Table 1.

3. The Locust Search (LS-II) Method

The Locust Search (LS-II) method refers to a metaheuristic technique obtained from the modeling of the gregarious behavior observed in swarms of locusts. The mechanisms incorporated in LS-II avoid the concentration of individuals in promising areas and improve the exploration of the search space through the redistribution of agents [48]. With the combination of both behaviors, the LS-II approach presents very effective global and local search properties. These characteristics have motivated its use in the solution of very complex problems [49]. The LS-II proceeds from the original LS (Locust Search method). Different from LS, the new LS-II incorporates new operators and mechanisms to increase its capacity to avoid the agent concentration. Such mechanisms allow a better balance between exploration and exploitation to find the global solution when it faces several local minima.
Under LS-II, a population P of N locusts symbolize a set of N candidate solutions P = x 1 , , x N (where N corresponds to the whole population size). The set of elements from P interacts with each other examining a n -dimensional search space. Each solution x i = x i , 1 , , x i , n is identified inside a constrained space U = x i R n l d x i , d u d (where l d and u d symbolize the lower and upper limits for the d -th decision variable, respectively).
As with any other metaheuristic approach, LS-II involves an iterative model in which candidate solutions modify their location at each iteration during its execution. The position of each candidate solution is modified through the application of a set of operators modeled from the two behavioral processes observed in locust insects: solitary process and social process.

3.1. Solitary Process

Candidate solutions in the solitary process move in distinct trajectories examining promising areas of food sources (good solutions). During this process, search agents avoid concentrating on other elements. This mechanism is designed considering a model of attraction and repulsion forces undergone among solutions within the population P . Under such conditions, at each iteration t , the resultant attraction and repulsions forces (called social force) experimented by a specific search agent x i is modeled by the following formulation:
S i t = j = 1 i j N s i , j t
where s i , j t represents the pairwise attraction-repulsion between the candidate solutions x i and x j which is modeled by the following expression:
s i , j t = ρ x i , x j L r i , j h i , j + r a n d 1 , 1
where the function ρ x i , x j denotes the dominance value between x i and x j . The value L r i , j corresponds to the social factor while r i , j symbolized the Euclidian distance x i x j . The vector is the unit vector from x i to x j .
h i , j = x i x j x i x j
r a n d 1 , 1 symbolizes a random vector of dimension n whose values are uniformly distributed.
The social factor L r i , j is defined by the following relationship:
L r i , j = F e r i , j / G e r i , j
where the elements F and G represent the attraction-repulsion factor and influence size, respectively. The function ρ x i , x j expresses the relative dominance between search agents. To implement ρ x i , x j , each search agent x i is ranked with a number within the interval 0 , N 1 . The best candidate solution is associated with the rank 0 while the worst element with the rank N 1 . The concepts of best or worst are considered in terms of the produced fitness value. Once assigned the ranks for each candidate solution, the dominance value is modeled as follows:
ρ x i , x j = e r a n k x i N if   r a n k x i r a n k x j e r a n k x j N if   r a n k x i > r a n k x j
Therefore, due to the influence of the total social force S i t , each search agent x i present a determined tendency of being attracted or repelled to or from other elements within the population P . Under such circumstances, the new location x i * assumed by the search agent x i because of the influence of the total force is computed as follows:
x i * = x i + S i t
Therefore, the set of candidate solutions has been modified to the updated population P * = x 1 * , , x N * .

3.2. Social Process

The social process is a mechanism applied to improve the accuracy of the best candidate solutions identified from P * during the solitary process. During the social process, it is generated a subset of search agents B = b 1 , , b q that involves the best q elements of the population P * . Then, for each candidate solution x i * B , a set M i of a new random solutions M i = m 1 i , , m a i are generated inside a limited subspace C i U . The subspace C i in which it is generated a new solutions around x i * = x i , 1 * , , x i , n * presents the following limits:
C i , d l o w e r = x i , d * r
C i , d u p p e r = x i , d * + r
where C i , d l o w e r and C i , d u p p e r corresponds to the upper and lower limits of each subspace C i for the d decision variable ( d 1 , , n ). On the other hand, the perturbation r is computed by the following expression:
r = d = 1 n u d l d n β
where l d and u d symbolize the lower and upper limits for the d -th decision variable, respectively. n is the total number of dimensions, while β corresponds to a scale element that regulates the limit size of C i . The value of β is within the interval [0,1].
Finally, the new position of the search agent x i t + 1 is obtained as the best element of the set integrated by the value of x i *   and all its a respective random solutions m 1 i , , m a i . This task can be modeled by the following formulation:
x i t + 1 = b e s t x i * , m 1 i , , m a i
The complete search procedure of LS-II is an iterative process that starts with random initialization of the population P k in the first iteration k = 0 . Then, it is applied the solitary operator over the current population P k . As a result, a temporary population P *   is produced. Finally, the social operator is considered to generate the next population P k + 1 . This process is repeated until the number of iterations has been reached. Figure 1 shows the flowchart of the complete process.

4. The New Clustering Routing Approach

In this part, our proposed clustering routing protocol based on the Locust Search (LS-II) method is explained. The process of operation in our proposed scheme is divided into two main steps: the configuration stage and the operation stage.

4.1. Configuration Step

In its initial stage, network parameters and their architecture need to be defined. This fact is because it is possible to define several network configurations depending on the requirements of the application. The network is mainly defined by the characteristics of its sensor nodes.
The WSNs involve a set of nodes that define a topological structure where the information should be collected. Therefore, our protocol considers some network constraints and a determined topology. These assumptions have been taken into account in order to maintain compatibility with other works reported in the literature.
Network assumptions:
1.
The network presents one base station B S a group of cluster heads elements C H , and a set of sensor nodes n
2.
The energy in the base station is supplied through an external source, while the power level of each sensor node is bounded.
3.
A particular sensor node is considered dead or useless when its energy level is empty.
4.
All sensor elements have a homogeneous characteristic.
Network topology:
  • In its initial stage, all nodes are randomly distributed in the area where the information is collected.
  • The position of each node does not change during the network operation.
  • The base station is located in the middle of the sensing section.
  • It is not fixed the number of clusters of the structure.
  • Every generic node (also known as a leaf node) is assigned to its nearest cluster head element.
Once the network structure is already defined, the process for the generation of the connections for the whole network is executed. This step is the configuration phase. Under this phase, an initial set of CHs is selected to produce the initial cluster structure. In the selection process of the optimal set of CHs, our proposed scheme adopts the following energy model of consumption.

Model of Energy Consumption

In a generical WSNs, the processes that consume most of the energy stored in the system are data reception and transmission. The amount of necessary energy for transmitting or receiving information varies according to the distance d and the packet size where the information is encoded. Under this perspective, the required energy level for transmitting a packet with l -bit is expressed by the following formulation.
E T X l , d = l E e l e c + l ε f s d 2 ,             d d t h l E e l e c + l ε m p d 4 ,             d > d t h
where E T X represents the level of energy consumption to transmit information, l symbolizes the encoded data size, E e l e c corresponds to the dissipation of energy when it is transmitted or received only one bit of data, ε f s denotes the energy factor of dissipation in the free space model, ε m p refers to the factor of energy dissipation considering a multipath attenuation formulation, and d t h represents a threshold value that defines the maximal transmission distance. It is computed by the following equation.
d t h = ε f s ε m p
The energy needed for receiving a packet of l -bit is computed by Equation (10).
E R X l = l E e l e c
A generical sensor node n i can only transmit information to the cluster head. Under such conditions, the energy consumption of node n i can be calculated by the following model:
E n i = E T X l , d
On the other hand, the energy consumption of a cluster head C H j integrates several elements: the energy consumption when packets are received, the collection of the data information, and the transmission of the collected data to the base station. Therefore, the energy consumption for C H j is computed by the following expression:
E C H j = E R X l N j + N j + 1 l E D A + E T X l , d
where N j denotes the number of nodes that belong to the cluster j . E D A corresponds to the consumed energy for 1 bit of collected data. Under this scheme, the residual energy of a generic node n i is determined by Equation (13).
E r t n i = E r t 1 n i E T X l , d ,             E r t 1 n i > 0 0 ,             E r t 1 n i 0
On the other hand, the residual energy consumed by a cluster head C H j is computed by the formulation defined in Equation (14).
E r t C H j = E r t 1 C H j E C H j ,             E r t 1 C H j > 0 0 ,             E r t 1 C H j 0
In the configuration step, the LS-II is used to identify the initial set of CHs. Likewise, it is generated the initial network structure according to the energy consumption model. Once the LS-II has selected the cluster head nodes, the rest of all nodes are assigned to the nearest CH. However, if the distance of the generical node to its nearest CH is longer than the distance to the base station, then the generical node should not be considered as part of this cluster. Instead, its information will be transmitted directly to the base station.

4.2. Operation Step

The operation step is the process where the CH nodes are selected to produce an optimal network structure by the LS-II algorithm. In this stage, once the optimal set of CHs has been selected, the information is transmitted to the BS. Each round, the data transmission is verified. One round refers to the invested time in which the information is transmitted from generical nodes to CHs and then to the BS. The network structure is updated in each round by executing the LS-II scheme in order to identify the optimal structure. The mechanism to select the CHs and the optimal network structure is explained in the following subsections.

4.2.1. Determination of Optimal Cluster Heads

In our scheme, the LS-II method identifies the set of CHs. In the identification, two main concepts are adopted: the residual energy of CH and the distance from a CH to the BS.
The proposed scheme identifies a sensor node as CH when its residual energy is quite high in comparison with the rest of the sensors. According to the energy consumption model, cluster heads consume more energy than generical nodes. Therefore, sensor nodes that present the highest residual energy levels should be considered as CHs in order to balance their effects.
Determining the optimal node structure allows saving energy. Under such conditions, the identification of CHs is achieved through a reduction of the distance among nodes. For this operation, it is considered that crosslinks are eliminated since they generate interference through the data transmission.
Different from other schemes, the number of CH nodes is not represented by a fixed constant. Instead, the number of CHs is constantly modified in order to obtain the best network structure in each round. Likewise, the determination of the set of CHs is not random or probabilistic produced, such as in the DEEC or LEACH approaches. Instead of this, in our scheme, the LS-II technique automatically selects the best sensor nodes to become CHs in each round. This mechanism allows the use of the proposed scheme for a wide range of WSN applications without considering this constraint imposed for other protocols.
Then, each sensor node is assigned to the closest cluster head once the optimal set of clusters has been determined. However, there is an exception: If the distance of the sensor node is shorter to the BS than the distance to the CH, then the sensor node is not assigned to this group. Therefore, the information from this node is transmitted to the base station. Once this process is finished, a candidate network structure is used for a transmission simulation in order to evaluate its performance. The process for determining the best network structure is discussed in the following section.

4.2.2. Identification of Optimal Network Structure

In our approach, the LS-II scheme selects the optimal cluster network structure C by determining the optimal group of cluster heads. Therefore, in each execution, cluster head nodes are identified to integrate a new network topology. Then, the network performance is evaluated with regard to its fitness value. In this paper, an objective function to assess the effectiveness of the network structure is implemented. This cost function integrates four elements: the total distance from cluster heads to the base station, the total intra-cluster distance, the residual energy of cluster heads, and the energy consumption. The objective function is modeled by the following Equation (17).
f C = f 1 C + f 2 C + f 3 C + f 4 C
The first element denotes the total intra-cluster distance, which is computed as follows:
f 1 C = d m a x j = 1 k d n j , C H j j = 1 k d n j , C H j d m a x j = 1 k d n j , C H j d m i n j = 1 k d n j , C H j
Assuming the subset of sensor elements n j belonging to the group j and C H j representing the cluster head, the maximum and minimum total intra-cluster distance of each sensor node in n j to its respective cluster head C H j is d m a x and d m i n , respectively. Being d the total intra-cluster distance.
The second element corresponds to the total distance from cluster heads with regard to the base station. This term is modeled as follows:
f 2 C = d m a x j = 1 k d C H j ,   B S j = 1 k d C H j ,   B S d m a x j = 1 k d C H j ,   B S d m i n j = 1 k d C H j ,   B S
where the maximum and minimum total distance from each C H j to B S is d m a x and d m i n , respectively. Being d the total intra-cluster distance.
The third element refers to energy consumption which is computed as follows:
f 3 C = E m a x j = 1 k i = 1 N j E n i j + E C H j E j = 1 k i = 1 N j E n i j + E C H j E m a x j = 1 k i = 1 N j E n i j + E C H j E m i n j = 1 k i = 1 N j E n i j + E C H j
where E n i j denotes the energy consumption of a generical sensor node i which is assigned to cluster j . The number of nodes in the group j is N j . E m a x and E m i n represent the maximum and minimum total energy consumption of the network, respectively.
The fourth element represents the relationship between sensor node members of the sum of the residual energy and its cluster head:
f 4 C = E r m a x j = 1 k i = 1 N j E r n i j E r C H j E r j = 1 k i = 1 N j E r n i j E r C H j E r m a x j = 1 k i = 1 N j E r n i j E r C H j E r m i n j = 1 k i = 1 N j E r n i j E r C H j
where E r C H j represents the residual energy of the cluster head. E r n i j corresponds to the residual energy of the sensor node. E m a x and E m i n denote the maximum and minimum total residual energy, respectively.
A lower value of f C expresses that the identified set of clusters represents a better cluster network structure. Therefore, the LS-II method selects a set of cluster heads to produce distinct cluster structures in each execution with the objective to determine the optimal network structure. Our proposed protocol is exhibited in Algorithm 1.
Algorithm 1. LS-II routing protocol
Input: Number of alive nodes
Output: The number of k clusters
while t t m a x
|  Identify cluster heads considering the search strategy of LS-II
|  if the distance from a node to the closest CH is smaller than to the BS
|  |  Allocate the node to the closest CH
|  else
|  |  The node transmits the information right to the BS
|  end if else
|  Compute the cost function of the produced cluster network structure f C t
|  if f C t < f C o p t
|  |  Update the identified cluster network structure as:
|  |   f C o p t f C t
|  end if
end while

5. Experiments and Simulation

5.1. Metrics

A simulation was carried out to measure the performance of the proposed method. The metrics used to validate the technique contemplate the network lifetime, the total residual energy, the network stability period, the number of received data packets by the sink node, and the residual energy deviation. In the following, the description of these metrics is presented in detail.
The network lifetime considers the period in which the network starts the transmission and when the first node dies. This measure allows the analysis of the network stability in which all the sensors are alive and working. On the other hand, the network instability contemplates the period from the first dead node to the end of the network life, which occurs when all nodes are dead.
The residual energy is determined by the sum of the residual energy of the alive nodes in the network divided by the sum of the initial energy of all nodes. This metric indicates the percentage of available energy in the network in every round and can be formulated as:
p t = 100 i = 1 N E r n i , t i = 1 N E o n i
where t is the current round, while E r n i , t is the residual energy of the node i in the round t . The initial energy node i is defined by E o n i . Therefore, the percentage of the total residual energy is given by p t .
The residual energy deviation measures the difference between the node with the highest residual energy and the node with the lowest residual energy, divided by the total initial energy. This metric is expressed in percentage and is calculated as follows:
D R t = 100 E r m a x n , t E r m i n n , t i = 1 N E o n i
In the round t , the node with the maximum residual energy in the network and the node with the minimum residual energy in the network is given by E r m a x n , t and E r m i n n , t , respectively.
The last metric considered in the experiments is the throughput, which measures the total number of packets sent to the BS by every cluster head.

5.2. Methods of Comparison and Parameter Settings

To prove the efficiency of the proposed method, it has been compared against one of the most popular clustering routing protocols: the Low Energy Adaptive Clustering Hierarchy Protocol (LEACH). Furthermore, the proposed technique has also been compared against other recent metaheuristic schemes used in clustering routing protocols, namely the Gray Wolf Optimization (GWO) algorithm.
The simulation requires the parameter settings listed in Table 2. To ensure a fair comparison, these parameters have been configured with the same values for all the routing protocols considered in the experiments. The simulation parameters include the size of the sensing area, the number of sensor nodes in the network, the size of the packets, the initial energy of the nodes, and other values necessary to simulate the behavior of the network during the transmission-reception process.
Additionally to the simulation’s parameter settings, the proposed method and the protocols in comparison need particular parameter configurations to ensure their best performance. These parameters are reported in Table 3.
The LEACH protocol only requires the percentage of cluster heads assigned in every round, whose value usually is at least 5% of the alive nodes. Therefore, we have configured this value to 0.05. The YSGA method needs the number of search agent groups as an initial parameter. According to the author’s recommendation, this value has been set to 4 since extensive experiments have demonstrated that it reaches its best performances when four groups are configured for the search process. On the other hand, the GWO employs one parameter to regulate the exploration-exploitation in the search process. According to the author’s recommendation, this parameter variates linearly from 2 to 0 throughout the optimization stage. Finally, the LS-II method only requires the number of best individuals needed for the social phase. This value has been set to 10 since the method’s best performance is achieved using this value. As additional parameters, the YSGA, GWO, and LS-II algorithm require the population size and the maximum number of iterations, which have been set to 20 and 50, respectively.
All the experiments have been carried out using the MATLAB R2019a software on a PC with the Intel® Core ™ i7-8550u processor at 1.80 GHz.

5.3. Network Lifetime

The network lifetime analyzes the evolution of the alive and dead nodes in every round. This evolution is illustrated in Figure 2 and Figure 3, respectively, where the graphics represent the obtained simulation results for all comparison methods. Figure 2 shows how many alive sensor nodes remain in the network in every round, while Figure 3 reveals the number of accumulated dead nodes in each round. From the graphics, it is clear that the proposed scheme outperforms the protocols in comparison since it manages to maintain more alive nodes in every round than the other methods. In other words, the proposed scheme manages to further reduce the number of nodes out of energy compared to the other protocols in every round.
Contemplating the attained outcomes, the proposed method manages to extend the network’s lifetime more than the protocols in comparison. The LS-II scheme can reach such results because it can automatically build the optimal number of clusters to stabilize the power load and extend the network lifetime. Moreover, the proposed protocol can change the network configuration in each round to increase the sensors’ lifetime and reduce the power expenditure.
The simulation of the network lifetime is also illustrated in Figure 4, where the cluster configuration selected by the proposed scheme for different periods is shown. Figure 4a–d show the optimal cluster configuration in rounds 1, 5, 11, and 15, respectively. The figure exemplifies the clusters’ formation given the set of cluster heads chosen by the proposed method in distinct rounds. In the figure, it can be appreciated that the number of cluster heads can change from one round to another. Similarly, the number of clusters and the size of every cluster can be different. Furthermore, the figure shows the nodes that have died over time and how they are excluded from the clustering-transmission-reception process.
In Figure 4, the base station is placed at the center of the sensing area and symbolized with a gray color diamond marker. On the other hand, normal sensor nodes are represented as gray color circles, while cluster heads are indicated with gray color squared markers. In contrast, dead sensor nodes are illustrated with black color circles. Regarding the communication links, every normal sensor node that belongs to a specific cluster has a connection line to its cluster head identified by a particular line style, which is a dotted line. Similarly, the communication between every cluster head and the base station is represented with a dashed line. Finally, a simple line represents the communication link of every normal sensor node that is not part of a cluster and transmits directly to the base station.

5.4. Total Residual Energy

The total residual energy of the network is calculated by summing every sensor node’s remaining energy in every round. The evolution over time of this calculation for each protocol is reported in Figure 5. A closer inspection of this statistic reveals that the proposed protocol reaches the highest residual energy throughout the network lifetime. From the figure, it can be observed that the level of energy in all protocols is 100% at the beginning of the simulation. However, the power consumption gradually reduces the total residual energy in every round until the residual energy percentage is zero. Nevertheless, the proposed approach uncovers the cluster structure that consumes the minimum energy in every single round. Consequently, it achieves the lowest energy expenditure and maximizes the network’s residual energy, outperforming the other protocols in comparison.

5.5. Network Instability Period

The statistics of the network instability period are shown in Figure 6. The figure reveals the round in which the first sensor node dies for every protocol in comparison. Likewise, the figure shows the round where half of the sensors are out of power and the time where all sensor nodes are dead.
From the achieved outcomes, it is remarked that the proposed protocol accomplishes the maximum values. The first dead node appears at round 8 in the proposed method. Fifty percent of the network dies in round 12, while the complete set of sensor nodes dies in round 22. The GWO and LEACH protocols reached lower indicators concerning the first, half, and last node out of power in the wireless sensor network, proving that the proposed method provides a longer lifetime to the network.

5.6. Throughput

The throughput measures the number of packets that have been sent to the base station. It is desirable to send the largest number of packages throughout the life of the network. This measure is illustrated in Figure 7. The throughput is inherent to the number of alive sensor nodes transmitting data packets in every round, which means that the collection of information is more significant.
Figure 7 clearly shows that the proposed protocol has the highest throughput. The number of packets sent to the base station reaches 1200 for the LS-II, while the LEACH protocol sends less than 1000. These results are as expected since the proposed method extends the life of the network, and therefore, the amount of gathered data is improved.

5.7. Energy Deviation

The difference between the two sensors with the maximum and minimum residual energy determines the energy deviation. This statistic measures the load balancing, which indicates how the energy expenditure is distributed among all the sensor nodes. When the load is not balanced, the network presents a higher instability period, a shorter lifetime, and the sensor nodes’ premature death. The energy consumption is not balanced if the energy deviation is high. Therefore, it is desirable to reduce this metric for better load balancing, and at the same time, it is desirable to prolong the time in which the highest peak is reached.
The energy deviation obtained from the experiments is illustrated in Figure 8. The statistic in the figure reveals that the LEACH protocol generates the maximum peak, reaching the highest peak in round three. Therefore, this protocol has the worst load balance. In contrast, the lowest energy deviation is attained by the proposed method LS-II, which archives the highest peak in round nine. Therefore, the proposed scheme shows the best performance when the energy deviation is analyzed.

6. Conclusions

A novel clustering routing protocol based on the LS-II scheme has been proposed in this article. The approach achieves the optimal cluster structure to decrease the energy expenditure in each transmission-reception process, extending the network lifetime. The LS-II protocol regulates the number of cluster heads and automatically decides the nodes’ role as regular sensors or cluster heads in each round. The proposed approach is compared against the LEACH protocol, which is one of the most popular clustering routing protocols. Additionally, another similar protocol scheme based on the GWO has been used in the performance analysis. Simulation results have demonstrated that the proposed technique performs better than the comparison methods. Several metrics were implemented to evaluate the proposed protocol, such as the network lifetime, the energy consumption, the energy deviation, the number of packets delivered, and the network instability period. The statistical analysis has demonstrated that the proposed strategy handles very well, improving the network’s lifetime, and at the same time, it provides a better balance in load energy. As further research directions that deserve attention, we can establish A) the use of metaheuristic mechanism to improve the accuracy of the solutions, B) the use of the opposition-based phenomenon to increase the exploration capacities of the LS-II scheme, and C) the dimensionality reduction of the optimization problem for the scalability of the network.

Author Contributions

Conceptualization, A.R. and M.P.-C.; methodology, A.R.; software, J.G.; validation, C.D.-V.-S.; formal analysis, J.C.R.-C.; investigation, A.R.; resources, M.P.-C.; writing—original draft preparation, A.R. and E.C.; writing—review and editing, E.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lin, X.; Shroff, N.B.; Srikant, R. A tutorial on cross layer optimization in wireless networks. IEEE J. Sel. Areas Commun. 2006, 24, 1452–1463. [Google Scholar]
  2. Gheisari, M.; Alzubi, J.; Zhang, X.; Kose, U.; Saucedo, J.A.M. A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wirel. Netw. 2020, 26, 4965–4973. [Google Scholar] [CrossRef]
  3. Nam, D. Comparison Studies of Hierarchical Cluster Based Routing Protocols in Wireless Sensor Networks. In Proceedings of the 35th International Conference on Computers and Their Applications, San Francisco, CA, USA, 23–25 March 2020; Volume 69, pp. 334–344. [Google Scholar]
  4. Aadri, A.; Idrissi, N. An energy efficient hierarchical routing scheme for wireless sensor networks. Comput. Sci. Inf. Technol. 2017, 137, 148. [Google Scholar]
  5. Rajagopal, S.; Vani, R.; Kavitha, J.C.; Saravanan, R. Lifetime Improvement of Wireless Sensor Networks Using Tree Based Routing Protocol. In EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing; Springer: Cham, Switzerland, 2020; pp. 51–61. [Google Scholar]
  6. Sabor, N.; Sasaki, S.; Abo Zahhad, M.; Ahmed, S.M. A comprehensive survey on hierarchical based routing protocols for mobile wireless sensor networks: Review, taxonomy, and future directions. Wirel. Commun. Mob. Comput. 2017, 2017, 2818542. [Google Scholar] [CrossRef]
  7. Bandyopadhyay, S.; Coyle, E.J. An energy efficient hierarchical clustering algorithm for wireless sensor networks. In Proceedings of the IEEE INFOCOM 2003—Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1713–1723. [Google Scholar]
  8. Storn, R.; Price, K. Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  9. Goldberg, D.E.; Holland, J.H. Genetic algorithms and machine learning. Mach. Learn. 1988, 3, 95–99. [Google Scholar] [CrossRef]
  10. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95 International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar]
  11. Karaboga, D. An Idea Based on Honey Bee Swarm for Numerical Optimization; Technical Report TR06; Computer Engineering Department, Engineering Faculty, Erciyes University: Kayseri, Turkey, 2005; Volume 200, pp. 1–10. [Google Scholar]
  12. Rashedi, E.; Nezamabadi Pour, H.; Saryazdi, S. GSA: A gravitational search algorithm. Inf. Sci. 2009, 179, 2232–2248. [Google Scholar] [CrossRef]
  13. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef] [Green Version]
  14. Cuevas, E.; González, A.; Zaldívar, D.; Pérez Cisneros, M. An optimisation algorithm based on the behaviour of locust swarms. Int. J. Bio Inspired Comput. 2015, 7, 402–407. [Google Scholar] [CrossRef]
  15. Cuevas, E.; Gálvez, J.; Avalos, O. Parameter estimation for chaotic fractional systems by using the locust search algorithm. Comput. Sist. 2017, 21, 369–380. [Google Scholar] [CrossRef] [Green Version]
  16. Cuevas, E.; González, A.; Fausto, F.; Zaldívar, D.; Pérez, M. Cisneros. Multithreshold Segmentation by Using an Algorithm Based on the Behavior of Locust Swarms. Math. Probl. Eng. 2015, 2015, 805357. [Google Scholar] [CrossRef] [Green Version]
  17. González, A.; Cuevas, E.; Fausto, F.; Valdivia, A.; Rojas, R. A template matching approach based on the behavior of swarms of locust. Appl. Intell. 2017, 47, 1087–1098. [Google Scholar] [CrossRef]
  18. Fu, X.; Pace, P.; Aloi, G.; Yang, L.; Fortino, G. Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm. Comput. Netw. 2020, 177, 107327. [Google Scholar] [CrossRef]
  19. Cheng, X.; Ciuonzo, D.; Rossi, P.S. Multibit Decentralized Detection Through Fusing Smart and Dumb Sensors Based on Rao Test. IEEE Trans. Aerosp. Electron. Syst. 2020, 56, 1391–1405. [Google Scholar] [CrossRef]
  20. Ciuonzo, D.; Rossi, P.S.; Varshney, P.K. Distributed Detection in Wireless Sensor Networks under Multiplicative Fading via Generalized Score-tests. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
  21. Niu, R.; Varshney, P.K. Performance Analysis of Distributed Detection in a Random Sensor Field. IEEE Trans. Signal Process. 2008, 56, 339–349. [Google Scholar] [CrossRef]
  22. Fu, X.; Fortino, G.; Pace, P.; Aloi, G.; Li, W. Environment fusion multipath routing protocol for wireless sensor networks. Inf. Fusion 2020, 53, 4–19. [Google Scholar] [CrossRef]
  23. Fu, X.; Yang, Y. Modeling and analyzing cascading failures for Internet of Things. Inf. Sci. 2021, 545, 753–770. [Google Scholar] [CrossRef]
  24. Fu, X.; Yao, H.; Postolache, O.; Yang, Y. Message forwarding for WSN Assisted Opportunistic Network in disaster scenarios. J. Netw. Comput. Appl. 2019, 137, 11–24. [Google Scholar] [CrossRef]
  25. Mazumdar, N.; Roy, S.; Nayak, S. A survey on clustering approaches for wireless sensor networks. In Proceedings of the 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA), Changsha, China, 21–23 September 2018; pp. 236–240. [Google Scholar]
  26. Liu, X. A survey on clustering routing protocols in wireless sensor networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef]
  27. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; p. 10. [Google Scholar]
  28. Razaque, A.; Mudigulam, S.; Gavini, K.; Amsaad, F.; Abdulgader, M.; Krishna, G.S. H LEACH: Hybrid low energy adaptive clustering hierarchy for wireless sensor networks. In Proceedings of the 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, 29 April 2016; pp. 1–4. [Google Scholar]
  29. Geetha, V.A.; Kallapur, P.V.; Tellajeera, S. Clustering in wireless sensor networks: Performance comparison of leach & leach-c protocols using ns2. Procedia Technol. 2012, 4, 163–170. [Google Scholar]
  30. Jerbi, W.; Guermazi, A.; Trabelsi, H. O-LEACH of routing protocol for wireless sensor networks. In Proceedings of the 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV), Beni Mellal, Morocco, 29 March–1 April 2016; pp. 399–404. [Google Scholar]
  31. Tong, M.; Tang, M. LEACH-B: An improved LEACH protocol for wireless sensor network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010; pp. 1–4. [Google Scholar]
  32. Marappan, P.; Rodrigues, P. An energy efficient routing protocol for correlated data using CL-LEACH in WSN. Wirel. Netw. 2016, 22, 1415–1423. [Google Scholar] [CrossRef]
  33. Pachlor, R.; Shrimankar, D. VCH-ECCR: A centralized routing protocol for wireless sensor networks. J. Sens. 2017, 2017, 8946576. [Google Scholar] [CrossRef]
  34. Zhao, X.; Ren, S.; Quan, H.; Gao, Q. Routing Protocol for Heterogeneous Wireless Sensor Networks Based on a Modified Grey Wolf Optimizer. Sensors 2020, 20, 820. [Google Scholar] [CrossRef] [Green Version]
  35. Dutt, S.; Agrawal, S.; Vig, R. Cluster head restricted energy efficient protocol (CREEP) for routing in heterogeneous wireless sensor networks. Wirel. Pers. Commun. 2018, 100, 1477–1497. [Google Scholar] [CrossRef]
  36. Osamy, W.; Salim, A.; Khedr, A.M. An information entropy based clustering algorithm for heterogeneous wireless sensor networks. Wirel. Netw. 2020, 26, 1869–1886. [Google Scholar] [CrossRef]
  37. Smaragdakis, G.; Matta, I.; Bestavros, A. SEP: A Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks; Boston University Computer Science Department: Boston, MA, USA, 2004. [Google Scholar]
  38. Singh, D.; Panda, C.K. Performance analysis of modified stable election protocol in heterogeneous WSN. In Proceedings of the 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, India, 24–25 January 2015; pp. 24–25. [Google Scholar]
  39. Naranjo, P.G.V.; Shojafar, M.; Mostafaei, H.; Pooranian, Z.; Baccarelli, E. P SEP: A prolong stable election routing algorithm for energy limited heterogeneous fog supported wireless sensor networks. J. Supercomput. 2017, 73, 733–755. [Google Scholar] [CrossRef]
  40. Qing, L.; Zhu, Q.; Wang, M. Design of a distributed energy efficient clustering algorithm for heterogeneous wireless sensor networks. Comput. Commun. 2006, 29, 2230–2237. [Google Scholar] [CrossRef]
  41. Zhao, X.; Cui, Y.; Guo, Z.; Hao, Z. An Energy Efficient Coverage Enhancement Strategy for Wireless Sensor Networks Based on a Dynamic Partition Algorithm for Cellular Grids and an Improved Vampire Bat Optimizer. Sensors 2020, 20, 619. [Google Scholar] [CrossRef] [Green Version]
  42. Ghosh, N.; Banerjee, I.; Sherratt, R.S. On demand fuzzy clustering and ant colony optimisation based mobile data collection in wireless sensor network. Wirel. Netw. 2019, 25, 1829–1845. [Google Scholar] [CrossRef] [Green Version]
  43. Zhao, X.Q.; Cui, Y.P.; Gao, C.Y.; Guo, Z.; Gao, Q. Energy efficient coverage enhancement strategy for 3 D wireless sensor networks based on a vampire bat optimizer. IEEE Internet Things J. 2019, 7, 325–338. [Google Scholar] [CrossRef]
  44. Potthuri, S.; Shankar, T.; Rajesh, A. Lifetime improvement in wireless sensor networks using hybrid differential evolution and simulated annealing (DESA). Ain Shams Eng. J. 2018, 9, 655–663. [Google Scholar] [CrossRef]
  45. Kong, L.; Pan, J.S.; Snášel, V.; Tsai, P.W.; Sung, T.W. An energy aware routing protocol for wireless sensor network based on genetic algorithm. Telecommun. Syst. 2018, 67, 451–463. [Google Scholar] [CrossRef]
  46. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An improved routing schema with special clustering using PSO algorithm for heterogeneous wireless sensor network. Sensors 2019, 19, 671. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  47. Singh, S.P.; Sharma, S.C. Genetic algorithm based energy efficient clustering (GAEEC) for homogenous wireless sensor networks. IETE J. Res. 2018, 64, 648–659. [Google Scholar] [CrossRef]
  48. Cuevas, E.; Diaz, P.; Camarena, O. An Enhanced Swarm Method Based on the Locust Search Algorithm. In Metaheuristic Computation: A Performance Perspective; Intelligent Systems Reference Library; Springer: Cham, Switzerland, 2021; Volume 195. [Google Scholar] [CrossRef]
  49. Cuevas, E.; Fausto, F.; González, A. Locust Search Algorithm Applied to Multi threshold Segmentation. In New Advancements in Swarm Algorithms: Operators and Applications; Intelligent Systems Reference Library; Springer: Cham, Switzerland, 2020; Volume 160. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the LS-II approach.
Figure 1. Flowchart of the LS-II approach.
Energies 14 03019 g001
Figure 2. Alive nodes’ evolution.
Figure 2. Alive nodes’ evolution.
Energies 14 03019 g002
Figure 3. Dead nodes’ evolution.
Figure 3. Dead nodes’ evolution.
Energies 14 03019 g003
Figure 4. Wireless sensor network clustering evolution: (a) cluster configuration in round 1, (b) in round 5, (c) in round 11, and (d) in round 15.
Figure 4. Wireless sensor network clustering evolution: (a) cluster configuration in round 1, (b) in round 5, (c) in round 11, and (d) in round 15.
Energies 14 03019 g004aEnergies 14 03019 g004b
Figure 5. Total residual energy.
Figure 5. Total residual energy.
Energies 14 03019 g005
Figure 6. Network instability.
Figure 6. Network instability.
Energies 14 03019 g006
Figure 7. Throughput: total number of packets sent to the BS.
Figure 7. Throughput: total number of packets sent to the BS.
Energies 14 03019 g007
Figure 8. Energy deviation.
Figure 8. Energy deviation.
Energies 14 03019 g008
Table 1. Acronyms/abbreviations.
Table 1. Acronyms/abbreviations.
AcronymMeaning
WSNsWireless Sensor Networks
HWSNsHeterogeneous Wireless Sensor Networks
CHsCluster Heads
CHCluster Head
BSBase Station
LEACHLow Energy Adaptive Clustering Hierarchy Protocol
SEPStable Election Protocol
P-SEPProbabilistic Stable Election Protocol
DEECDistributed Energy-Efficient Clustering
M-SEPModified Stable Election Protocol
EC-PSOEnergy Centers using Particle Swarm Optimization
GAEECGenetic-Algorithm-Based Energy-Efficient Clustering
VCHVice-CH-enabled
LS-IILocust Search II
LSLocust Search
DEDifferential Evolution
GAGenetic Algorithms
PSOParticle Swarm Optimization
ABCArtificial Bee Colony
GSAGravitational Search Algorithm
GWOGrey Wolf Optimizer
Table 2. Parameter settings.
Table 2. Parameter settings.
ParameterValue
Sensing area100 m2
Packet size l 4000 bits
Number of sensor nodes N 100
The energy dissipation for transmitting or receiving 1 bit of data E e l e c 50 nJ/bit
Energy for 1 bit of data aggregation E D A 5 nJ/bit
The coefficient of energy dissipation in the multipath attenuation model ε m p (transmission coefficient amplifier)0.0013 pJ/bit/m4
The coefficient of energy dissipation in the free space ε f s
(transmission coefficient amplifier)
10 pJ/bit/m2
Initial energy of sensor nodes E o 0.003 J
The coefficient of energy dissipation in the multipath attenuation model ε m p (transmission coefficient amplifier)0.0013 pJ/bit/m4
Table 3. Setting parameters of the methods in comparison.
Table 3. Setting parameters of the methods in comparison.
ProtocolParameterValue
GWOa (linearly decreased from 2 to 0)[2,0]
LEACH p (the percentage of CHs)0.05
LS-IIq (the number of best individuals considered for the social phase)10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rodríguez, A.; Pérez-Cisneros, M.; Rosas-Caro, J.C.; Del-Valle-Soto, C.; Gálvez, J.; Cuevas, E. Robust Clustering Routing Method for Wireless Sensor Networks Considering the Locust Search Scheme. Energies 2021, 14, 3019. https://doi.org/10.3390/en14113019

AMA Style

Rodríguez A, Pérez-Cisneros M, Rosas-Caro JC, Del-Valle-Soto C, Gálvez J, Cuevas E. Robust Clustering Routing Method for Wireless Sensor Networks Considering the Locust Search Scheme. Energies. 2021; 14(11):3019. https://doi.org/10.3390/en14113019

Chicago/Turabian Style

Rodríguez, Alma, Marco Pérez-Cisneros, Julio C. Rosas-Caro, Carolina Del-Valle-Soto, Jorge Gálvez, and Erik Cuevas. 2021. "Robust Clustering Routing Method for Wireless Sensor Networks Considering the Locust Search Scheme" Energies 14, no. 11: 3019. https://doi.org/10.3390/en14113019

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop