Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Potentiality of Using Luojia 1-01 Nighttime Light Imagery to Investigate Artificial Light Pollution
Next Article in Special Issue
Sensoring a Generative System to Create User-Controlled Melodies
Previous Article in Journal
A Fluorescent Cy7-Mercaptopyridine for the Selective Detection of Glutathione over Homocysteine and Cysteine
Previous Article in Special Issue
Evolutionary Design of Convolutional Neural Networks for Human Activity Recognition in Sensor-Rich Environments
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Clustering WSN Routing Protocol Based on k-d Tree Algorithm

by
John Anzola
1,2,
Jordán Pascual
3,
Giovanny Tarazona
2 and
Rubén González Crespo
4,*
1
Department of Electronic Engineering, Fundación Universitaria Los Libertadores, Cr. 16 # 63A-68 Bogotá, Colombia
2
Department of Engineering, Distrital University Francisco José de Caldas, Cr. 7 # 40B-53 Bogotá, Colombia
3
Department of Computer Sciences, University of Oviedo, Street San Francisco, 33003 Oviedo, Spain
4
Technology and Engineering Department of UNIR, Universidad International de la Rioja (UNIR), C/Almansa 101, 28040 Madrid, Spain
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(9), 2899; https://doi.org/10.3390/s18092899
Submission received: 17 July 2018 / Revised: 27 August 2018 / Accepted: 29 August 2018 / Published: 1 September 2018
(This article belongs to the Special Issue Wireless Sensors Networks in Activity Detection and Context Awareness)

Abstract

:
Clustering in wireless sensor networks has been widely discussed in the literature as a strategy to reduce power consumption. However, aspects such as cluster formation and cluster head (CH) node assignment strategies have a significant impact on quality of service, as energy savings imply restrictions in application usage and data traffic within the network. Regarding the first aspect, this article proposes a hierarchical routing protocol based on the k-d tree algorithm, taking a partition data structure of the space to organize nodes into clusters. For the second aspect, we propose a reactive mechanism for the formation of CH nodes, with the purpose of improving delay, jitter, and throughput, in contrast with the low-energy adaptive clustering hierarchy/hierarchy-centralized protocol and validating the results through simulation.

1. Introduction

Wireless Sensor Networks (WSN) have exploded in popularity in the last few years. Part of this growth is due to the popularization of the Internet of Things (IoT), where connectivity, sensitivity, interaction, and energy are elements of the systems in a WSN. In a WSN, a node is defined as the minimal functional unit of a network and is comprised of a sensor/actuator, a central processing unit (CPU), a memory bank, a wireless transceiver, and a power source. As a unit, the node suffers energy depletion of its internal battery as a result of sensing, processing, data transmission and reception.
Interaction through wireless transmission in a WSN includes issues such as link viability, time to establish communication, data loss due to competition overuse of a wireless channel, data loss due to simultaneous transmission attempts, data loss due to repeated network flooding, and data loss due to transmission range.
Network scalability problems are caused by the birth, reboot, and death of one or several nodes in the network. Link problems in WSNs include neighbor discovery, message, loss, latency, and congestion. WSNs also have routing problems such as communication path and loop discovery [1]. In general lines, WSNs have a wide range of problems, although most of them have been addressed through communication protocols.
The aforementioned problems have been approached through flat and hierarchical routing structures. In a flat routing structure, all the nodes in the network play the same role in end-to-end routing protocols. In hierarchical routing structures, nodes are classified by functionality and the network is divided into groups or clusters, each of which chooses a leading node that is called Cluster Head node (CH). The CH node coordinates activities inside and outside the cluster with non-CH nodes.
The main feature of flat routing structures is the ability to establish communication between any two nodes in the network without the participation of a central node. These networks, also called ad hoc networks, can operate in isolation, without connection to network infrastructure such as the Internet.
A hierarchical routing structure organizes large-scale ad hoc networks into groups or clusters, with the objective of improving network efficiency beyond the attainable level of flat routing structures. Although hierarchical routing can increase control traffic, its topology allows for data traffic to be confined within each cluster. Nodes inside each cluster can organize to optimize communications and reduce interference caused by simultaneous data transmission.
Cluster-based hierarchical routing presents some advantages in scalability and communication efficiency. Protocols based on this schema have been used to achieve routing efficiency in connection to node energy levels. That is, nodes with higher energy reserves are candidates to becoming CH nodes, and those with lower energy levels are used to monitor the environment. In this type of routing, CH nodes have specific functions to improve the scalability, lifetime, and energy efficiency of the network.
Cluster-based routing structures represent a simpler approach to the issues of WSNs, lowering the complexity of flat routing structures [2]. However, cluster-based routing schemes are, in general, comprised of a cluster-formation and a CH-node selection mechanism. The behavior of the latter has an impact on the WSN’s general performance since a high degree of variability in this mechanism creates a proportional variability of the network’s response regarding delay, jitter, and throughput, and an inversely proportional response in energy levels.
The cluster formation mechanism creates clusters of varying sizes and, as a consequence, of varying density. This cluster formation method has an impact on the behavior of the network, which responds according to its cluster formation type. For example, a heterogeneous cluster formation causes data traffic within the clusters to become heterogeneous, that is, having varying dataflow responses in the majority of network nodes. This flow variability causes the network to show different delay and jitter values, limiting the usefulness of resource-intensive applications.
Given the problems found in the cluster formation and CH node selection mechanisms, our goal is to propose a WSN communications protocol that uses a hierarchical routing schema called H-kdtree. Its routing algorithm is based on the k-d tree algorithm, which allows creating partitions in an area with the mean of the data of one of its dimensions. Additionally, the H-kdtree protocol proposes a low-variability CH node generation mechanism, with a positive impact on delay, jitter, and throughput, compared with the low-energy adaptive clustering hierarchy protocol (LEACH) and low-energy adaptive clustering hierarchy-centralized (LEACH-C).
As a comparison, we have selected the LEACH and LEACH-C protocols, on account of being the most widely used hierarchical clustering protocol and also the most discussed in the literature. Clustering protocols work through one or several metrics that provide the necessary ability to manage network traffic efficiently and to improve the experience of a user or machine in different network environments. These improvements are usually in one or several network metrics such as load balancing, energy consumption, scalability, latency reduction, data traffic maximization, errors and data loss minimization. Quality of Service (QoS) is the improvement in one or several of these network metrics.
This article analyzes the performance of the LEACH, LEACH-C and the proposed H-kdtree protocol, by measuring the following metrics: delay, jitter, throughput, packet drop rate (PDR), and average network energy.
This article is structured as follows: Section 2 includes a review of literature related to cluster formation and CH node selection. The fundamental basis for LEACH, LEACH-C and k-d tree is described in Section 3. Protocol considerations and a description of the configuration and data transmission phases are discussed in Section 4. Section 5 includes parameters, metrics, and results of the simulation of the proposed protocol. Finally, Section 6 presents the conclusions.

2. Related Work

This section presents some of the most relevant works about techniques and mechanisms for cluster formation and CH node selection.

2.1. Cluster Formation

In WSNs, cluster formation is a technique that allows the classification of nodes in groups or clusters so that every node in a cluster shares a certain degree of homogeneity regarding the techniques, rules or heuristics on which the selection is based.
In the majority of distance-based cluster formation algorithms for WSNs, it is assumed that the nodes of the network know their a priori location in the plane. However, the literature includes proposals where nodes transmit their distance to a Base Station node (BS) via either Received Signal Strength Indicator (RSSI) [3] or geo-positioning by using the Global Positioning System (GPS) [4].
The main objective of partition clustering algorithms in WSNs is to divide the nodes into k partitions, according to their position. Each partition is considered a cluster. The partitioning technique will depend on an objective function. The most representative clustering mechanisms employed in WSNs are k-means [5,6,7], fuzzy c-means [8], k-medoids [4,9].
The hierarchical grouping method in a WSN tries to build a tree-based network topology mainly derived from the position of each node. This grouping process is represented by topologies with two or more jumps to a BS node. Some of the most representative algorithms are LEACH [10], LEACH variations [11,12,13].
Density-based cluster formation methods assume that nodes in each group are extracted from a probability distribution in relation to the total number of nodes in the network. Some works in this area are: to maximize the network lifetime [14,15], adaptive clustering [16], and density-based fuzzy imperialist competitive clustering algorithm [17]. The approaches of cluster formation based on cooperation have provided solutions to the problem of energy management using the information of the energy spectrum detected [18].

2.2. Cluster Head Selection

Cluster-head capabilities depend on the clustering objectives or focus used in their formation, and taking into account the capabilities of the nodes and their effective range. Most of the work on CH node selection has focused on the energy capacity of network nodes [19,20]. The following node attributes have been differentiating factors among the various clustering and CH node selection schemes.
Regarding the mobility or stationarity of nodes and CH nodes in WSN hierarchical routing, some proposals adhere to mobile nodes where membership to each node changes dynamically and clusters are required to auto-configure and keep an updated members list with incoming and outgoing nodes [21,22]. Other proposals favor a stationary approach, in which all nodes tend to group into stable clusters, which allows for simpler network administration and intra/inter-cluster communications [23].
The literature includes types of nodes of extended hardware capability [24]. Some algorithms include references to advanced nodes, defined as those nodes with more energy [25]. Other approaches focus on network interoperability, with nodes for different types of connectivity [26], and interoperability between nodes of fixed and wireless networks [27].
The types of roles of a node in a hierarchical protocol can be either a data transmission node or a CH node, and each node can change roles between rounds. Some proposals include auxiliary nodes that can take the role of the CH node in cases where the CH node fails [28]. Other approaches use a fuzzy inference system to improve the adaptability of the selection of CH nodes, finding that the stochastic selection methods can not guarantee the availability of CH nodes [29].
This article takes into account several aspects that are not approached completely in the cited literature. In particular, this article proposes a hierarchical routing protocol based on the k-d tree algorithm and on a reactive mechanism for the formation of CH nodes, validating its QoS through an experimental approach through simulation. Complementary information can be consulted in [4,30], also aspects related to the location of nodes in WSN [31], design problems [32] and the extension of possible applications in other areas of knowledge such as robotics [33,34], social networks [35] and applications that can support QoS [36,37].

3. Background and Preliminaries

The following subsections present the working principles of the LEACH and H-kdtree algorithms, as their key concepts are used in the proposed protocol.

3.1. The LEACH Protocol

The Low-Energy Adaptive Clustering Hierarchy protocol (LEACH) uses a cluster-based routing scheme to minimize total network energy consumption. In LEACH, nodes deployed in an area are organized into clusters, with each cluster having a CH node, as shown in Figure 1. The communication process is divided into two phases: the configuration phase and the stable state phase [10].
During the configuration phase, the CH nodes and member nodes of each cluster are selected. During the stable state phase, nodes are added to the CH node and remain in waiting to initiate data transmission to the Base Station (BS) node, using the sequence shown in Figure 2. In the literature, many authors refer to the base node as Sink node [38], which we refer to from this point on as Sink/BS node. The duration of the stable state phase is longer than the configuration phase, due to the processing work performed in it. Consequently, energy consumption during the stable state phase is higher.
During the configuration phase, the nodes that will become CH nodes for the current round are selected independently and randomly, with the requirement that their energy is greater than zero and a lower threshold. The capacity to become a CH node is determined by the generation of a random number ( R n ) where R n 0 , 1 . The CH node is selected if R n T ( n ) , where T ( n ) is a threshold value obtained from Equation (1). The CH node will transmit its nomination to the nodes in the cluster. The nodes in the cluster are selected by their distance to the CH node and, in some cases, this is measured through the received signal strength indicator (RSSI) [39]:
t ( n ) = p 1 p · ( r · m o d · 1 p ) ) , if n G , 0 , another case .
where p is the probability for a node to become CH node over all the nodes in the network, r is the current number of selection rounds, and G is the set of nodes that were not selected as CH nodes before 1 p rounds.
The CH nodes selected for each cluster will reserve a free slot for data transmission of the member nodes by using a distribution of a TDMA programming table that will indicate each CH node the data transmission sequence, giving CH nodes the possibility of staying in repose for the longest possible time.
Using TDMA for data transmission prevents collisions within each cluster [40]. In the steady state phase, CH nodes compile data from the nodes in each cluster and send them to the Sink/BS node. Data redundancy may occur during this phase. The redundant packets being processed and transmitted to the Sink/BS node result in an increase in unnecessary network traffic and overall network bandwidth, which directly affects energy consumption. The more redundant data is processed, the more energy will be wasted. Data transmission to CH nodes saves energy in comparison to direct data transmission from the nodes to the Sink/BS node. Therefore, to avoid the early death of CH nodes, all the nodes in the network will elect other CH nodes, repeating both phases for every round during the lifetime of the network.
For every node, we used the energy model described in [41], which is shown in Figure 3. This assumes that the wireless channel is completely symmetrical, so the energy used in transmitting a message through the round-trip route between a network node and the Sink/BS node through the CH node, v i and v j is equal. The free space channel model used is d 2 ( v i , v j ) , as the nodes are located in a plane and remain static and we assume that there is a direct line of sight between the network nodes and the Sink/BS node. If the communication distance d ( v i , v j ) from v i to v j is greater than the threshold distance d 0 , that is, d ( v i , v j ) d 0 , the model chosen is the multipath fading model d 4 ( v i , v j ) . This is the case for both the LEACH protocol and the H-kdtree protocol presented in this article. Energy consumption ( E T l , d ( v i , v j ) ) is calculated as:
E T = l · E e l e c + l · ϵ f s · d 2 ( v i , v j ) , d ( v i , v j ) < d 0 , l · E e l e c + l · ϵ a m p · d 4 ( v i , v j ) , d ( v i , v j ) d 0 ,
where l is a message of l b i t s to be transmitted over d ( v i , v j ) , given by E R ( l ) = l · E e l e c , where E e l e c represents the loss of the transmission circuit as a function of digital encoding, the type of modulation used, filtering processes and signal dispersion, based on energy coefficients ϵ f s · d 2 ( v i , v j ) and ϵ a m p · d 4 ( v i , v j ) for power amplifiers in two channel models.
One of the characteristics of LEACH and its different variations is that it maintains the configuration phase, transmission and a hierarchical topology of two jumps. Under these characteristics, the algorithm LEACH runs in O ( n · l o g · m ) time for n sensor nodes and m CHs [42].

3.2. LEACH-C Protocol

The LEACH-C protocol is a centralized version of the LEACH protocol, and, therefore, it uses the same phases of the LEACH protocol, which are configuration and transmission phase forming rounds. During the LEACH-C configuration phase, each node in the network sends a packet to the Sink/BS node that contains the location and power level. The Sink/BS node calculates the average energy value of all the nodes, selected as possible node CH, only the nodes with more energy than the average value of the energy of all the nodes in the network.
The Sink/BS node uses an annealing algorithm for the formation of clusters [43,44]. The other LEACH-C operations are the same as those of LEACH and the results show that LEACH-C has energy improvements on LEACH [45], for the following reasons:
  • The Sink/BS node is static and is the one that organizes. the roles of each node in the network, centralizing information and cluster formation.
  • When clusters are formed, they do not communicate between nodes to save energy.
  • The Sink/BS node in the configuration phase establishes the CH nodes beforehand; therefore, the network can use energy more effectively.

3.3. k-d Tree Algorithm

Given the problem of two-dimensional rectangular range queries, a rectangle is divided into a smaller rectangle, which in turn is divided into another rectangle, and the process is repeated n times (depth), obtaining successive smaller areas. Within these areas (rectangles), we can locate a set of points that can be referenced as a unit, accessible via a route originated in a binary tree. Figure 4 shows the basic working idea of the k-d algorithm [46].
Given P as the set of n points in the plane, we can assume as a principle that no two points share the same ( x , y ) coordinates. There are no cases where two or more points are superimposed.
Definition 1.
In a two-dimensional rectangular range query in P, we ask for the points in P inside the query rectangle [ x : x ] [ y , y ] . A point p : = ( p x , p y ) is inside that rectangle if and only if:
p x [ x : x ] a n d p y [ y , y ] .
Definition 2.
Recursive binary search tree for a set of points in one dimension is divided into two subsets of approximately the same size, based on the median of the set of points. In this way, the root contains two subsets distributed in two subtrees, where each subset of the subsets already created become subtrees that will be processed recursively.
The procedure to build the k-d tree has two parameters: one set of points P and an integer value that represents the depth of the subtree root, as shown in Algorithm 1.
Algorithm 1 k-d tree algorithm.
Require: A set of points ( x , y ) named P and the tree depth value
Ensure: The root of the k-d tree
1:
function: build_k-d_tree ( P , d e p t h )
2:
if (P contains only one point) then
3:
return the root with that point
4:
else if ( d e p t h is an even number) then
5:
 divide the values of P into two subsets by using the median of the x coordinates of the P set.
 It generates two subsets:
6:
if ( P x i < m e d i a n ( x ) ) then
7:
   P x i 1 : = s u b s e t l e f t
8:
else
9:
   P x i 2 : = s u b s e t r i g h t
10:
end if
11:
else
12:
 divide the values of P into two subsets by using the median of the y coordinates of the P set.
 It generates two subsets:
13:
end if
14:
d e p t h = d e p t h + 1
15:
end function
For the function of the Algorithm 1:
  • Creates a root node with two subsets P ( ) i 1 for the left side of the tree and P ( ) i 2 for the right side of the tree.
  • ( ) is the subset of initial data where the partitioning of points will begin. In this algorithm, x is used for even depth values and y is used for odd values.
  • Repeat steps 1 to 14 to create the branches of the tree, where the input parameter with the input data set is the subset P ( ) i 1 , 2 .
The time used in k groups of the kd-tree algorithm is O ( k ) for the depth of the tree and because P is a finite set each partition has a length in time of O ( l o g ( n ) ) , so the time total used in the algorithm is O ( l o g ( n ) + k ) [46].

4. Proposed Protocol

This section describes in detail the hierarchical k-dimensional tree algorithm (H-kdtree). Unlike conventional WSN routing protocols like LEACH, HEED, TEEN, etc. [47,48], which used a few variations on Equation (1) to form clusters and select CH nodes according to nodes’ residual energy and their distance to the Sink/BS node, H-kdtree uses the one-dimensional clustering principle taken from the k-d tree algorithm. This algorithm generates a hierarchical two-hop network topology similar to LEACH’s.
Next, we will explain the clustering mechanism of the k-d tree algorithm intuitively, using the data from Table 1.
The data in Table 1 are divided into two clusters, starting data partition with data from the x dimension, implementing the median value ( v m ), where v m = ( v m a x + v m i n ) / 2 . For the data in Table 1, we have a median value of 53.5 for the x dimension, as shown in Figure 5.
In Figure 5, the algorithm shows the formation of two clusters. Each of the clusters found contains three variables:
  • Dimension used for the division (x or y),
  • Median value ( v m ),
  • Limits of the nodes in each cluster.
The limits on the y dimension for c l u s t e r 1 and c l u s t e r 2 are, respectively, 29 y ( c l u s t e r 1 ) 75 y 29 y ( c l u s t e r 2 ) 93 . The structure in Figure 5 is divided in the same way but alternating the dimension, which in this case would be y, obtaining a new structure with four clusters, as shown in Figure 6.
Based on the structure obtained so far, as shown in Figure 6, we change dimension and begin to create new partitions, as shown in Figure 7. The process shown so far is repeated iteratively until the stop condition is met, being the number of clusters or the minimum group condition.
Algorithm 2 has the k variable as the input parameter. The k variable represents the number of clusters desired (this is a parameter similar to the Algorithm 2 has the k variable as the input parameter. The k variable represents the number of clusters desired (this is a parameter similar to the k-means algorithm). If k = 3 , the first iteration obtains the data in Figure 5. Up to this point, we have two clusters. In the next iteration, we would obtain four clusters, but since the goal is to obtain three clusters, we take the clusters obtained so far and we select the cluster with the highest node count and partition only this cluster. In this way, we obtain the desired three clusters. In case the two clusters obtained in the first iteration have an equal number of nodes, one of them is chosen randomly.

4.1. Protocol Considerations

The maximum number of clusters that can be obtained is the total number of nodes divided by four. The minimum cluster condition regarding the number of nodes is three nodes and a CH node. In case we have a remainder smaller than four, the remaining nodes are added to the nearest cluster. In other words, the last partition of the current dimension in the algorithm is not performed.
The working principle of the H-kdtree protocol determines the following condition and consideration for the management of the complete network: Every action in the network is centralized and managed by the Sink/BS node, and all nodes in the network are within the range of the Sink/BS node.
Every node has a minimum energy threshold. This threshold is a function of the power supply voltage of each node. Every node will send the Sink/BS node a “Death” message when their power reserves reach 3% of the minimum operational threshold, informing the Sink/BS node that it is dead.

4.2. Configuration Phase

The Sink/BS node begins flooding the network with a broadcasted “Hello” message, to which every node in the network will reply with an acknowledgment message informing their nd energy level.
With the information obtained in the flooding process, H-kdtree begins the cluster formation process, based on the k-d tree algorithm. Once the clusters are formed, the following step is to select the CH nodes, based on the energy levels obtained during the flooding process. The node with the highest energy is selected as CH node. If two or more nodes have the same energy level, one of them is randomly selected to become a CH node.
At this point, the Sink/BS node already has information of every cluster, with their respective CH node and member nodes. The next step is configuring static routes. The Sink/BS node sends the CH nodes the static routes information, which is then forwarded to the rest of the nodes in each cluster. The result is the typical LEACH hierarchical routing, using a two-hop topology.

4.3. Transmission Phase

The data transmission phase is divided into rounds. Every round has a time slot of N-nodes, where N-nodes is the number of non-CH nodes in the network. During this period, the Sink/BS node sends a “Request” packet to the first CH node. Once the CH node receives this “Request” packet, it organizes a programmed transmission with the nodes in its cluster by using TDMA as access method. This process is repeated for all the clusters in the network.
The “Death” packet informs the Sink/BS node that a node has just died. Nodes in a cluster transmit the “Death” packet to the Sink/BS node using their respective time slot. If a CH node dies, it transmits its “Death” packet to the Sink/BS node when queried by the Sink/BS node. At the end of each round, the Sink/BS node reviews which nodes sent a “Death” packet. In case a “Death” packet arrives at the end of a round, the Sink/BS node begins the configuration phase, as shown in Figure 8.
Figure 9 below shows the H-kdtree protocol’s algorithm. Algorithm 2 shows the cluster formation process as a complement to the processes described in this section.
Algorithm 2 Cluster formation based on the k-d tree algorithm.
Require: Matrix obtained in the flooding process, with the following fields: i d n o d e , x c o r , y c o r , e n e r g y .
  The d i m variable is the value of the column to that corresponds to the dimension to be selected,
  where x c o r = 2 , y c o r = 3 .
Ensure: List with the vectors of the positions selected in each cluster
1:
function: cluster_formation ( m a t , d i m )
#Variable v e c 1 , stores the positional values of c l u s t e r 1
2:
v e c 1 = r e p ( N A , l e n g t h ( m a t [ , 1 ] ) )
#Variable v e c 2 , stores the positional values of c l u s t e r 2
3:
v e c 2 = r e p ( N A , l e n g t h ( m a t [ , 1 ] ) )
#Calculate the median of the selected partition
4:
v m = m e d i a n ( m a t [ , d i m ] )
#Traverse the data in the selected dimension
5:
for (i in 1:length(mat[,1])) do
6:
#Subdivide the dimension into two clusters, depending on the median value
7:
if ( m a t [ i , d i m ] > v m ) then
7:
   v e c 1 [ i ] = i
9:
else
10:
   v e c 2 [ i ] = i
11:
end if
12:
end for
13:
refturn ( l i s t ( v e c 1 , v e c 2 , v m ) )

5. Simulation and Results Analysis

For the simulation, we used NS-2 version 2.35, simulating LEACH, LEACH-C and H-kdtree in the same network environment to make a comparison and obtain metrics in the same simulator. The LEACH, LEACH-C and H-kdtree algorithms were implemented using R version 3.4.3. Implementing the algorithms using R allowed us to generate scripts in “.tcl”, which were embedded in the main script to configure position and initial energy of the nodes, static routing between nodes, CH nodes and Sink/BS node, along with traffic generated in each time slot, and planned information transmission in TDMA.

5.1. Simulation Parameters

There were two simulation scenarios for LEACH, LEACH-C and H-kdtree. Scenario 1 consisted of a random deployment of sensors. Scenario 2 was a sensor deployment with higher density in the central zone of a deterministic scenario, as shown in Figure 10.
The use of random and deterministic node deployment scenarios aimed at abstracting network traffic behavior to evaluate QoS. Node deployment was done in a 100 m × 100 m area, maintaining the same density in both scenarios. The deterministic scenario aimed to evaluate network traffic in a scenario with higher density in its central area, with the objective of analyzing the influence of clustering in both types of scenarios.
Table 2 shows the simulation parameters used. These parameters are used in literature mainly to evaluate the performance of LEACH and LEACH-C [49,50,51,52].
Hierarchical protocols present two types of networks, according to their energy: homogeneous and heterogeneous networks. In homogeneous networks, the initial energy level is the same for all the nodes in the network. In heterogeneous networks, the nodes in the network have different initial energy values.
In the scenarios shown in Figure 10, the network is divided into two energy levels. This energy division is represented by the parameter m, which is used to calculate cluster energy ( E c l s ) [53]. ( E c l s ) can be calculated as follows:
E c l s = N c l s · E 0 · ( 1 m ) + N c l s · m · E 0 · ( 1 + α ) ,
where E 0 is the initial energy of a regular node, N c l s is the number of clusters, and m is the percentage of nodes in the network with an advanced energy level. The quantity of advanced energy is represented by α . H-kdtree uses the simulation parameter k to obtain the depth with which the nodes in the network will be partitioned. This partition is similar to LEACH’s p parameter, which is used to estimate the expected number of CH nodes.

5.2. Simulation Metrics

To assess data traffic performance and QoS in the proposed scenarios, we used the following performance metrics.

5.2.1. End-to-End Delay (EED)

It is the time elapsed since a packet is sent by a node and until the packet is received by the Sink/BS node, taking into account the latencies experienced in all its path, including the latency of the CH node [54]. It is calculated as follows:
E E D = T r e c T s e n t ,
where T r e c is the time when the Sink/BS node receives a data packet, and T s e n t is the time when a non-CH node sends that data packet.

5.2.2. Throughput

This is the number of bits that can be transmitted by each node to the Sink/BS node in a period of time [55]. The sum of the throughput of each node in the network is known as network throughput. The throughput is obtained by dividing the total number of packets received (by the Sink/BS node) by the total time for each round
T h r o u g h p u t = p a c k e t s r e c e i v e d × p a c k e t s i z e t o t a l _ t i m e t r a n s m i t t e d .

5.2.3. Packet Delivery Ratio (PDR)

This is the ratio between the number of data packets received by the Sink/BS node and the number of data packets sent by the network nodes [56]. The PDR value can be obtained by the following equation:
P D R ( % ) = N o _ p a c k e t r e c e i v e d N o _ p a c k e t s e n t × 100 .

5.2.4. Jitter

Jitter can estimate the instability of a communication link. It is the variability in the time needed by a packet to reach the previously transmitted packet [57]. It is calculated by:
J i t t e r = i = 0 1 D e l a y i D e l a y ¯ N .

5.2.5. Auxiliary Metrics

Other performance metrics used in hierarchical routing protocols are summarized below. These metrics are the synthesis of the results in terms of node extinction per round. The metrics evaluated in both protocols are:
  • First node died (FND): It is the number of rounds in the network until the first node has depleted its energy and died.
  • Half of nodes died (HND):It is the number of rounds in the network until half of the nodes in the network have depleted their energy and died.
  • Last node died (LND): It is the number of rounds in the network until all nodes in the network have depleted their energy and died.

5.3. Results and Discussion

In the results obtained, one of the most stable parameters found in the proposed H-kdtree protocol is related to the formation of CH nodes, as shown in Figure 11. In this section, we analyze the impact of low variability in CH node formation, in relation to the following performance metrics: delay, throughput, and jitter, and their results are interpreted as QoS.
Regarding CH node formation in each round, we observed that LEACH and LEACH-C reduces the formation of CH nodes as nodes die. On the contrary, H-kdtree increases CH node formation in the network because of the minimum nodes per cluster value: as the number of nodes goes down, H-kdtree tends to maintain its k value by iterating more times, which tends to comply with the minimum nodes per cluster condition. This behavior can be seen in Figure 11 and Figure 12 after round 80.
Regarding energy levels, we did not find a significant variation or tendency in H-kdtree compared to LEACH and LEACH-C, as shown in Figure 13. The reason is that the energy that LEACH and LEACH-C used in node formation is offset by the energy used in selecting CH nodes in H-kdtree, being that the latter is more stable in terms of variations and allows for a more stable behavior in the data transmission phase. Figure 12 shows node death compared to energy. H-kdtree resulted in a lower number of dead nodes in both scenarios, compared to LEACH and LEACH-C.
The scenarios allow us to assess QoS features from a hierarchical point of view for LEACH, LEACH-C and H-kdtree, as the protocols share a clustering topology with a two-hop distance to the Sink/BS node.
Regarding delay, the scenario with random node deployment shows more delay than the deterministic scenario with more density in its central area. H-kdtree maintains a stable number of CH nodes for the maximum possible number of rounds. This simplifies the work of the Sink/BS node, as each node has an identifiable death threshold that, when reached, triggers the transmission of a “Death” packet to the Sink/BS node to inform its death. This feature enables H-kdtree to maintain a network topology for the maximum possible number of rounds. This is not possible for LEACH and LEACH-C, per changes in the network topology in each round.
In the rounds we evaluated in the random scenario, H-kdtree changes the topology of the network five times, and nine times in the deterministic scenario, as shown in Figure 12. LEACH and LEACH-C changed its topology 100 times in both scenarios (in each round, the topology changes).
CH nodes do not transmit sensory data. CH nodes compile packets from each cluster and retransmit them to the Sink/BS node. For this reason, if the network topology remains constant, delay, jitter, and throughput metrics will not vary, as these three metrics are a function of time. On the other hand, TDMA divides the network nodes into tie slots and ensures no packet loss due to simultaneous transmission.
In both scenarios, H-kdtree shows the lowest values for Delay and Jitter, due to H-kdtree’s low variability of topology, compared to LEACH and LEACH-C. This is shown in Figure 14 and Figure 15.
The stability of H-kdtree allows data traffic to remain constant, with very low variability in the rounds we evaluated as compared to LEACH and LEACH-C, in both scenarios. The results shown in Figure 14, Figure 15 and Figure 16 support our recommendation for multimedia applications, due to its stability in delay, jitter, and throughput metrics.

5.4. Results Summary

Figure 17 shows a general overview of the distribution symmetry of metrics, showing that (a) LEACH and LEACH-C shows a tendency to a symmetrical distribution of CH nodes in both the random and deterministic scenarios (This is due to the random function used in its algorithm). This result does not occur with H-kdtree. The four anomalous values shown in LEACH and LEACH-C are the minimum and maximum values in the observed rounds, outside the first and third quartile.
The anomalous values for H-kdtree in the deterministic scenario are in the last rounds. Regarding CH node formation, H-kdtree shows low variability, with most of the data in the first and second quartile. Our interpretation is that at least 75% of CH nodes formed showed low variability along the observed rounds.
Figure 17a and Table 3 show the low variability in the number of CH nodes. H-kdtree kept the number of CH nodes below the number of CH nodes generated by LEACH for the first 75 rounds (Q3). H-kdtree showed a reduction of 14.21% for the random scenario and of 30.14% for the deterministic scenario, as compared to LEACH.
Regarding average energy consumption for all nodes as shown in Figure 17b and Table 4, the energy behavior was similar in both H-kdtree and LEACH during the observed rounds. LEACH-C presents an energy efficiency above 40%, in relation to LEACH and H-kdtree. Figure 17c and Table 5 shows a proportional relationship between CH node formation and the number of dead nodes along the observed rounds.
To compare the results and quantify them as percentages, we used normalized averages. This will allow us to estimate the performance improvement for the metrics in the protocols, taking as a reference point the results for LEACH in the random scenario.
Figure 17c and Table 5 shows that between quartiles Q1 and Q3, which correspond to the 25% and 7% of the number of observed rounds, H-kdtree presented the lowest number of dead nodes. In its final stage, H-kdtree shows the highest number of dead nodes due to the on-demand CH node generation mechanism, compensated with energy expenditure after the Q3 quartile. Although H-kdtree does not provide an optimal node energy distribution, the on-demand CH node selection mechanism provides a significant improvement in QoS, as measured in delay, jitter, and throughput.
The variability in delay, jitter, and throughput of the proposed H-kdtree protocol as compared to LEACH and LEACH-C is very low in the random and deterministic scenarios, as shown in Figure 18. This is because the level of dispersion of values from the central trend in LEACH and LEACH-C is quite noticeable. These observations allow us to estimate QoS both quantitatively and qualitatively, supporting applications with higher demands.
With the level of delay variability shown in Figure 18a and Table 6, H-kdtree is able to provide QoS in networks with hierarchical topologies. In both the random and deterministic scenarios, H-kdtree showed a reduction in delay of 87.72% in the random scenario and of 95.39% in the deterministic scenario, compared to LEACH. With respect to LEACH-C, H-kdtree presented a reduction of 82.095% for the random scenario and 93.1% for the deterministic scenario.
Jitter response shown in Figure 18b and Table 7, interpreted as temporal variability in packet transmission, is also due to using TDMA for medium access. The level of jitter reduction found in the random scenario was of 76.52%, and 74.4% for the deterministic scenario. The values for delay, jitter, and variance were so low during the observed rounds that we can estimate that H-kdtree can guarantee the requirements for multimedia applications. The reason for this is that H-kdtree’s on-demand CH node selection mechanism is able to manage WSN resources efficiently.
The results obtained show that H-kdtree is able to provide QoS in applications with high restrictions in bandwidth and delay, at the expense of energy consumption. On the other hand, LEACH and LEACH-C are able to adapt to energy fluctuations in the network but is not capable of supporting multimedia applications or time restrictions, on account of its high variability.
Regarding bandwidth and the amount of data that it can transport per round, H-kdtree showed an increase of 48.96% in the random scenario and of 39.37% in the deterministic scenario, which compensates and justifies the energy requirements for transmitting data packets to the Sink/BS node as shown in Figure 18c and Table 8.
Among the metrics for hierarchical protocols, we took into account the metrics related to node death, included in Table 9.

5.5. Other Tests Performed

As a complement to the results obtained, we performed tests with 100, 300, and 400 nodes on areas of proportional size, maintaining the same node density of the 200-nodes tests. These tests were performed in a scenario with random node deployment. Energy assignment for 100, 300, and 400 nodes was also proportional to the 200-nodes tests. For these tests, we only took into account the average values of metrics, using the same metrics of the 200-nodes tests.
In the evaluation of a random scenario with 100, 200, 300, and 400 nodes, the average of CH nodes in the scenario is not relevant. However, the lower variability shown in the variance confirms H-kdtree’s characteristic on-demand CH node selection mechanism, maintaining its variance 83% below LEACH and LEACH-C as shown in the Table 10.
Regarding energy value, results show that H-kdtree maintains energy levels that are very close to those of LEACH, and therefore does not show an improvement in this area. However, H-kdtree shows a significant improvement in QoS as compared to LEACH and LEACH-C as shown in the Table 11.
Table 12 shows the use of an on-demand mechanism implies that the protocol only reacts to a change requested by the network. In the case of H-kdtree’s CH node selection mechanism, this means that it will only be used as a response to receiving a “Death” packet. Note that the number of nodes close to death is the number of CH nodes. Death node in H-kdtree is stepped, and in LEACH and LEACH-C it is incremental.
H-kdtree shows an improvement in delay reduction, with values over 60% as compared to LEACH y LEACH-C, as shown in Table 13.
H-kdtree shows a 95% jitter reduction as compared to LEACH and LEACH-C, as shown in Table 14.
H-kdtree shows a 50% throughput increase as compared to LEACH and LEACH-C, as shown in Table 15.
In the observed metrics in Table 16, show that the stability periods in the half-life of network nodes for the proposed H-kdtree protocol is longer than in LEACH and more short that in LEACH-C. After 50% of the rounds, in H-kdtree, we have found node death to be stepped and maintaining low variability in delay and jitter. This was not only due to its reactive mechanism but also because of its stability derived from using TDMA for medium access. The WSN we studied did not present node mobility: all nodes maintained their positions. This characteristic was used by H-kdtree and its cluster formation mechanism, which is based on the k-d tree algorithm and adds more stability by keeping the majority of nodes in the same clusters after each configuration phase.
The results on PDR showed that TDMA-based packet transmission planning did not show packet loss in LEACH, LEACH-C and H-kdtree, in all scenarios with 100, 200, 300, and 400 nodes.

6. Conclusions and Future Work

The H-kdtree protocol has main contributions. First, the clustering formation method based on the k-d tree algorithm partitions the sensor node deployment area in a two-hop hierarchical topology. Second, it is a WSN protocol that provides QoS in support of services with stricter resource demands while keeping energy usage at a level similar to the LEACH protocol.
The proposed H-kdtree protocol was based on the k-d tree algorithm in evaluating the spatial partitioning to organize nodes in a dimensional space (x and y). The average energy results obtained with LEACH-C, exceed LEACH and H-kdtree on 42%. The partitions found become clusters, creating a network topology that is able to provide QoS for the longest possible time with energy requirements similar to those of LEACH. H-kdtree is characterized by keeping the number of CH nodes stable for the longest number of rounds, maintaining a constant network topology and, as a consequence, low variability in delay, jitter, and throughput metrics. Although these metrics are a function of time, they depend on the variability of the number of CH nodes.
The H-kdtree protocol has three main processes. First, the protocol uses a two-hop network topology that was not altered in each round. Then, during the data transmission phase, the “Death” packet allows H-kdtree to implement a reactive mechanism that only returns to the configuration phase when a node requires it by sending the “Death” packet. This means that the configuration phase is only repeated on-demand. Finally, the minimum group condition allows network traffic to be more homogeneous, which is reflected in delay, jitter, and throughput and, as a consequence, in improved QoS.
The set of experiments performed in random scenarios with 100, 200, 300, and 400 nodes, and a deterministic scenario with 200 nodes, helped us compare LEACH and LEACH-C with the proposed H-kdtree protocol. The conclusion is that the H-kdtree protocol fulfilled the objective by addressing existing problems in cluster generation mechanisms by reducing the variability in CH node formation: with the same resources used in LEACH and LEACH-C, H-kdtree improved delay and jitter by 60% and 95% percent, throughput improved by over 50%, while keeping energy usage at the same levels of LEACH.
Additional experiments will be required to measure H-kdtree’s performance in additional scenarios, incrementing the number of rounds, varying density in environments with heterogeneous node-energy levels, and proposing optimization mechanisms for CH node selection to maximize energy levels in the network. Additionally, with the QoS results obtained, it will be necessary to perform traffic analysis with multimedia data.

Author Contributions

J.A. and J.P.E. designed and executed the experiments of the protocol based on k-d tree algorithm; G.T. performed the experiments in R; R.R.G. analyzed the data; all the authors wrote the paper.

Acknowledgments

This work has been partly supported by the program of mobility of researchers in doctoral programs (DIE-UD-engineering) of the Distrital Francisco José de Caldas University, and under the support by the resolution 0124 of 26 November 2009 of the Fundación Universitaria los Libertadores.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CHCluster Head
WSNWireless Sensor Networks
IoTInternet of Things
CPUCentral Processing Unit
LEACHLow Energy Adaptive Clustering Hierarchy
LEACH-CLow Energy Adaptive Clustering Hierarchy-centralized
QoSQuality of Service
PDRPacket Drop Rate
BSBase Station
GPSGlobal Positioning System
RSSIReceived Signal Strength Indicator
TDMATime Division Multiple Access
HEEDHybrid. Energy-Efficient Distributed
TEENThreshold sensitive Energy Efficient sensor Network
NS-2Network Simulator
EEDEnd-to-End Delay
FNDFirst Node Died
HNDHalf of Nodes Died
LNDLast Node Died
H-kdtreeHierarchy protocol based on the k-d tree algorithm

References

  1. Ringwald, M.; Romer, K. Deployment of Sensor Networks: Problems and Passive Inspection. In Proceedings of the 2007 Fifth Workshop on Intelligent Solutions in Embedded Systems, Leganes, Spain, 21–22 June 2007. [Google Scholar]
  2. Anzola, J.; Bolaños, S.; Tarazona, G. Design Methodology for Self-organized Mobile Networks Based. Int. J. Interact. Multimed. Artif. Intell. 2016, 3, 46–53. [Google Scholar] [CrossRef]
  3. Wu, X.; Tang, D.; Qian, X. A Centralize Location Algorithm based on RSSI in Large-Scale Wireless Sensor Network. Procedia Eng. CEIS 2011, 15, 2004–2009. [Google Scholar] [CrossRef]
  4. Nighot, M.; Ghatol, A. GPS Based Distributed Communication Protocol for Static Sensor Network (GDCP). Procedia Comput. Sci. 2016, 78, 530–536. [Google Scholar] [CrossRef]
  5. Elhoseny, M.; Tharwat, A.; Yuan, X.; Hassanien, A.E. Optimizing K-coverage of mobile WSNs. Expert Syst. Appl. 2018, 92, 142–153. [Google Scholar] [CrossRef]
  6. Gupta, A.; Shekokar, N. A novel K-means L-layer algorithm for uneven clustering in WSN. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017. [Google Scholar]
  7. Raval, D.; Raval, G.; Valiveti, S. Optimization of clustering process for WSN with hybrid harmony search and K-means algorithm. In Proceedings of the 2016 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, India, 8–9 April 2016. [Google Scholar]
  8. Wang, Q.; Guo, S.; Hu, J.; Yang, Y. Spectral partitioning and fuzzy C-means based clustering algorithm for big data wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018, 54. [Google Scholar] [CrossRef]
  9. Wang, J.; Wang, K.; Niu, J.; Liu, W. A K-medoids based clustering algorithm for wireless sensor networks. In Proceedings of the 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, Thailand, 7–9 January 2018. [Google Scholar]
  10. Gupta, V.; Doja, M. H-LEACH: Modified and Efficient LEACH Protocol for Hybrid Clustering Scenario in Wireless Sensor Networks. In Next-Generation Networks; Lobiyal, D.K., Mansotra, V., Singh, U., Eds.; Springer: Singapore, 2018; pp. 399–408. [Google Scholar]
  11. Haque, M.; Ahmad, T.; Imran, M. Review of Hierarchical Routing Protocols for Wireless Sensor Networks. In Intelligent Communication and Computational Technologies; Springer: Singapore, 2018; pp. 237–246. [Google Scholar]
  12. Rostami, A.S.; Badkoobe, M.; Mohanna, F.; Keshavarz, H.; Hosseinabadi, A.A.R.; Sangaiah, A.K. Survey on clustering in heterogeneous and homogeneous wireless sensor networks. J. Supercomput. 2018, 74, 277–323. [Google Scholar] [CrossRef]
  13. Yahiaoui, S.; Omar, M.; Bouabdallah, A.; Natalizio, E.; Challal, Y. An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks. AEU Int. J. Electron. Commun. 2018, 83, 193–203. [Google Scholar] [CrossRef] [Green Version]
  14. Marappan, P.; Rodrigues, P. An energy efficient routing protocol for correlated data using CL-LEACH in WSN. Wirel. Netw. 2016, 22, 1415–1423. [Google Scholar] [CrossRef]
  15. Usha, M.; Sreenithi, S.; Sujitha, M.; Swarnalatha, S. Node density based clustering to maximize the network lifetime of WSN using multiple mobile elements. In Proceedings of the 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 20–22 April 2017. [Google Scholar]
  16. Grover, J.; Rani, R. Probabilistic Density Based Adaptive Clustering scheme to improve network survivability in WSN. In Proceedings of the Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Hefei, China, 11–13 July 2014. [Google Scholar]
  17. Shamshirband, S.; Amini, A.; Badrul, N.; Mat, L.; Wah, Y.; Furnell, S. D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 2014, 55, 212–226. [Google Scholar] [CrossRef]
  18. Bhatti, D.M.S.; Saeed, N.; Nam, H. Fuzzy C-Means Clustering and Energy Efficient Cluster Head Selection for Cooperative Sensor Network. Sensors 2016, 16, 1459. [Google Scholar] [CrossRef] [PubMed]
  19. Wang, Z.x.; Zhang, M.; Gao, X.; Wang, W.; Li, X. A clustering WSN routing protocol based on node energy and multipath. Cluster Comput. 2017. [Google Scholar] [CrossRef]
  20. Amodu, O.A.; Raja Mahmood, R.A. Impact of the energy-based and location-based LEACH secondary cluster aggregation on WSN lifetime. Wirel. Netw. 2018, 24, 1379–1402. [Google Scholar] [CrossRef]
  21. Sabor, N.; Ahmed, S.M.; Abo-Zahhad, M.; Sasaki, S. ARBIC: An Adjustable Range Based Immune hierarchy Clustering protocol supporting mobility of Wireless Sensor Networks. Pervasive Mob. Comput. 2018, 43, 27–48. [Google Scholar] [CrossRef]
  22. Wang, T.; Peng, Z.; Wen, S.; Lai, Y.; Jia, W.; Cai, Y.; Tian, H.; Chen, Y. Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 2017, 379, 160–176. [Google Scholar] [CrossRef]
  23. Goyal, N.; Dave, M.; Verma, A. Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 2016, 89, 687–707. [Google Scholar] [CrossRef]
  24. Nair, K.; Kulkarni, J.; Warde, M.; Dave, Z.; Rawalgaonkar, V.; Gore, G.; Joshi, J. Optimizing power consumption in iot based wireless sensor networks using Bluetooth Low Energy. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India, 8–10 October 2015. [Google Scholar]
  25. Bozorgi, S.M.; Rostami, A.S.; Hosseinabadi, A.A.R.; Balas, V.E. A new clustering protocol for energy harvesting-wireless sensor networks. Comput. Electr. Eng. 2017, 64, 233–247. [Google Scholar] [CrossRef]
  26. Zuhra, F.T.; Bakar, K.A.; Ahmed, A.; Tunio, M.A. Routing protocols in wireless body sensor networks: A comprehensive survey. J. Netw. Comput. Appl. 2017, 99, 73–97. [Google Scholar] [CrossRef]
  27. Halder, S.; Das, S. Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes. J. Netw. Comput. Appl. 2014, 38, 106–124. [Google Scholar] [CrossRef]
  28. Madhja, A.; Nikoletseas, S.; Raptis, T. Hierarchical, collaborative wireless energy transfer in sensor networks with multiple Mobile Chargers. Comput. Netw. 2016, 97, 98–112. [Google Scholar] [CrossRef]
  29. Jung, K.; Lee, J.Y.; Jeong, H.Y. Improving adaptive cluster head selection of teen protocol using fuzzy logic for WMSN. Multimedia Tools Appl. 2017, 76, 18175–18190. [Google Scholar] [CrossRef]
  30. Arjunan, S.; Pothula, S. A survey on unequal clustering protocols in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 2017. [Google Scholar] [CrossRef]
  31. Kaur, R.; Arora, S. Nature Inspired Range Based Wireless Sensor Node Localization Algorithms. Int. J. Interact. Multimedia Artif. Intell. 2017, 4, 7–17. [Google Scholar] [CrossRef]
  32. Bahuguna, Y.; Punetha, D.; Verma, P. An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network. Int. J. Interact. Multimedia Artif. Intell. 2017, 4, 11–15. [Google Scholar] [CrossRef]
  33. Pereira, A.A.; Espada, J.P.; Crespo, R.G.; Aguilar, S.R. Platform for controlling and getting data from network connected drones in indoor environments. Future Gener. Comput. Syst. 2018. [Google Scholar] [CrossRef]
  34. Jiménez, A.; Bolaños, S.; Anzola, J. Decentralized model for autonomous robotic systems based on Wireless Sensor Network. J. Eng. Appl. Sci. 2016, 11, 11378–11382. [Google Scholar]
  35. Molano, J.I.R.; Lovelle, J.M.C.; Montenegro, C.E.; Granados, J.J.R.; Crespo, R.G. Metamodel for integration of Internet of Things, Social Networks, the Cloud and Industry 4.0. J. Ambient Intell. Hum. Comput. 2018, 9, 709–723. [Google Scholar] [CrossRef]
  36. Jiménez, A.; García-Díaz, V.; Anzola, J. Design of a System for Vehicle Traffic Estimation for Applications on IoT. In Proceedings of the the 4th Multidisciplinary International Social Networks Conference, Bangkok, Thailand, 17–19 July 2017. [Google Scholar]
  37. Anzola, J.P.; Cuellar, J.C. Evaluation of QoS in the Transmission of Video H.264/SVC for Ad Hoc Networks of Two Jumps. Int. J. Comput. Appl. 2014, 108, 1–8. [Google Scholar]
  38. Mottaghi, S.; Reza, M. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes. AEU Int. J. Electron. Commun. 2015, 69, 507–514. [Google Scholar] [CrossRef]
  39. Manzoor, B.; Javaid, N.; Rehman, O.; Akbar, M.; Nadeem, Q.; Iqbal, A.; Ishfaq, M. Q-LEACH: A New Routing Protocol for WSNs. arXiv, 2013; arXiv:1303.5240. [Google Scholar] [CrossRef]
  40. Karim, L.; Nasser, N. Reliable location-aware routing protocol for mobile wireless sensor network. IET Commun. 2012, 6, 2149–2158. [Google Scholar] [CrossRef]
  41. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  42. Du, D.; Hu, X. Steiner Tree Problems in Computer Communication Networks; World Scientific Publishing Co., Inc.: River Edge, NJ, USA, 2008. [Google Scholar]
  43. Shi, S.; Liu, X.; Gu, X. An energy-efficiency Optimized LEACH-C for wireless sensor networks. In Proceedings of the 7th International Conference on Communications and Networking in China, Kun Ming, China, 8–10 Auguest 2012. [Google Scholar]
  44. Sivakumar, P.; Radhika, M. Performance Analysis of LEACH-GA over LEACH and LEACH-C in WSN. Procedia Comput. Sci. 2018, 125, 248–256. [Google Scholar] [CrossRef]
  45. Ma, Z.; Li, G.; Gong, Q. Improvement on LEACH-C protocol of wireless sensor network. Int. J. Future Gener. Commun. Netw. 2016, 9, 183–192. [Google Scholar] [CrossRef]
  46. Kakde, H.M. Range Searching using KD tree. 25 August 2005. Available online: http://151.100.17.32/pub/Estrinfo/Materiale/kdtree.pdf (accessed on 29 August 2018).
  47. Ahmed, G.; Zou, J.; Fareed, M.M.S.; Zeeshan, M. Sleep-awake energy efficient distributed clustering algorithm for wireless sensor networks. Comput. Electr. Eng. 2016, 56, 385–398. [Google Scholar] [CrossRef]
  48. Scholar), V.K.A.R.; Sharma, V.; Sachdeva, M. A survey on LEACH and other’s routing protocols in wireless sensor network. Opt. Int. J. Light Electron Opt. 2016, 127, 6590–6600. [Google Scholar] [CrossRef]
  49. Alharthi, S.A.; Johnson, P.A. Threshold sensitive heterogeneous LEACH protocol for wireless sensor networks. In Proceedings of the 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–23 November 2016. [Google Scholar]
  50. Lung, C.H.; Zhou, C. Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach. Ad Hoc Netw. 2010, 8, 328–344. [Google Scholar] [CrossRef]
  51. Syarif, A.; Abouaissa, A.; Lorenz, P. Operator calculus approach for route optimizing and enhancing wireless sensor network. J. Netw. Comput. Appl. 2017, 97. [Google Scholar] [CrossRef]
  52. Taheri, H.; Neamatollahi, P.; Younis, O.M.; Naghibzadeh, S.; Yaghmaee, M.H. An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Ad Hoc Netw. 2012, 10, 1469–1481. [Google Scholar] [CrossRef]
  53. Iqbal, A.; Akbar, M.; Javaid, N.; Bouk, S.H.; Ilahi, M.; Khan, R.D. Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs. J. Basic. Appl. Sci. Res. 2013, 3, 864–872. [Google Scholar]
  54. Singal, G.; Laxmi, V.; Gaur, M.; Todi, S.; Rao, V.; Tripathi, M.; Kushwaha, R. Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Netw. 2017, 63, 115–128. [Google Scholar] [CrossRef]
  55. Tyagi, P.; Dembla, D. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET). Egypt. Inf. J. 2017, 18, 133–139. [Google Scholar] [CrossRef]
  56. AL-Dhief, F.T.; Sabri, N.; Fouad, S.; Latiff, N.A.; Albader, M.A.A. A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective. J. King Saud Univ. Comput. Inf. Sci. 2017. [Google Scholar] [CrossRef]
  57. Mandhare, V.; Thool, V.; Manthalkar, R. QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network. Comput. Netw. 2016, 110, 180–191. [Google Scholar] [CrossRef]
Figure 1. LEACH protocol topology.
Figure 1. LEACH protocol topology.
Sensors 18 02899 g001
Figure 2. LEACH protocol phases.
Figure 2. LEACH protocol phases.
Sensors 18 02899 g002
Figure 3. Radio energy model.
Figure 3. Radio energy model.
Sensors 18 02899 g003
Figure 4. Visualization of the k-d tree algorithm.
Figure 4. Visualization of the k-d tree algorithm.
Sensors 18 02899 g004
Figure 5. k-d tree algorithm with x-dimension.
Figure 5. k-d tree algorithm with x-dimension.
Sensors 18 02899 g005
Figure 6. k-d tree algorithm with dimension on y.
Figure 6. k-d tree algorithm with dimension on y.
Sensors 18 02899 g006
Figure 7. Clustering using the k-d tree algorithm.
Figure 7. Clustering using the k-d tree algorithm.
Sensors 18 02899 g007
Figure 8. Protocol header H-kdtree.
Figure 8. Protocol header H-kdtree.
Sensors 18 02899 g008
Figure 9. Routing flowchart H-kdtree protocol.
Figure 9. Routing flowchart H-kdtree protocol.
Sensors 18 02899 g009
Figure 10. Evaluated scenarios.
Figure 10. Evaluated scenarios.
Sensors 18 02899 g010
Figure 11. Cluster Head formation behavior.
Figure 11. Cluster Head formation behavior.
Sensors 18 02899 g011
Figure 12. Dead nodes.
Figure 12. Dead nodes.
Sensors 18 02899 g012
Figure 13. Average energy.
Figure 13. Average energy.
Sensors 18 02899 g013
Figure 14. Delay behavior.
Figure 14. Delay behavior.
Sensors 18 02899 g014
Figure 15. Jitter behavior.
Figure 15. Jitter behavior.
Sensors 18 02899 g015
Figure 16. Throughput behavior.
Figure 16. Throughput behavior.
Sensors 18 02899 g016
Figure 17. General energy metrics with 200 nodes.
Figure 17. General energy metrics with 200 nodes.
Sensors 18 02899 g017
Figure 18. General QoS metrics.
Figure 18. General QoS metrics.
Sensors 18 02899 g018
Table 1. Test data.
Table 1. Test data.
Dimension xDimension y
node 15493
node 28055
node 39686
node 47477
node 54268
node 62245
node 71153
node 82775
node 96429
node 108163
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParametersValues
ProtocolsLEACH, LEACH-C and H-kdtree
Initial energy0.5 J
E e l e c 50 nJ/bit
ϵ a m p 0.0013 pJ/b/m 4
ϵ f s 10 pJ/bit/m 2
Data aggregation E D A 5 nJ/bit/signal
Message size4000 bits
Additional energy α = 1
Heterogeneity m = 0.5
CH probability p = 0.3 , k = 4
SceneRandom, Deterministic
Number of nodes200
Position node sink/BS ( x , y ) (50, 150)
Type of trafficUDP
Table 3. Number of cluster head with 200 nodes. (r) random—(d) deterministic.
Table 3. Number of cluster head with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)bLEACH (d)LEACH-C (d)H-kdtree (d)
Min171523211220
Q1242823272420
Average28.0134.1524.0330.2231.6921.78
Q3324030343923
Max366830407425
Normalized
average
11.21920.85791.07891.13130.7775
Variance37.262534.83122.938433.789439.71145.3248
Table 4. Average energy of each node with 200 nodes. (r) random—(d) deterministic.
Table 4. Average energy of each node with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
Min0.039180.083210.040410.048490.078060.04343
Q10.052650.099020.061840.065510.094430.05878
Average0.079590.116810.091220.090610.113770.0851
Q30.1120.13430.120.11880.133310.1157
Max0.14160.151620.1420.13390.16230.1414
Normalized
average
11.46761.14611.13841.42941.0692
Variance0.0011390.0004060.0011150.0009510.0004870.001042
Table 5. Number of death nodes with 200 nodes. (r) random—(d) deterministic.
Table 5. Number of death nodes with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
Min000000
Q11.94100000
Average27.0613.969.779913.526.9110.38
Q348.292510.01222.512.516
Max766878443327
Normalized
average
10.51580.36140.49960.25530.3835
Variance677.3701401.614368.7591232.9591106.38120.3591
Table 6. Delay with 200 nodes. (r) random—(d) deterministic.
Table 6. Delay with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
Min0.15680.0770.029860.130.0390.01
Q10.43280.5730.096870.42730.55650.02026
Average0.9280.87580.1140.84950.90680.04285
Q31.3241.17150.13921.2361.31150.04935
Max1.5881.560.14111.5461.6690.1094
Normalized
average
10.943750.12280.91540.97710.0461
Variance0.2514370.162770.0009600.2180750.214780.000851
Table 7. Jitter with 200 nodes. (r) random—(d) deterministic. The values of the table are on a scale of 10 3 .
Table 7. Jitter with 200 nodes. (r) random—(d) deterministic. The values of the table are on a scale of 10 3 .
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
Min7.4786.884.6117.6526.044.988
Q111.4721.34.6118.92848.124.988
Average20.540.614.81521.4633.775.25
Q322.0757.885.0525.6448.125.53
Max55.4687.035.0561.579.845.635
Normalized
average
11.98090.23480.104681.64730.25609
Variance0.21850.551360.000039980.47290.359320.00006838
Table 8. Throughput with 200 nodes. (r) random—(d) deterministic.
Table 8. Throughput with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
Min22,63020,267140,40012,0605096133,200
Q166,41065,741145,90040,21049,350135,100
Average97,940107,854145,900104,300101,705136,500
Q3131,900149,547150,300154,400149,510137,600
Max178,200190,903150,300172,200192,501141,500
Normalized
average
11.01221.48961.06491.03841.3937
Variance × 10 6 2154.202285.919.493502.153346.9412.3741
Table 9. Comparison of network lifetime with respect to FND, HND and LND with 200 nodes. (r) random—(d) deterministic.
Table 9. Comparison of network lifetime with respect to FND, HND and LND with 200 nodes. (r) random—(d) deterministic.
ProtocolLEACH (r)LEACH-C (r)H-kdtree (r)LEACH (d)LEACH-C (d)H-kdtree (d)
FND244738375135
HND113999412210396
LND134164131144180140
Table 10. Number of cluster head. (r) random.
Table 10. Number of cluster head. (r) random.
Number of Nodes LEACH (r)LEACH-C (r)H-kdtree (r)
100Average29.3413.70328.16
Variance42.487134.03094.7477
200Average28.0134.1524.03
Variance37.262534.83122.9384
300Average24.8043.435632.43
Variance39.380448.00836.4618
400Average34.1139.564432.67
Variance46.395739.76835.6382
Table 11. Average energy of each node. (r) random.
Table 11. Average energy of each node. (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
1000.066820.09010.07915
2000.079590.116810.09122
3000.088390.12170.09623
4000.092720.14330.1062
Table 12. Number of death nodes. (r) random.
Table 12. Number of death nodes. (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
10012.355.34656.39
20027.0613.969.77
30043.0821.960432.83
40064.7233.52158.91
Table 13. Delay (seg). (r) random.
Table 13. Delay (seg). (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
1000.2833248440.80210.10480334
2000.9280.87580.114
3000.8411886420.63480.177976
4000.61507958620.92170.104979
Table 14. Jitter (seg). (r) random.
Table 14. Jitter (seg). (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
1000.02009296640.22160.00499735
2000.02050.040610.004815
3000.02272764220.039750.00462749
4000.02002747960.23680.00552575
Table 15. Throughput (bps). (r) random.
Table 15. Throughput (bps). (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
10096,134101,319135,210
20097,940107,854145,900
300102,603110,623163,092
40090,95696,521170,688
Table 16. Metrics of network lifetime. (r) random.
Table 16. Metrics of network lifetime. (r) random.
Number of NodesLEACH (r)LEACH-C (r)H-kdtree (r)
FND263630
100HND1218883
LND147184127
FND244738
200HND1139994
LND134164131
FND397145
300HND11911789
LND152174149
FND5211537
400HND137154101
LND164223152

Share and Cite

MDPI and ACS Style

Anzola, J.; Pascual, J.; Tarazona, G.; González Crespo, R. A Clustering WSN Routing Protocol Based on k-d Tree Algorithm. Sensors 2018, 18, 2899. https://doi.org/10.3390/s18092899

AMA Style

Anzola J, Pascual J, Tarazona G, González Crespo R. A Clustering WSN Routing Protocol Based on k-d Tree Algorithm. Sensors. 2018; 18(9):2899. https://doi.org/10.3390/s18092899

Chicago/Turabian Style

Anzola, John, Jordán Pascual, Giovanny Tarazona, and Rubén González Crespo. 2018. "A Clustering WSN Routing Protocol Based on k-d Tree Algorithm" Sensors 18, no. 9: 2899. https://doi.org/10.3390/s18092899

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop