Next Article in Journal
Decomposition-Based Bayesian Network Structure Learning Algorithm for Abnormity Diagnosis Model for Coal Mill Process
Previous Article in Journal
An Improved 3D Ultra-Wideband High-Efficiency Substrate Integrated Coaxial Meander Delay Line
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Stability-Enhanced Clustering Algorithm Based on Distributed Node Status Judgment in MWSN

1
School of Information Engineering, Yangzhou University, Yangzhou 225000, China
2
Research Institute for Integrated Science, Kanagawa University, Kanagawa 259-1293, Japan
3
Advanced Science and Technology Research Institute, Beibu Gulf University, Qinzhou 535011, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(23), 3865; https://doi.org/10.3390/electronics11233865
Submission received: 28 September 2022 / Revised: 18 November 2022 / Accepted: 18 November 2022 / Published: 23 November 2022

Abstract

:
Node mobility improves the self-deployment capability of the network; meanwhile, it also leads to frequent interruption of communication links and severe packet loss. Mitigating the negative impact of node movement on cluster stability is a new challenge. Existing clustering protocols try to use multi-hop data transmission, but they do not deal with the increase in communication overhead. This paper proposes a distributed node status judgment-based weighted clustering algorithm to solve the problems of easily broken communication links and excessive node reaffiliation in mobile wireless sensor networks (MWSNs). The protocol establishes intra-cluster second-level communication in order to solve the problem of the sudden interruption of dynamic communication links. A node status judgment algorithm was constructed to analyze the motion behavior of sensor nodes, distinguish the node states, and screen multiple communication nodes, thereby alleviating the transmission delay caused by complex routing. The extended Kalman filter (EKF) was used to filter the sensor noise in a non-ideal environment and to predict the actual position of nodes. The simulation results explain that the proposed protocol can effectively reduce node reaffiliation and the dominant set’s update frequency when the node runs at medium and high speeds while simultaneously maintaining low energy consumption.

1. Introduction

In addition to abundant sensors and excellent information collection capabilities [1], MWSN has gained more attention due to its wide range of application scenarios [2,3,4] and node mobility capability. The mobility of sensor nodes not only improves the deployment capability of regional networks but also challenges the stability of network clustering. The high-speed movement of the node makes it possible to leave the communication range of the cluster head (CH) at any time, which affects the data transmission of the node and network connectivity. In addition, the frequent replacement of CHs by member nodes will also increase energy consumption and shorten network life. Due to their low price, sensor nodes are generally used in large numbers, and due to the environmental limitations of the application scenario, timely battery replacement cannot be achieved. Given the above problems, MWSN needs a clustering communication protocol with low power consumption and high transmission efficiency [5]. The construction of the protocol especially needs to consider how to effectively alleviate the impact of node movement on cluster stability and link connection time. Due to the open deployment environment of the sensor network, a distributed protocol should be used in the sensor network design in order to avoid the damage of a single point of failure [6,7].
Many clustering routing protocols [5,8,9,10,11,12,13,14,15] were developed to alleviate the impact of node movement on clustering. These protocols fall broadly into three categories, depending on the different methods, namely multi-hop routing [8,9,10], improved weighted algorithm with movement factor [5,11,12], and hybrid protocols combining active and reactive protocols [13,14,15]. The weighted clustering algorithm comprehensively considers the parameters of network nodes. It expects to determine the optimal dominant set for different application scenarios through perfect parameter adjustment and the weight design of different parameters, while noting that for mobile wireless sensor networks, the influence of node migration factors should be considered [12]. In practice, the weight cannot be the only factor for selecting CHs, and the optimal dominant set in the moving status is not fixed. Hybrid protocols handle node movement and find optimal routing and data transfer. Using hybrid protocols for different network scenarios can help improve network performance and bring the application value of protocols into full play. Hybrid protocols often combine metaheuristic optimization with different performances to ensure energy efficiency and improve the optimal selection of cluster heads or communication paths [15]. However, hybrid protocols also inevitably lead to more complex protocol designs, and achieving efficient collocation between protocols is worth further discussion. Multi-hop communication can effectively alleviate the negative impact of node movement and improve network connectivity. The main issues discussed are the design of the multi-hop communication mechanism and the selection of the number and location of the vice cluster heads (VCHs). A multi-hop communication mechanism can improve the link stability and reduce the data transmission process’s energy consumption; simultaneously, it will complicate communication routing within the cluster and thus increase the data transmission delay [9].
Most of these protocols focus on finding the optimal communication route in a dynamic environment or improving the CH selection strategy, ignoring the impact of high-speed movement on the quality of communication links [16]. To address the problem of communication links being easily interrupted due to high-speed node movement, this paper tries to establish multi-hop routing in the cluster. The data is forwarded through relay nodes in the cluster to mitigate the direct impact of node movement on the communication link, and new state constraints are set to avoid overly complex communication routing within the cluster.
This paper proposes a distributed node status judgment-based weighted clustering algorithm (DSJWCA) based on the above ideas. The protocol uses the method of second-level communication within the cluster. The CH keeps in touch with the member nodes far away from its communication range through data forwarding by relay nodes. However, large-scale multi-hop communication will make intra-cluster communication routing more complicated and increase the data transmission delay. Given the problems caused by this mechanism, the protocol uses the node status judgment algorithm to distinguish the node status. The identity design and state partition of nodes in sensor networks positively affect network performance [6,17]. Only when the distance between the member node and the CH reaches the threshold and the member node is in an “unsafe” status is the member node allowed to communicate with the CH through the relay node. The status judgment relates to the moving speed and yaw angle between nodes. In addition, there is noise interference in sensor data acquisition in the non-ideal environment. This protocol uses the extended Kalman filter combined with the Gauss-Markov (GM) model to predict the actual position of the node. The protocol considers that the actual movement of the node has certain traceability. Then, for the permanent failures other than energy exhaustion that may occur during the operation of sensor nodes in non-ideal environments, this paper conducts some research in the simulation combined with the Weibull reliability model. Finally, detailed simulation experiments and data analysis are carried out in this paper. Compared with similar protocols, the proposed protocol significantly improves the update of the dominant set and the node reaffiliation.

2. Related Works

There are many clustering protocols developed for MWSN [6,8,16,18,19,20,21,22,23]. The protocol design of hierarchical wireless sensor networks using the clustering method can be roughly divided into two main stages: the clustering phase and the communication phase. The clustering phase includes two main parts: CH selection and intra-cluster node allocation. The communication phase completes the transmission and forwarding of intra-cluster and inter-cluster data.
The clustering phase’s main task is to determine the dominant set and divide the nodes in the network based on the CH. MAINAK [16] first proposed using weights to determine the dominant set in order to stabilize the topology. This weighted clustering algorithm comprehensively considers node degree, transmission power, mobility, and residual energy and selects the node with the lowest weight as the CH by weighting the above information. The protocol does not search for CHs according to a fixed period but makes aperiodic on-demand calls. In addition, the protocol has an expected threshold for the number of CHs in the network. Similarly, Rajakumar et al. [19] also comprehensively consider various influencing factors in the network in order to select dynamic brokers, but the difference is that this scheme contains up to 10 parameters. Undoubtedly, such a scheme will bring substantial computational overhead to sensor networks. On this basis, the MBC protocol proposed by Deng [21] has further requirements for selecting nodes in the cluster. CH will consider the expected connection time, distance, and residual energy of all nodes within its communication range to determine whether to continue to accept the node. The authors hope to improve cluster stability by adding the expected connection time to the weighting formula when selecting CHs. The consideration of node mobility improves the protocol’s applicability in high-mobility scenarios. The algorithm will incur huge control overhead in multiple mobile nodes. Sabor et al. [22] combined the improved weight calculation formula and immune optimization algorithm (MOIA) to predict CH’s position in the target region. Meanwhile, cluster size is adjusted according to the moving speed of the sensor node. However, the clustering phase of the algorithm has a high cost because of the over-complete consideration of various factors. Rady and Shokair et al. [6] adopt a two-stage method to select CHs in the clustering process. In the first stage, the remaining energy of the sensor node, link connection time, migration factor, and other information are used to find the VCH. Next, the protocol uses the MOIA algorithm to ascertain the unique CH in the set of VCH in the second stage.
Improving the communication phase of the existing clustering protocols mainly focuses on time allocation and data transmission mode. Kim and Chung [18] used time slots to divide the intra-cluster communication process. All member nodes will send data according to the requested information sent by the CH within the allocated TDMA time slot. To control CH’s energy consumption, the member nodes that have sent the data will stay in sleep mode until the next TDMA time slot. Nevertheless, the author does not mention the routing overhead. Cakici [23] hopes to improve end-to-end delay performance by finding the network’s most reliable route and maintaining the communication’s reliability. However, the long end-to-end delay makes the clustered network unbearable when the topology changes frequently. In order to avoid the loss of more data packets, the CH will delete the member node from its communication list [21]. When the time slot is exhausted, the packet sent by the member node is still not received. Given the dynamic network topology caused by node movement, Tran et al. [8] proposed a dynamic network multi-hop protocol. The scheme also uses real-time time slot scheduling and studies multi-hop network architecture and dynamic network topology management. Different schemes prove that multi-hop communication can be applied to dynamic topological networks.
In addition, the design of fault tolerance measures is also worth noting. Awwad et al. [20] introduced an adaptive scheduling mechanism to allow disconnected nodes to join new clusters faster, responding to a join message from a new node waiting to join the cluster within the contention timeslot. In order to avoid the sudden failure of the CH and improve the stability of the cluster, Sabor et al. [22] searched for a node with high residual energy and low mobility in the cluster as a VCH during the clustering phase.
A detailed analysis of the existing clustering–routing algorithms is shown in Table 1. In short, the current clustering protocols have made good progress in improving the transmission efficiency of communication links and saving energy consumption. However, further research is still needed on reducing the reaffiliation in the scenario of high-speed node movement and avoiding the situation where the link is easily broken.

3. Using Models and Assumptions

Before expounding on the detailed design of the DSJWCA protocol, it first introduces some models used in this paper, including the network model, fault model, node mobility model, weight calculation formula, and radio energy consumption model. It then expounds on the scenario assumptions used by the protocol.

3.1. Network Model

MWSN comprises a fixed base station (BS) and many tiny, low-power, and inexpensive sensors, as shown in Figure 1. Sensor nodes form clusters according to specific rules and periodically receive and forward data information from the target area. The member nodes are responsible for obtaining and sending data to the CH. The CH needs to complete the integration and forwarding of data within the cluster and is also responsible for data forwarding between CHs if the network uses multi-hop communication [24]. This protocol considers the wireless channel symmetric [21]; the power required to transmit and receive data is the same when the distance between two nodes remains unchanged. In addition, BS, as a resource-rich node, does not consider its working mode and energy consumption.

3.2. Fault Model

There are many reasons for the failure of wireless sensor nodes in the natural environment. In addition to energy depletion, the failure of node hardware components, unexpected events, and permanent or short-term signal shielding by obstacles [25] can incapacitate nodes. This paper’s transient and Byzantine faults are not considered; only permanent faults are considered. In modeling a node failure, the node reliability is considered to obey the Weibull distribution [26]. The probability density function of the Weibull distribution [27] is formulated as follows:
f t = β η t η β 1 e t η β
This formula represents the possibility of sensor node failure at time t, where the shape parameter β represents the trend of the function and the scale of parameter η represents the offset degree of the function. Generally, β   >   2 is required in the research of wireless sensor networks.

3.3. Node Mobility Model

Many models try to honestly describe the movement status of nodes, including the random waypoint model and GM model [28]. Considering that the moving angle of sensor nodes does not abruptly change in the actual movement and that the node status update is related to the prior motion status, the GM model with traceability is more suitable for the application scenario in this paper. The node movement angle and velocity update formulas of the GM model are as follows:
V n = α V n 1 + 1 α V + 1 α 2 V x n 1  
θ n = α θ n 1 + 1 α θ + 1 α 2 θ x n 1
where α is the weight factor in the range of 0 , 1 , V n and θ n respectively represent the node moving speed and angle at the current time; V n 1 and θ n 1 respectively represent the node moving speed and angle at the previous time; V x n 1 and θ x n 1 respectively represent the speed and angle variables following the distribution of Gaussian random variables. The position calculation formula of the sensor node can be deduced according to Equations (2) and (3), and the specific expression is as follows:
S n = X n , Y n = X n 1 + V n 1 c o s θ n 1 , Y n 1 + V n 1 s i n θ n 1  
In the process of node movement, the algorithm considers that there are already several known targets in the target area distributed in the network, and the sensor node will maintain a trend to obtain information on known targets in the future. Figure 2 shows the movement trajectory of a sensor node approaching a known target under the GM model.

3.4. Weight Calculation Formula

This section will briefly introduce the weight calculation formula mentioned in the WCA protocol. This weight is used to find the CH in the clustering phase. The calculation formula [16] is as follows:
W i = φ 1 × d e g i + φ 2 × d i s i + φ 3 × v e l i + φ 4 × E r e s i d u a l i
W i represents the weight of the node. Nodes with smaller W i have a higher probability of becoming CHs. d e g i is the degree of node, d i s i is the sum of distances between a node and other nodes in its communication range, v e l i is the node’s average velocity, and E r e s i d u a l i is the remaining energy of the node. It should be noted that the free coefficient has the following restrictions in Equation (5).
j = 1 4 φ j = 1
According to the node mobility characteristics of MWSN, the mobility factor and energy density-related information are added to the weight calculation formula. The nodes with lower mobility and higher energy are selected as the CHs in order to reduce the communication’s energy consumption while stabilizing the clustering and letting the packets flow through areas with higher power. For node mobility, we improve the weight calculation formula regarding local density and the local residual energy of nodes. Set S represents all sensor nodes in the target network, and a node and its neighbors form set C, where d e g i n t i and d e g e x t i represent the node’s internal degree and external degree. It is defined as:
d e g i n t i = N e i g h b o r s i
N e i g h b o r s i = s j | d i s s i , s j R i s j S s i
d e g e x t i = s m , s n S | s m C , s n S C
where R i represents the communication range of the node, and the local density of node is related to d e g i n t i and d e g e x t i ; its expression is:
d e g l o c i = 2 × d e g i n t i 2   / ϑ i ϑ i 1 d e g i n t i + d e g e x t i
where ϑ i represents the sum of a node and its neighbor nodes. Forcing packets to flow through higher energy-density areas can reduce network energy consumption. The energy density of a node is defined as:
E d e n s i t y j = E r e s i d u a l i , i N e i g h b o r j H i < H j + E r e s i d u a l j
where H i represents the hop values of the node. Therefore, combined with some improved parameters, the original weight calculation formula can be modified as follows:
W i = φ 1 × d e g l o c i + φ 2 × d i s i + φ 3 × v e l i + φ 4 × E d e n s i t y i

3.5. Radio Energy Consumption Model

In addition to the clustering phase, packet transmission and forwarding between nodes consumes substantial energy. This paper adopts a realistic radio model closer to the actual communication scenario. In this model, the radio transmission power of a node changes with the communication distance. Each node has four energy modes: send, transmit, sleep, and idle modes, and the symbols are P r x , P t x ,   P s l e e p and P i d l e . A sensor node’s energy consumption is related to its status and packet communication distance. Each member node will generate a K-bits packet, transmit it to the corresponding CH in the ratio of R d (bps) in its allocated time slot, and keep sleep mode in the time slot of other member nodes. Therefore, the energy consumption of member nodes [6] is expressed as follows:
E = E t x + E i d l e + E s l e e p = T d P t x + T s l o t T d P i d l e + T f r i T s l o t P s l e e p
where T d = K / R d is the data transmission/acceptance time, T s l o t is a time slot, and T f r i is the sum of time slots of all member nodes of CH. In addition, the CH keeps its receiver open to accept data packets from its member nodes or lower-level CHs. Then the CH merges the data received from the member and relay nodes and sends it on to the BS or higher-level CHs. Therefore, each CH’s energy consumption is expressed as follows:
E = E r x + E a g g + E t x + E i d l e = m i T d P r x + r e l a y i T d P r x + m i 1 E D A K + R p k i + 1 T d P t x + m i T s l o t T d P i d l e + R p k i T s l o t T d P i d l e
where E a g g represents the energy consumed by merging data, m i represents the number of member nodes of CH, R p k i represents the sum of the number of relay data packets from low-level CHs, and E D A represents the energy required by merging 1 bit data.

3.6. Assumptions

The DSJWCA protocol has the following assumptions for application scenarios:
  • Non-ideal environments, including sensor nodes, may have noise when obtaining information, and sensor nodes may have other permanent faults except energy depletion [29] (transient and Byzantine faults are not considered);
  • Except for BS, all sensor nodes can change their position after being deployed in the network;
  • Some sensor nodes near the known target will approach it within a period to obtain information about the known target in the region;
  • A popular movement model, the GM model, is used for sensor node movement, which does not consider the angular velocity change during movement.

4. Detailed Design of Protocol

This section elaborates on the distributed node status judgment-based weighted clustering protocol. First, the operation flow of the protocol is introduced, and then the node status judgment algorithm is explained in detail. Finally, the prediction process of the actual position of the node using EKF under the GM model is given.

4.1. Protocol Process

The DSJWCA protocol operation flow consists of three phases. The setup phase completes the CH, VCH selection, and CH communication routing construction, and the steady-state phase is mainly responsible for data packet transmission and forwarding. The DSJWCA protocol also sets up a fault-tolerant phase to allow the CH to update member nodes’ status and to re-enter the cluster for the node that lost connection. Figure 3 shows a schematic diagram of the operation flow of the protocol.

4.1.1. Setup Phase

The node weight calculation and the selection of CHs and VCHs are first performed. Non-CH nodes must decide which cluster to join according to location, CH weights, and other related information. This phase also needs to complete the construction of the CH communication route.
Calculate the node weight in the network according to the improved weight calculation formula and select the node with the smaller value as the CH. The CH broadcasts the H e l l o _ M s g I D , W message to nodes within its communication radius. The node that only receives one CH message will return the J o i n _ M s g I D , x , y , V , θ message to apply for joining the cluster. If a node receives packets sent by multiple CHs simultaneously, it needs to judge the CH weight, mobility factor, link connection time, and other information. As an essential fault-tolerant measure against the CH’s sudden failure, the selection of the VCH needs to consider many factors, such as the node weight and its relative position. When the CH is determined, the member node in the cluster, whose node weight is second only to the weight of the CH, is determined as the VCH. The pseudocode for this phase of operation is as shown in Algorithm 1.
Algorithm 1. Setup Phase.
Input: i S l i v e : I D , x , y , V , θ , M F , E r e s i d u a l i , d e g i n t i , d e g e x t i .
Output: (1) Set of CH, VCH;(2) Result of Clusters Building.
1:  for i = 1:1: S l i v e
2:    Calculate the weight of S i based on Equation (12);
3:  end for
4:  CHs = C H _ S e l e c t i o n I D , x , y , W ;
5:  Calculate the hop values of CH using flooding;
6:   N H b e s t = C o n s t _ r o u t i n g _ t r e e I D , x , y , h o p ;
7:  for each CH j
8:    BS sends C H _ s t a t _ M s g N H b e s t j to C H s j ;
9:     C H s j broadcasts A d v _ M s g I D , x , y , V , θ to CHs;
10:  end for
11:   C H i broadcasts H e l l o _ M s g I D , W to n o d e j within its radius;
12:  for i = 1: S l i v e
13:     if  n o d e i receives only one packet from C H j
14:        n o d e i sends J o i n _ M s g I D , x , y , V , θ to C H j ;
15:     else
16:       LCT = C a l _ l c t i , C H s ;
17:       H_idea = j u d g e L C T , W , M F ;
18:        n o d e i sends J o i n _ M s g I D , x , y , V , θ to C H s H _ i d e a ;
19:     end if
20:  end for
21:  Calculate N o s l o t ;
22:  for each CH i
23:    VCH = S e l e c t _ V C H I D , W ;
24:     C H s i sends S c h e _ M s g T D M A , N o s l o t , V C H to n o d e s C H s i ;
25:  end for

4.1.2. Steady-State Phase

In this phase, the protocol considers all nodes to maintain time synchronization. The communication of the member nodes is divided into several timeslots. The node can only send or forward data packets to the CH in its timeslot, and the other timeslots keep sleep status to reduce energy consumption. The CH, unlike the member nodes, needs to keep the receiver in the operational status, realize the reception and integration of the data packets from the member nodes in the cluster, and forward the data packets sent by other CHs as a relay node.
In addition to data communication, member nodes may re-select CHs. As the communication link is maintained within the cluster using second-level communication, member nodes can maintain communication even if they leave the communication radius of the CH. Nevertheless, the CH may also fail to receive data packets within the timeslot, including the interference of noise in a non-ideal environment on the communication link and the transmission time being too long, resulting in the incomplete transmission of data packets before the end of the time slice. After successfully receiving the data packet, the CH will send an ACK message to the member nodes to confirm the successful reception of the data packet. Different from protocols such as LEACH-M and MBC, when the CH does not receive a data packet during intra-cluster communication, it will send messages to the member node for multiple timeslots in order to inquire about the current status. During this period, if the CH successfully receives the message returned by the member node, it is considered that the link communication between the nodes is abnormal; otherwise, the node is invalid.
In this phase, besides the member nodes’ departure or failure, the CH’s sudden loss also needs to be considered, as it will negatively impact the routing communication of the entire network and the stability of the cluster. An additional member node will be selected as the VCH in the clustering phase in order to prevent the CH’s sudden failure, and the weight of the VCH is second only to the CH. Unlike the non-fixed periodic replacement of the CH, the VCH will be replaced in each clustering phase to ensure that it can form the optimal dominant set when it acts as the CH. To obtain the current status of the CH, the VCH will send messages to the CH from time to time.
When the member node does not receive the ACK message returned by the CH after sending the data packet, the node will notify the VCH of the event and send the data packet. The VCH will immediately broadcast information in the cluster to suspend the allocation of timeslots and ask about the CH status. Suppose the CH replies to the inquiry status message of the VCH. In that case, it is considered that the communication link between the CH and the member nodes is disturbed, and the VCH will forward the data packets to be sent and restore the timeslot allocation. Suppose the VCH does not receive the status reply message from the CH. In that case, it is considered that the CH is in a failed status, and the VCH broadcasts the CH failure message in the cluster and reorganizes the communication routes. The CH replacement process is also performed when E r e s i d u a l C H < 0.2 E 0 or E r e s i d u a l C H E r e s i d u a l V C H < E d e n s i t y C H / d e g i n t C H .

4.1.3. Fault-Tolerant Phase

In order to ensure a steady communication link between nodes and reduce the packet drop rate, a fault-tolerant phase is set before each round of communication to check the node status and communication link. The member nodes in the cluster that use second-level communication forward data packets through the relay node to keep in touch with the CH. If the member node status is “unsafe” and out of CH communication coverage, the node sends H e l l o _ M s g I D , x , y , V , θ packets to the surrounding nodes to find the CHs within its communication radius. The CH that receives the H e l l o _ M s g data packet will return the C H _ M s g I D , x , y , V , θ , W data packet with its information, and the member nodes compare the received data packet to determine whether to change the CH.

4.2. Node Status Judgment Algorithm

MWSN does not have a fixed topology, because its node mobility leads to easily broken communication links and high network delay. The communication radius of the CH cannot be expanded indefinitely, and the increase in the communication distance means that higher transmit power is required, resulting in more energy consumption. Displacement may cause the node to leave the CH communication coverage during packet transmission. However, the CH has not found the interruption of the communication link, resulting in the loss of data packets. Therefore, all measures need to be carried out before the communication link is not interrupted.
In this paper, intra-cluster second-level communication is used to extend the connection time of node communication links. It selects an appropriate relay node within the cluster and forwards the data packets of nodes that have left the communication radius of the CH and have not re-entered the cluster or are in an “unsafe” status.
To avoid the complication of intra-cluster communication routing and consider the communication pressure of the CH, it is necessary to set rules to control the number of nodes to forward data. After each round of the setup phase ends, member nodes will judge whether they need to update their status according to the set threshold. With the dynamic change of node communication radius and moving speed [30], it is expressed as:
D t h = R j V m a x × r o u n d
Among them, R j represents the communication radius of the corresponding CH, and V m a x represents the member node’s maximum velocity. The CH will discover the link interruption of member nodes within one round because of TDMA time slot communication, so in actual operation, the value range of the round is 1 , 2 . The hotspot problem is common in WSNs with multi-hop communication, and it can be solved by unequal clustering [31]. A CH’s communication radius changes dynamically with its residual energy and the number of neighbor and successor nodes. The function of about R j can be expressed as:
R j = 1 α D m a x D B S j D m a x D m i n β 1 E r e s i d u a l j E m a x + ρ 1 N e i g h b o r j N e i g h b o r m a x + γ 1 B r j B r m a x R m a x  
where α , β ,   ρ , and γ are weights in the range of 0 , 1 , D m a x and D m i n are the maximum and minimum distances from the CH to the BS, respectively, and D B S j is the distances from the CH j to the BS. E m a x ,   N e i g h b o r j , and B r m a x are the node’s initial energy and the maximum value of neighbor nodes and successor nodes, respectively, and B r j represents the number of successor nodes of the CH j.
The node status judgment algorithm judges the node status by the relative distance between nodes and the node moving angle and speed. The algorithm considers that, when the member node maintains a special relationship with the CH’s moving angle, the member node may be in a safe status at the current time; otherwise, the member node is considered unsafe. Member nodes in an unsafe status need to find relay nodes in the cluster to establish second-level communication with the CH. In some particular angles, it is necessary to combine the relative movement speed for judgment. In the node status judgment algorithm, the range of the node movement angle when the safety status is satisfied is shown in Figure 4.
The figure shows the angle range required to satisfy the safety status when the member nodes are located at different positions, taking the CH moving yaw angle in the first quadrant as an example. The position of the CH ( P CH ) is the coordinate origin, and the yaw angle of the CH movement is α . When the member nodes are in the first quadrant and the third quadrant, it is necessary to judge the required angle range by combining the specific position of the member nodes. When the member node is in the second or fourth quadrants, it does not need to be judged separately. The angle ranges required for nodes in different quadrants to satisfy the safe status are as follows.
Case 1: When the node is in the upper half of the first quadrant, the node yaw angle range in the safe status is π / 2 + t a n 1 x / y θ α ; when the node is in the lower half of the first quadrant, the node yaw angle range in the safe status is α θ π + t a n 1 y / x .
Case 2: When the node is in the second quadrant, the node yaw angle range in the safe status is - t a n 1 y / x θ α .
Case 3: When the node is in the upper half of the third quadrant, the node yaw angle range in the safe status is t a n 1 y / x θ α ; when the node is in the lower half of the third quadrant, the node yaw angle range in the safe status is α θ t a n 1 y / x .
Case 4: When the node is in the fourth quadrant, the node yaw angle range in the safe status is π / 2 α θ π / 2 + t a n 1 x / y .
When the yaw angle of CH movement is in other quadrants, the movement angles of nodes that satisfy the safe status have similar rules. The pseudocode of the node status judgment algorithm is shown in Algorithm 2.
Algorithm 2. Node status Judgment Algorithm.
Input: (1) S i S h e a d . c l u s t e r m e m : E r e s i d u a l i , d i s t i , h e a d , V , θ ; (2) D m a x , D m i n , E m a x .
Output: (1) Relay node of S i ; (2) The route for data transfer.
1:  Calculate the communication radius of C H R h e a d based on Equation (16);
2:  Calculate D t h based on Equation (15);
3:  for i = 1:1: length( S h e a d . c l u s t e r m e m )
4:     if ( d i s t i , h e a d > D t h )
5:        Determine the quadrant where the node resides;
6:        isSafe( S i . a n g l e , S i . s p e e d , S h e a d . a n g l e , S h e a d . s p e e d );
7:         S i . r e l a y n o d e = −1;
8:        if ( S i . t y p e == ‘unsafe’)
9:            Find N nodes closest to CH and form the set R i ;
10:          Find the node r with the lowest residual energy in the set R i ;
11:           S i . r e l a y n o d e = r;
12:        end if
13:        if ( S i . r e l a y n o d e != −1)
14:          Establish the communication route between node r, node i and head;
15:          Update the routing information table stored in CH;
16:        end if
17:     end if
18:  end for

4.3. Node Location Prediction

The EKF uses partial differentiation to obtain the Jacobian matrix to linearize the nonlinear system, which estimates the system’s current status. The calculation steps used by EKF in position prediction [32] are as follows:
Location   prediction   x t = f x t 1 , u t , w t
Error   covariance   P t = F t P t 1 F t T + W t Q t W t T
Kalman   Gain   K t = P t H t T H t P t H t T + V t R t V t T 1
Prediction   of   measured   values ( updated )   x t = x t + K t z t h x t 1 , v t
Error   covariance ( updated )   P t = E K t H t P t
Table 2 gives the specific meaning of each parameter in EKF.
In addition to the above symbols, the calculation formula of EKF also includes some Jacobian matrices, which are defined as follows:
F t = δ f x t 1 , 0 , 0 δ x
The Jacobian matrix is a matrix composed of the first-order partial derivatives of each dependent variable concerning each independent variable in a multivariate function and can be expressed as:
J = δ f δ x 1 δ f δ x n = δ f 1 δ x 1 δ f 1 δ x n δ f m δ x 1 δ f m δ x n
The motion of sensor nodes under known targets is purposeful. The movement angle and speed of the node under the GM model will not change suddenly. Each new update of the node movement status is related to the previous one while maintaining a uniform linear motion within a sampling time. Based on this motion model, the status quantity of the target can be expressed as:
x t = x , y , ν , θ , w T
where θ is the angle between the target node and the x-axis in the current coordinate system, the value range is [0, 2), and the counterclockwise direction is positive. w is the yaw angular velocity, considered w = 0 under this model. The simplified status function expression is:
x t + Δ t = ν w s i n w Δ t + θ ν w s i n θ + x t ν w c o s w Δ t + θ + ν w c o s θ + y t ν w Δ t + θ w , w 0
In EKF, the multivariate Taylor series expansion is used to linearize the nonlinear model. In practice, the expansion term of the advanced series is often ignored, and only the first-order Jacobian matrix is considered for approximate linearization. When w = 0, according to Equations (22) and (23), the Jacobian matrix can be solved as:
J F = 1 0 Δ t   c o s θ Δ t ν   s i n θ 0 0 1 Δ t   s i n θ Δ t ν   c o s θ 0 0 0 1 0 0 0 0 0 1 Δ t 0 0 0 0 1
A similar partial differentiate can solve Jacobian matrices J H , J W , and J V . In addition, process noise also interferes with position prediction in the movement model. The process noise indicates that the system may face errors caused by model simplification after running for a specified period. The noise sources in the model process include linear acceleration and yaw angular acceleration. The acceleration is assumed to satisfy a Gaussian distribution with a mean of 0 and a variance of σ a 2 and σ w 2 , respectively. In the status transition formula, the effect of acceleration on the status is as follows:
n o i s e = G μ = 1 2 Δ t 2 c o s θ 1 2 Δ t 2 s i n θ 0 0 Δ t 0 0 0 1 2 Δ t 2 Δ t μ a μ w
The covariance matrix is derived from the process noise, and its expression is:
Q t = E n o i s e n o i s e T = E G μ μ T G T = G E μ μ T G T
where μ a and μ w are the linear and yaw angular accelerations, respectively. E μ μ T = σ a 2 0 0 σ w 2 .

5. Simulation and Results

This chapter uses MATLAB software to run different simulation programs in order to test the performance of the DSJWCA protocol under different parameters.

5.1. Evaluation Indicators

Use the following indicators to assess the performance of the DSJWCA protocol and the comparison protocol:
  • Average energy expenditure (AEE): Only the energy consumption involved in data receiving and forwarding between sensor nodes based on Equations (13) and (14) is considered;
  • End-to-end delay (EED): The time spent from the first digit of the packet generated by the source node until the receiving node fully receives the packet;
  • Dominant Set Update (DSU): A dominant set is a collection of CH that will be updated when a node can no longer be a neighbor of the current dominant set.

5.2. Simulation Results

In order to study the reliability and performance of the protocol, this paper will compare the proposed protocol with WCA [16], LEACH-M [19], CBR-mobile [20], MBC [21], and JNSMIC [7] under the same scenario. The nodes are moved using the GM model, and the initial nodes are randomly deployed in the scenario. Each simulation in this article will be run ten separate times to allow for occasional errors. The simulation is also combined with the Weibull reliability model to test the operation of WSN under a non-ideal environment. The relevant parameters of the proposed protocol in Equation (1) are β = 3 and η = 1000. The weights in the weight calculation formula of Equation (12) are φ 1 = 0.35, φ 2 = 0.2, φ 3 = 0.2 and φ 4 = 0.25, respectively. Other network and simulation parameters are shown in Table 3.

5.2.1. Influence of Node Moving Speed

MWSN contains 100 nodes with a maximum communication radius of 40 m. The performance variation of the proposed algorithm and other algorithms was studied by adjusting the maximum moving speed of nodes in the range of 1–8 m/s. Figure 5, Figure 6 and Figure 7 show the influences of AEE, EED, DSU, and the proposed protocol caused by the change in movement speed.
Figure 5a noted that the DSJWCA protocol has lower energy consumption than other protocols. The change of node moving speed affects the AEE of different protocols, among which the WCA and LEACH-M protocols considerably change. As moving speed increases, the quality of communication links between nodes deteriorates, increasing the packet drop rate and leading to more energy consumption due to frequent clustering. As, in the clustering phase and when considering node movement and link connection time, the number of nodes that lost connection is relatively small, it can be seen that the AEE performance of MBC, JNSMIC, and the proposed protocol is stable. In contrast, although the AEE of the proposed and JNSMIC protocols are both lower, the proposed protocol’s consumption is increased due to second-level communication. The faster the movement speed, the more energy is needed, so the AEE of the proposed protocol increased slightly under the high-speed mobility scenario. This is caused by sacrificing part of the energy to improve the link quality.
As shown in Figure 5b, the EED of the WCA and LEACH-M protocol increases rapidly with the increase in node movement speed. High-speed moving nodes will bring significant challenges to communication links and clustering stability. MBC considers more about re-clustering nodes that have lost connection and are more active in dealing with node-link interruption, so the EED of the network has good feedback, but the EED is still relatively high in general. In terms of EED, JNSMIC is stable and performs better than other protocols because the link connection time is considered when selecting nodes in the cluster. Similarly, the proposed protocol in the fault-tolerant phase also performed well in EED. However, the multi-hop communication in the cluster leads to a certain degree of complexity in the communication network, accompanied by an inevitable increase in EED, but with good overall performance.
Figure 6 shows that increased node movement speed inevitably leads to more frequent CH updates. JNSMIC protocol dramatically improves CH selection’s accuracy by regularly partitioning the network. Both MBC and the proposed protocol select CHs based on weight. Compared with the MBC protocol, the proposed protocol not only considers the local energy change in the network but also improves the weight of the node mobility factor. At the same time, under the effect of second-level communication, communication links are not suddenly interrupted, and the probability of member nodes replacing CHs is reduced, reducing the speed of updating the dominant set to a certain extent.
Figure 7 shows that the reaffiliation of nodes is positively correlated with the moving speed. When a node moves slowly, it has a low probability of falling out of the CH’s communication range, so reaffiliation is also low. However, the link connection time will decrease when the node moves faster, and the clustering stability will decrease. Although the MBC protocol considers the link connection time of nodes in the clustering phase, it has a poor effect on nodes moving at high speed. JNSMIC establishes communication links for nodes with lost connections separately in the fault-tolerance phase but has no other decisive measures except selecting nodes with less mobility as CHs in the clustering phase. In contrast, the proposed protocol sets a second-level communication mechanism in a cluster to reduce the influence of high-speed node movement. Member nodes out of the communication range of CHs should first consider forwarding data through relay nodes rather than finding other CHs again.

5.2.2. Influence of Node Communication Radius

There are 100 nodes in the network, and the maximum moving speed of nodes is 3 m/s. The performance changes of proposed and comparative protocols are analyzed by changing the maximum communication radius of CHs within the range of 10–50 m. The changes in the DSU and reaffiliation of WCA, MBC, JNSMIC, and the proposed protocol under different communication radii are shown in Figure 8.
With the increase in the communication radius of CH, DSU and reaffiliation show different changing trends. The change of reaffiliation is no longer a simple increase or decrease, but rather it shows a trend of increasing and then decreasing with the increase of communication radius. When the communication radius of nodes is small, there will be more clusters in the network, and it is easy for nodes to move away from the communication radius of the CH. At the same time, the small communication radius also leads to small communication coverage of the CH. For these reasons, member nodes that have lost connection do not easily join new clusters and can only apply to new CH. As a result, the DSU of the sensor network is currently enormous. However, as the communication coverage of the whole network increases, the DSU of the sensor network will decrease. The above reasons also increase reaffiliation when the communication radius increases but gradually decrease after reaching the peak value. This phenomenon occurs because, when the moving speed of nodes is unchanged, broader communication coverage can make member nodes stay longer in their coverage area compared with a smaller communication radius.
Figure 8a shows that when the dominant set saturates the network communication coverage, the DSU of different protocols is very small. However, when the communication radius is small, the proposed protocol showed good capability to precisely select CHs, which reduced the replacement speed of CHs and the energy consumption of nodes simultaneously. In Figure 8b, these protocols showed similar results of node reaffiliation under the outer communication radius. However, the proposed protocol had a smaller peak value and a more stable overall curve. Simulation data show that the DSJWCA protocol has advantages in maintaining clustering stability and improving link connection time. This benefits from establishing the second-level communication within the cluster and plays a significant role in fault-tolerant measures such as the sudden failure of CHs and the active response of member nodes that lose connection.

5.2.3. Network Lifetime Comparison

There are 100 nodes in the network, the movement speed of nodes is 5 m/s, and the maximum communication radius is 40 m. Figure 9 shows the network lifetime of the different protocols in this scenario. WCA seeks CHs by calculating their weights. Although this protocol has no fixed period for CH selection, large-scale data computation consumes lots of energy. LEACH-M protocol extends the network lifetime by modifying the network operation process. Member nodes can only forward data in the allocated time slot and keep sleep in the other time slot, saving unnecessary energy consumption. JNSMIC protocol uses the MOIA algorithm to obtain the optimal dominant set. The protocol can modify the communication radius of nodes according to the moving speed and position of member nodes in the cluster. Better connectivity brings less energy consumption. The proposed protocol prolongs link connection time by using the mechanism of intra-cluster second-level communication. A relatively complex intra-cluster communication route consumes part of the node energy. However, unnecessary energy consumption can also be reduced by controlling the number of in-cluster second-level communication nodes. According to the simulation data, the intra-cluster communication energy consumption does not seriously affect the network lifetime. On the contrary, the link stability and low dominant set update reduce the clustering process and a lot of weight calculation.

6. Conclusions

This paper proposes a distributed node status judgment-based weighted clustering protocol in order to improve the connectivity and stability of wireless sensor networks. The protocol reduces the influence of node movement on cluster stability by using second-level communication within the cluster, improves link connection time, and reduces packet drop rate. In terms of CH selection, an improved weight calculation formula is used to comprehensively consider the mobility factor of sensor nodes, local density, residual energy density, link connection time, and other information. At the same time, the node status judgment algorithm is used to effectively control the number of second-level communication nodes in the cluster, reduce the complexity of intra-cluster communication, reduce energy consumption, and reduce node reaffiliation.
In addition, to avoid the sudden failure of CHs, the protocol builds the set of VCH to replace the CH to complete data collection and forwarding. Considering the noise of sensor data acquisition in a non-ideal environment, EKF is used to eliminate noise interference and predict the actual position of sensor nodes under the GM mobility model. The simulation results combined with the Weibull reliability model showed that the proposed protocol with the node status judgment algorithm performed better than WCA, LEACH-M, MBC, and JNSMIC protocols regarding reaffiliation, dominant set update, and average energy consumption. Subsequent work will address routing selection under a multi-hop communication network and the network problems faced in open environments.

Author Contributions

Conceptualization, W.Q. and L.Z.; methodology, W.Q.; software, S.Z. (Shushu Zhang) and W.Q.; validation, S.Z. (Shanjun Zhang); writing–original draft preparation, review and editing, W.Q. and Y.X.; visualization, supervision, project administration, funding acquisition, L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge the support from the Bagui Scholars Program of the Guangxi Zhuang Autonomous Region (No. 2019A08) and the National Project of Foreign Experts (No. G2022033007L).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jeong, Y.-S.; Han, Y.-H.; Park, J.J.; Lee, S. MSNS: Mobile sensor network simulator for area coverage and obstacle avoidance based on GML. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 95. [Google Scholar] [CrossRef] [Green Version]
  2. Albert, A.; Imsland, L. Survey: Mobile sensor networks for target searching and tracking. Cyber-Phys. Syst. 2018, 4, 57–98. [Google Scholar] [CrossRef]
  3. Mohamed, B.; Slami, S.; Ahmed, H. SZ-GESA: A Geodesical Efficient Self-Deployment Algorithm for Steppe Zones. J. Inf. Technol. Res. 2020, 13, 1–23. [Google Scholar] [CrossRef]
  4. Venkateswarulu, B.; Subbu, N.; Ramamurthy, S. An efficient routing protocol based on polar tracing function for underwater wireless sensor networks for mobility health monitoring system application. J. Med Syst. 2019, 43, 218. [Google Scholar] [CrossRef]
  5. Al-Sulaifanie, A.I.; Al-Sulaifanie, B.K.; Biswas, S. Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review. Comput. Commun. 2022, 191, 395–424. [Google Scholar] [CrossRef]
  6. Rady, A.; Shokair, M.; El-Rabaie, E.-S.M.; Sabor, N. Joint nodes and sink mobility based immune routing-clustering protocol for wireless sensor networks. Wirel. Pers. Commun. 2021, 118, 1189–1210. [Google Scholar] [CrossRef]
  7. Amiri, Z.; Heidari, A.; Navimipour, N.J.; Unal, M. Resilient and dependability management in distributed environments: A systematic and comprehensive literature review. Clust. Comput. 2022, 4, 1–36. [Google Scholar] [CrossRef]
  8. Tran, H.P.; Jung, W.-S.; Yoo, D.-S.; Oh, H. Design and Implementation of a Multi-Hop Real-Time LoRa Protocol for Dynamic LoRa Networks. Sensors 2022, 22, 3518. [Google Scholar] [CrossRef]
  9. Wenxing, L.; Muqing, W.; Min, Z.; Peizhe, L.; Tianze, L. Hop count limitation analysis in wireless multi-hop networks. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef] [Green Version]
  10. Elmonser, M.; Ben Chikha, H.; Attia, R. Mobile routing algorithm with dynamic clustering for energy large-scale wireless sensor networks. IET Wirel. Sens. Syst. 2020, 10, 208–213. [Google Scholar] [CrossRef]
  11. Ahmed, M.; Salleh, M.; Channa, M.I. CBE2R: Clustered-based energy efficient routing protocol for underwater wireless sensor network. Int. J. Electron. 2018, 105, 1916–1930. [Google Scholar] [CrossRef]
  12. Obaid, A.; Fernando, X.; Jaseemuddin, M. A mobility-aware cluster-based MAC protocol for radio-frequency energy harvesting cognitive wireless sensor networks. IET Wirel. Sens. Syst. 2021, 11, 206–218. [Google Scholar] [CrossRef]
  13. Boukerche, A.; Rogers, S. Performance of GZRP ad hoc routing protocol. J. Interconnect. Netw. 2001, 2, 31–48. [Google Scholar] [CrossRef]
  14. Rajesh, M.; Gnanasekar, J. Sector Routing Protocol (SRP) in Ad-hoc Networks. Control. Netw. Complex Syst. 2015, 5, 1–4. [Google Scholar]
  15. Roberts, M.K.; Ramasamy, P. Optimized hybrid routing protocol for energy-aware cluster head selection in wireless sensor networks. Digit. Signal Process. 2022, 130, 103737. [Google Scholar] [CrossRef]
  16. Chatterjee, M.; Das, S.K.; Turgut, D. WCA: A weighted clustering algorithm for mobile ad hoc networks. Clust. Comput. 2002, 5, 193–204. [Google Scholar] [CrossRef]
  17. Gardas, B.B.; Heidari, A.; Navimipour, N.J.; Unal, M. A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model. Appl. Sci. 2022, 12, 8906. [Google Scholar] [CrossRef]
  18. Kim, D.-S.; Chung, Y.-J. Self-organization routing protocol supporting mobile nodes for wireless sensor network. In Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS’06), Hangzhou, China, 20–24 June 2006; pp. 622–626. [Google Scholar]
  19. Ramalingam, R.; Muniyan, R.; Dumka, A.; Singh, D.P.; Mohamed, H.G.; Singh, R.; Anand, D.; Noya, I.D. Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection. Electronics 2022, 11, 2637. [Google Scholar] [CrossRef]
  20. Awwad, S.A.; Ng, C.K.; Noordin, N.K.; Rasid, M. Cluster based routing protocol with adaptive scheduling for mobility and energy awareness in wireless sensor network. Proc. Asia-Pacific Adv. Netw. 2010, 20, 57–65. [Google Scholar] [CrossRef]
  21. Deng, S.; Li, J.; Shen, L. Mobility-based clustering protocol for wireless sensor networks with mobile nodes. IET Wirel. Sens. Syst. 2011, 1, 39–47. [Google Scholar] [CrossRef]
  22. Sabor, N.; Ahmed, S.M.; Abo-Zahhad, M.; Sasaki, S. ARBIC: An adjustable range based immune hierarchy clustering protocol supporting mobility of wireless sensor networks. Pervasive Mob. Comput. 2018, 43, 27–48. [Google Scholar] [CrossRef]
  23. Cakici, S.; Erturk, I.; Atmaca, S.; Karahan, A. A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks. Wirel. Pers. Commun. 2014, 77, 2235–2254. [Google Scholar] [CrossRef]
  24. Bany Salameh, H.; Obaidat, H.; Al-Shamali, A.; Jararweh, Y. A two-level clustering mechanism for energy enhancement in Internet-of-Things-based wireless sensor networks. Commun. Syst. 2021, 34, e4913. [Google Scholar] [CrossRef]
  25. Paradis, L.; Han, Q. A survey of fault management in wireless sensor networks. J. Netw. Syst. Manag. 2007, 15, 171–190. [Google Scholar] [CrossRef]
  26. Zamanifar, A.; Nazemi, E.; Vahidi-Asl, M. A mobility solution for hazardous areas based on 6LoWPAN. Mob. Networks Appl. 2018, 23, 1539–1554. [Google Scholar] [CrossRef]
  27. Yang, Z.; Jianjun, L.; Faqiri, H.; Shafik, W.; Talal Abdulrahman, A.; Yusuf, M.; Sharawy, A. Green internet of things and big data application in smart cities development. Complexity 2021, 2021, 1–15. [Google Scholar] [CrossRef]
  28. Ge, X.; Tu, S.; Han, T.; Li, Q.; Mao, G. Energy efficiency of small cell backhaul networks based on Gauss–Markov mobile models. IET Netw. 2015, 4, 158–167. [Google Scholar] [CrossRef] [Green Version]
  29. Lee, J.-J.; Krishnamachari, B.; Kuo, C.-C.J. Aging analysis in large-scale wireless sensor networks. Ad Hoc Netw. 2008, 6, 1117–1133. [Google Scholar] [CrossRef]
  30. Balamurali, R.; Kathiravan, K. A survey on mitigating hotspot problems in wireless sensor networks. Int. J. Appl. Eng. Res. 2015, 10, 5913–5921. [Google Scholar]
  31. Moussa, N.; El Belrhiti El Alaoui, A. An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs. Peer-to-Peer Netw. Appl. 2021, 14, 1334–1347. [Google Scholar] [CrossRef]
  32. Jaiswal, R.K.; Jaidhar, C. Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter. Wirel. Netw. 2017, 23, 2021–2036. [Google Scholar] [CrossRef]
Figure 1. Wireless sensor network architecture with multi-hop communication.
Figure 1. Wireless sensor network architecture with multi-hop communication.
Electronics 11 03865 g001
Figure 2. Network node movement trajectory diagram with GM model.
Figure 2. Network node movement trajectory diagram with GM model.
Electronics 11 03865 g002
Figure 3. Operation of the proposed protocol.
Figure 3. Operation of the proposed protocol.
Electronics 11 03865 g003
Figure 4. Range of node movement angle in safe status.
Figure 4. Range of node movement angle in safe status.
Electronics 11 03865 g004
Figure 5. Effect of node movement speed on the AEE and EED of different protocols. (a) Relationship between average energy expenditure per round and WSN maximum speed; (b) relationship between end-to-end delay and WSN maximum speed.
Figure 5. Effect of node movement speed on the AEE and EED of different protocols. (a) Relationship between average energy expenditure per round and WSN maximum speed; (b) relationship between end-to-end delay and WSN maximum speed.
Electronics 11 03865 g005
Figure 6. Dominant set update results versus maximum speed of MSNs.
Figure 6. Dominant set update results versus maximum speed of MSNs.
Electronics 11 03865 g006
Figure 7. Reaffiliations per round versus maximum speed of MSNs.
Figure 7. Reaffiliations per round versus maximum speed of MSNs.
Electronics 11 03865 g007
Figure 8. Effect of node transmission range on the DSU and reaffiliation of different protocols. (a) Dominant set update results versus transmission range; (b) reaffiliations per round versus transmission range.
Figure 8. Effect of node transmission range on the DSU and reaffiliation of different protocols. (a) Dominant set update results versus transmission range; (b) reaffiliations per round versus transmission range.
Electronics 11 03865 g008
Figure 9. Number of live sensor nodes in MSNs.
Figure 9. Number of live sensor nodes in MSNs.
Electronics 11 03865 g009
Table 1. Comparison of the proposed algorithm and existing clustering algorithms.
Table 1. Comparison of the proposed algorithm and existing clustering algorithms.
Papers ReferredCluster Communication (Inter/Intra-Cluster)Organizational FormCluster StabilityPacket Delivery RatioRouting Overhead
Rady and Shokair et al. [6]multi/single hopdistributedunstableyesyes
MAINAK [16]multi/single hopcentralizedunstablenono
Kim and Chung [18]multi/single hopdistributedunstableyesno
Awwad et al. [20]multi/single hopdistributedstableyesno
Deng [21]multi/single hopdistributedunstablenoyes
Sabor et al. [22]multi/single hopdistributedstableyesyes
Proposedmulti/multi hopdistributedstableyesyes
Yes” and “no” indicate whether the work considers the corresponding performance indicator.
Table 2. Description of EKF symbols.
Table 2. Description of EKF symbols.
SymbolDescription
x t predicted position at time t
x t the position of the filter prediction at time t
z t measurement position at time t
u t input command at time t
w t process noise at time t
Q t process noise covariance matrix
P t error covariance of filter estimates at time t
P t error covariance at time t
v t measurement error at time t
K t Kalman gain at time t
Eidentity matrix
H t measurement matrix at time t
H t T transpose matrix of H t
The table shows some parameters contained in the EKF iteration formula and their interpretations.
Table 3. Radio and network parameters.
Table 3. Radio and network parameters.
ParameterValue
Sensor deployment Scope150 × 150 m 2
BS location[75,75]m
Maximum communication radius ( R m a x )40 m
The initial energy of node1 J
Transmission power ( P t x ):0,−5,−10,−15 dBm93,72,57,49.5 mW
Received power ( P r x )81 mW
Idle power ( P i d l e )3 mW
Sleep power ( P s l e e p )6 μ W
Aggregated energy ( E D A )5 nJ/bit/slot
Data packet length ( L d )1000 bits
Control packet length ( L c )100 bits
Data rate ( R d )40 Kbit/s
Mobility modelGauss-Markov (GM) Model
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Qi, W.; Xia, Y.; Zhang, S.; Zhang, S.; Zhu, L. Research on Stability-Enhanced Clustering Algorithm Based on Distributed Node Status Judgment in MWSN. Electronics 2022, 11, 3865. https://doi.org/10.3390/electronics11233865

AMA Style

Qi W, Xia Y, Zhang S, Zhang S, Zhu L. Research on Stability-Enhanced Clustering Algorithm Based on Distributed Node Status Judgment in MWSN. Electronics. 2022; 11(23):3865. https://doi.org/10.3390/electronics11233865

Chicago/Turabian Style

Qi, Weiwei, Yu Xia, Shushu Zhang, Shanjun Zhang, and Liucun Zhu. 2022. "Research on Stability-Enhanced Clustering Algorithm Based on Distributed Node Status Judgment in MWSN" Electronics 11, no. 23: 3865. https://doi.org/10.3390/electronics11233865

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop