An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks
An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks
An Energy-Efficient Mobility-Based
Cluster Head Selection for Lifetime
Enhancement of Wireless Sensor Networks
SEHAR UMBREEN, DANISH SHEHZAD, NUMAN SHAFI ,
BILAL KHAN, AND USMAN HABIB
Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad, Chiniot-Faisalabad Campus, Chiniot 35400, Pakistan
Corresponding author: Numan Shafi ([email protected])
ABSTRACT Wireless based sensor networks contain sensors for environment monitoring but have restricted
resources. Many clustering protocols are designed to prolong network lifetime but have problems of
inadequate cluster head selection criteria, fixed clustering, and static rounds which consume more energy.
It is needed to develop an adaptive clustering strategy for better CH selection and load balancing. In this
article, we introduced an energy-efficient mobility based cluster head selection mechanism to overcome these
limitations. CH selection is based on dedicated parameters that have a huge impact on the sensor energy
consumption. The weightage of each node is calculated on the base of the node’s mobility level, residual
energy, distance to sink, and density of neighbors. Inter-cluster communication uses single-hop/multi-hop.
MATLAB is used to perform simulations. Results show that the proposed approach EEMCS performs better
as compared to the existing algorithms CRPD, LEACH, and MODLEACH in terms of load balancing,
network stability, energy depletion, and throughput. Energy utilization in the case of EEMCS is much less
and the network lifetime is greater than other existing protocols.
INDEX TERMS Wireless sensor network, cluster, LEACH, sensor nodes, mobility, cluster head, routing,
homogeneous.
and the flooding mechanism causes more energy consump- the next round and no data receive during the marked time
tion. While in hierarchical routing, nodes have distinct roles slot then this node is considered as moved to another cluster.
based on several specified rules. Based on predefined criteria CH removes this node from its cluster list and reschedules the
best node is selected as CH in the cluster [9]. Cluster-based slots for other nodes. A node can join a new cluster based on
routing is the most widely used mechanism to attain effec- the Receive signal strength indicator (RSSI) of the broadcast
tive communication through efficient utilization of resources. message. CH adds the new coming node and updates the clus-
Better node management, load balancing, and scalability can ter members list, TDMA schedule, and broadcast an updated
also be achieved by using a clustering approach [12], [13]. schedule in its cluster.
By considering the diverse challenges of WSNs the main aim LEACH Mobile Extended [21] is an extension of Mobile
of researchers is to reduce energy consumption and ensure LEACH and suitable for a large area. In this protocol, CH is
energy-efficient data transmission or communication. Several selected on the base of node mobility. A node that has
hierarchical cluster-based routing protocols were developed the minimum movement and has a low reduction of signal
to make the network energy efficiency and prolong the life- strength during data transmission is selected as CH. Then the
time of the network by considering different parameters such cluster formation is the same as discussed in previous LEACH
as energy, distance, coverage, mobility, density, etc. In the lit- variants. During the transmission phase if the node or CH
erature, many algorithms were proposed to deal with energy moves then the node sends a disjoint request to its CH and join
efficiency problems in specific domains [14]–[18]. Still, request to the new cluster head. TDMA schedule is updated
researches are conducted for combining different domains after joining or disjoining a node.
and develop a hybrid model that is more energy-efficient and LEACH-MAC [22] (Medium Access Control) is designed
prolong the network lifetime. Proposed mechanism results to restrict the number of CH advertisement messages and
are compared with the current models that are best for solving calculate an optimal number K of cluster heads using the
such problems. A few of these protocols are discussed in this following equation. s
article. N Efs M
LEACH [19] is an efficient and simple round-based low K= − 2
(2.2)
25 Emp dtoBS
energy adaptive clustering protocol for WSN. LEACH uses
a probability Equation for calculating cluster head. The where N is sensor nodes, M is the sensing area, the average
Equation is as follows: distance between the base station and cluster heads is d2toBS .
popt This protocol uses a random but uniform time interval for
if
1 all nodes to listen to CH broadcast message. If any CH broad-
T (s) = 1 − popt r mod popt (2.1)
cast message is received in this interval of time and cluster
/G
0 if s ∈
headcount is less than the optimal number then this node
where Popt is the pre-determined percentage probability of becomes cluster head itself otherwise it becomes a normal
cluster head and r is the present round number. G is the set of node. After the cluster head election, the whole process is the
all the nodes that have already been selected as cluster heads. same as LEACH.
This protocol operates in the form of several rounds that are CRPD [23] is a cluster-based routing protocol for dynamic
divided into two phases. wireless sensor networks to reduce energy consumption and
1. Set-up phase improve energy efficiency by update the network topology.
In the set-up phase cluster head (CH) is selected randomly. It includes four phases:
Each node gets a chance to become CH by using a probability 1. Neighbor discovery
equation. After the CH election, a broadcast message is sent In this phase neighbor of every node is calculated. Within
to all nodes to make clusters. In each cluster CH of that par- the transmission range of nodes, every node broadcasts a
ticular cluster make a schedule using Time-Division Multi- detect message to calculate its neighbor. Each sensor node
Access (TDMA) and this schedule to all its cluster members has two sets to store the information of neighbor nodes: Nbr
to avoid collision during data transmission. store Id of neighbor nodes and Nbr INFO store Id, coordinate,
2. Steady phase and residual energy of its neighbors.
In this phase sensed data transmission is done 2. Cluster head selection and cluster formation
within-cluster (Nodes send data to CH) and outside of cluster CH is selected on the base of residual energy and the num-
(CH transmit data to Base Station) using TDMA Schedule. ber of neighbor degree. The energy threshold is considered
LEACH-M [20] protocol improved data transmission rate 40% of the initial energy. A node with the largest neighbor
as compare to LEACH but consume more energy. It is formed degree and residual energy greater than the energy threshold
specifically for mobile nodes. The set-up phase is the same is selected as a cluster head. Then CH broadcast I-am-CH
as LEACH but the steady phase is different from the old message and nodes join their cluster head according to their
protocol. In a steady phase after every round, CH checks the signal strength.
list of received data and match it with its TDMA schedule, 3. Data aggregation and Route construction
if any node does not send data in its allocated time then After the cluster head, the formation data aggregation
that time slot is marked. If the same node remains absent in phase is started. Data can be sent to the base station using
a single-hop if the distance is less or can use multi-hop if TABLE 2. Summary of literature review.
the base station is far away. It also set time value time1 with
data transmission to prevent from getting duplication of
data.
4. Re-clustering and Re-routing
It can be done whenever a node dead, moves to a new
location, or join a cluster. First, check whether it is CH or nor-
mal node and then re-clustering is done according to node
type and condition.
MBC [24] is a mobility-based clustering protocol. In which
cluster head selection is based on the residual energy and
mobility of the node. We can modify the probability Equa-
tion for electing the cluster head by introducing the velocity
factor in it. Here Ecurr is the current energy of the node
and Emax is the maximum energy of the node. Vmax repre-
sents the maximum velocity of the sensor node and Vcurr
is the current velocity of the node. T(s) is the probability
of cluster head selection [15]. The modified Equation is as
following [26]:
Ecurr Vmax −Vcurr
Tnew = T(s) ∗( ∗ ) (2.3)
Emax Vmax
MODLEACH [25] is a variant of the LEACH protocol. It is
based on the energy threshold for an efficient cluster head
formation scheme. If the energy of an existing CH is still
greater than the threshold then it will not change its status
and maintain its CH state for the next round. If the energy of
CH does not satisfy the threshold then it is replaced according
to the pre-existing algorithm LEACH.
We proposed EEMCS an Energy-Efficient Mobility based
Cluster head selection for lifetime enhancement of wireless
sensor networks, for better utilization of energy and increas-
ing the lifetime of the network using an improved cluster
head selection scheme. It is which is suitable for the dynamic
nature of nodes and mitigates the problem of fixed round
time for changing the cluster head. The cluster head selec-
tion process of the proposed method includes the residual
energy of sensor nodes, their mobility level, number of nodes
associated, and node’s distance from the base station. The
cluster formation is designed in such a way that whenever
a node is a move in the network field, they can easily join
a new cluster according to its new position and leave the
previous cluster without disturbing the whole cluster. If the
moving node is cluster head then it selects a new cluster
head from its cluster and then leaves that cluster. In this
way, we can save the cluster from destroying when it’s clus-
ter head move. Table 2 shows a summary of this literature
review.
III. METHODOLOGY
The novel EEMCS protocol can be divided into several
phases that include cluster head selection, cluster creation,
data collection, and data transmission. However, the main A. ARCHITECTURE
focus of this work is on the efficient cluster head selection The main architecture of the EEMCS mechanism is based on
which results in the improvement of the overall life span of the Network Development Model and Radio Energy Model.
WSN. In this section proposed methodology is described in For the energy dissipation of nodes, the radio energy model
detail. is used. The network model is used to construct the routing
FIGURE 2. First order radio energy depletion model for Wireless Sensor
Network.
mechanism to collect sensed data and transmit it to the base
station.
1) RADIO ENERGY MODEL
As we already discussed that all the sensor nodes have a
restricted amount of resources and we aim to increase the net-
work life through efficient energy consumption techniques.
Figure 2 shows the first order radio model. In every WSNs
data communication consume most of the energy of sensors. FIGURE 3. Sensor nodes random deployment.
Therefore to calculate the utilization of energy in a network
we need to estimate the cost of energy both for data transmis- 2) NETWORK DEVELOPMENT MODEL
sion and data reception. So, in this research first order radio In this research, we have made some assumptions regarding
energy model is used to calculate the energy consumption of the network model and sensor nodes, which are as
transmitting and receiving data energy during the communi- following:
cation of sensor nodes and base stations. If the distance is • The network contains n number of nodes.
short between sensor nodes and cluster head then we use a • There is one base station in the network.
free space model otherwise the multi-path model is used for • The deployment of nodes is random.
communication. Energy consumption while transmitting ‘k’ • All the sensor nodes are mobile.
number of bits to a node placed at the distance ‘d’ meters is • Sensor nodes know their energy and position coordinates.
written as [21]: • The base station is static and placed outside the network.
ETx (k, d) = ETx_ele (k) + ETx_mp (k, d) (3.1) • The base station has an unlimited battery, storage, and
(
Eele ∗ k + Efs ∗ k ∗ d , d ≤ do
2 calculating ability.
ETx (k, d) = (3.2) • All sensor nodes have the same data transmission range.
Eele ∗ k + Emp ∗ k ∗ d 4 , d > do
• The initial energy of all the nodes is the same and nodes
ERx (k) = ERx_ele (k) + kEele = Eele ∗ k (3.3)
are homogeneous.
where: • The energy threshold is defined to diminish the uneven
Eele is the transmitter or receiver per bit energy deple- energy reduction effect on a node’s premature death
tion [33]. The threshold used in this article is 40 percent of
Emp is for multi-path fading the maximum energy of nodes in the network.
Efs is for the free-space • Nodes always have data to transmit according to the
b: RESIDUAL ENERGY CALCULATION extra energy. Therefore the mobility factor of sensor nodes
In each round, every node calculates its remaining energy. was considered and for that, mobility in the existing network
As nodes start transmitting and receiving data, their energy was calculated by changing the position of random nodes
starts decreasing and each node energy consumption is in the network. The node’s new position is also selected
different from other nodes. The change in energy deple- randomly. The mobility level of a node can be calculated
tion is according to their inter-communication or intra- by measuring the difference between the previous and new
communication distance. Residual energy is calculated using position of the node. The following Equation is used to find
the following formula [23]: out the level of mobility [34]:
Ecurrent q
Er = (3.5) ML = (xnew − xcurr )2 + (ynew − ycurr )2 (3.7)
Einitial
where (xnew , ynew ) are the coordinates of the sensor node at
c: DISTANCE CALCULATION the new position and (xcurr , ycurr ) are the coordinates points of
Distance plays a significant role in the energy dissipation nodes at the last calculated position. There is an inverse rela-
process of nodes. The nodes closer to the base station need tionship between a node’s mobility and chances for becoming
less energy to transmit the data as compared to the distant a cluster head; therefore a node having high mobility level has
nodes. In the EEMCS model, Euclidean distance is used to fewer chances to be selected as a cluster head.
calculate the distance between nodes. The distance between
3) CLUSTER HEAD SELECTION AND FORMATION
the member nodes and cluster head is represented by DtoCH
and the distance between the cluster head and the base station To select optimal cluster head many methods were proposed
is denoted as DtoBS. To calculate the distance between the sink in the literature, some of them have purely based on proba-
node, cluster head, and member nodes the following formula bility and some variants on defined threshold values for the
is used. selection of cluster head [18]–[20]. The optimal number of
cluster heads in the network is also important; better practice
q
Distance = (Xj − Xi )2 + (Yj − Yi )2 (3.6) is to choose cluster head based on parameters that directly
affect energy utilization as the main aim of CH selection is
d: SUITABLE NUMBER OF CLUSTERS
to reduce energy consumption and achieve optimal resource
In a sensor network, the communication cost between nodes utilization. In EEMCS, cluster heads are selected by consid-
is high. To provide a solution aimed at reducing communi- ering the significant parameters including nodes remaining
cation costs, nodes are arranged into groups. The challenge energy, mobility, distance to the base station, and neighbors
is how to divide the network into groups and how to calcu- count. After calculating the defined criterion for cluster head
late the optimal number of clusters. We observed from the selection, the energy of each node is checked against the
literature that the surplus number of clusters consumes more threshold value because a certain energy level is the first
energy and cause extra overhead. In EEMCS methodology, requirement to become a candidate for cluster head selection.
we utilized different ranges and checked suitable different In EEMCS energy threshold value is Threshold 40 percent of
ranges that can help to increase the lifetime of the network. the maximum energy of nodes in the network [23].
e: NEIGHBORHOOD DISCOVERY All the nodes that satisfy the energy threshold are eligible
After calculating the distance of nodes from the base station, for cluster head selection. The weightage of nodes is calcu-
the neighbor discovery phase starts. In this phase, all nodes lated based on their mobility level, remaining energy, their
broadcast a message to detect their neighbors within their distance to the base station, and neighbor degree (number of
radio transmission range. This detection message contains the nodes that are in their transmission range), and weights are
id of each node. All those nodes which receive the detect assigned to each parameter discussed above. The flow of clus-
message; stores the message as the sender node’s id in its ter head selection is shown in Figure 4. Let us consider that
neighbor list, and increase the neighbor count [23]. If a node node i have the maximum weightage among its neighbor and
is within the range of two cluster heads then the node joins satisfy the energy threshold; then node i broadcast ‘‘IMCH’’
that cluster head which is close as compared to other cluster message in its transmission range. For control packets, a new
heads. In this way, all nodes get information about their ‘1 bit’ field was introduced, which we call ‘‘IMCH’’. The
neighbors and neighbor count within their range. node sets its value to 1 if it wants to say ‘‘IMCH’’ otherwise
it is not set. Adding 1-bit field to the packet does not carry
f: MOBILITY significant overhead. All the nodes that receive the ‘‘IMCH’’
The mobility factor plays an important role in any network. message, store the ID of the sender node in a list. Those nodes
Nodes in WSNs can move at any time, in any direction. which are not able to become a CH, wait to receive ‘‘IMCH’’
A high level of mobility can destroy network structure message from their neighbors. This process is repeated until
and can be the reason for the unexpected behavior of net- all the nodes either receive ‘‘IMCH’’ message or change
work communication. If a cluster head changes its position their type to CH. After CH selection the next step is to join
rapidly then the whole cluster can die which can cause the appropriate CH. All nodes that receive CH messages,
resource wastage; moreover, frequent re-clustering consumes calculate their distance with each CH and send a join request
4) RE-CLUSTERING CASES
As the network is based on dynamic nodes so we have to
face different scenarios because of node mobility. If a node
moves from one cluster to another cluster or a cluster head
is about to die then we need to change the network topology
and re-clustering is needed.
FIGURE 7. New node added into existing network.
Nodes failure due to energy consumption or other problems
can also become a reason for re-routing or re-clustering.
There could also a possibility that for some reason or net-
work requirement we need to add new sensor nodes in the
network. To resolve all these issues and make the network
keep working in real-time, we have to provide a suitable
algorithm that can deal with all these problems. Re-routing
and re-clustering situations are categorized into three cases
which are as follows.
a: NODE DEAD
This situation occurs when a network is running and sensor
nodes are kept transmitting data then their energy keeps
decreasing. There comes a time when the residual energy FIGURE 8. Node moved and join same cluster head.
Key parameters are considered to be evaluation metrics and TABLE 4. Parameters used for simulations.
are discussed as following:
1) NETWORK LIFETIME
Network lifetime means that how many rounds a node
survives in the network. If any node survives for a longer
period in a network then it means network’s lifetime is
elongated.
2) ENERGY CONSUMPTION
These metrics give the estimation that how much energy is
consumed in one round, by all the nodes that are in the
network. One round is completed when all the nodes send
data to the base station.
3) AVERAGE ENERGY
The average energy is the valuation of the remaining energy
of all the nodes after the simulation.
4) THROUGHPUT
Throughput gives the total number of data packets transmitted
to the base station during each round.
IV. SIMULATIONS AND RESULTS COMPARISON
This section consists of all the simulation results and
performance comparison of EEMCS with existing and
well-known algorithms including LEACH [19], MODLEACH
[25], and CRPD [23]. We performed several simulations with
different initial energy and changed the number of nodes to
check the performance of our work. MATLAB is used for the
implementation of the proposed protocol.
A. PARAMETERS FOR SIMULATION
Simulations are performed by varying the number of nodes
between 50-250; to evaluate the effect of node density on
the entire network. Nodes are randomly distributed in the FIGURE 11. Cluster formation of 100-250 nodes.
network. The network area varies from 50 meters square to
200 m2 to check the effect of network scalability. The base of data packets sent to the base station in each round. Another
station is placed in the left upper corner of the network. metrics is the average energy, the sum of the remaining
Simulation parameters are listed in the following table. energy of all the nodes left collectively in the network to
Where Eo represents the initial energy of nodes, Eele , Efs , and keep the communication between nodes and base stations.
Eamp are energy depletion parameters of the first-order radio In Figure 11 (a), (b), (c) and (d) are the cluster formation of
model, and values given to these parameters are constantly 100, 150, 200 and 250 nodes respectively.
based on radio model standard. We use the same values of 1) NODE DENSITY EFFECT
node join and node move as in [23]. Node Join is the proba- The simulation was started initially with 50 nodes and
bility of new nodes to join the network and node movement within 50 x 50-meter square area to check the network per-
probability is represented by Node Move. formance of all algorithms. We kept increasing the number of
B. EXPERIMENT RESULTS nodes in the same region to analyze the effect of nodes density
Secondly, evaluation of the EEMCS protocol was done based on the network lifetime, energy utilization, and throughput.
on the stability and lifetime of network topology. For that, Figure 12 shows the network lifetime comparison using 100,
we examined that for how long a node can survive in the net- 150, 200, and 250 nodes.
work. We recorded the number of rounds when the first node Tests were also performed using the different number of
exhausted all of its energy. Performance is also evaluated on nodes in the same network area to check the node density
the base of the sum of energy consumption of all the sensor effect on the network. It was observed from simulations that
nodes for sending data packets to the base station in one with an increase in the number of nodes in the same region,
round. Energy overhead for sending control packets (adver- the first node of CRPD and EEMCS dies very early as com-
tisement message packets, acknowledgment packet, Hello pare to LEACH and MODLEACH in the case of 100 nodes
packets) are also included in the overall energy consumption. but the overall stability of the network of the EEMCS scheme
We estimated the throughput by calculating the total number is much better.
207788 VOLUME 8, 2020
S. Umbreen et al.: Energy-Efficient Mobility-Based CH Selection for Lifetime Enhancement of WSNs
FIGURE 15. Network performance using 50 nodes in the 50∗ 50 TABLE 6. Simulation results statistics using 50 sensors, 0.1 J energy and
m2 network area. in 50∗ 50 network area.
TABLE 10. Simulation results statistics using 50 sensors, 0.1 J energy, and
in 250∗ 250 network area.
5) TEST CASE 4
In this simulation, we increase the network area to 200 x FIGURE 22. Network performance using 50 nodes in the
200 m2 and examine its impact on the lifetime of the network, 200∗ 200 m2 network area.
throughput, and energy consumption. Simulation runs on
50 nodes with an initial energy of 0.1 Joules. The network 6) TEST CASE 5
area is the same throughout the experiments. Figures 21 and In the last case, the network area was increased to 250 x 250
22 show the comparison of the results of case 4. Results m2 . Figure 23 and 24 show the comparison of the results of
show that after increasing the area four times, the lifetime case 5. We analyzed that the life of the EEMCS protocol is
of the network in the case of CRPD, LEACH, and MOD- greater than the other algorithms. There is more stability in
LEACH reduce to more than 50 percent of their initial life- the network of the proposed algorithm whereas in LEACH
time but in EEMCS protocol lifetime is reduce around 20- and CRPD first node dies within the first 10 rounds. EEMCS
30 percent. Energy consumption is almost the same and also performed better in the case of energy consumption
throughput is also increased as compared to other existing of sensor nodes and average energy utilization of nodes. In
algorithms. terms of throughput, the performance of LEACH is reduced.
[2] K. A. Darabkh and L. Al-Jdayeh, ‘‘A new fixed clustering based [23] S. Wang, J. Yu, M. Atiquzzaman, H. Chen, and L. Ni, ‘‘CRPD:
algorithm for wireless sensor networks,’’ in Proc. 14th Int. Wireless A novel clustering routing protocol for dynamic wireless sensor net-
Commun. Mobile Comput. Conf., Jun. 2018, pp. 71–76, doi: 10.1109/ works,’’ Pers. Ubiquitous Comput., vol. 22, no. 3, pp. 545–559, Feb. 2018,
IWCMC.2018.8450485. doi: 10.1007/s00779-018-1117-6.
[3] M. Elhoseny and A. E. Hassanien, ‘‘Hierarchical and clustering WSN mod- [24] S. Deng, L. Shen, and J. Li, ‘‘Mobility-based clustering protocol for
els: Their requirements for complex applications,’’ in Dynamic Wireless wireless sensor networks with mobile nodes,’’ IET Wireless Sensor Syst.,
Sensor Networks (Studies in Systems, Decision and Control), vol 165. vol. 1, no. 1, pp. 39–47, Mar. 2011, doi: 10.1049/iet-wss.2010.0084.
Cham, Switzerland: Springer, 2019, doi: 10.1007/978-3-319-92807-4_3. [25] D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, and
[4] T. Bala, V. Bhatia, S. Kumawat, and V. Jaglan, ‘‘A survey: Issues and T. Zaman, ‘‘MODLEACH: A variant of LEACH for WSNs,’’ in Proc.
challenges in wireless sensir network,’’ Int. J. Eng. Technol., vol. 7, no. 2, 8th Int. Conf. Broadband Wireless Comput., Commun. Appl., Oct. 2013,
pp. 53–55, Mar. 2018, doi: 10.14419/ijet.v7i2.4.10041. pp. 158–163, doi: 10.1109/BWCCA.2013.34.
[5] D. D. K. Rathinam, D. Surendran, A. Shilpa, A. S. Grace, and [26] Z. Zhao, K. Xu, G. Hui, and L. Hu, ‘‘An energy-efficient clustering routing
J. Sherin, ‘‘Modern agriculture using wireless sensor network (WSN),’’ protocol for wireless sensor networks based on AGNES with balanced
in Proc. 5th Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), Mar. 2019, energy consumption optimization,’’ Sensors, vol. 18, no. 11, p. 3938,
pp. 515–519, doi: 10.1109/ICACCS.2019.8728284. Nov. 2018, doi: 10.3390/s18113938.
[6] K. Guleria and A. K. Verma, ‘‘Comprehensive review for energy effi- [27] A. Al-Baz and A. El-Sayed, ‘‘A new algorithm for cluster head selection
cient hierarchical routing protocols on wireless sensor networks,’’ Wireless in LEACH protocol for wireless sensor networks,’’ Int. J. Commun. Syst.,
Netw., vol. 25, no. 3, pp. 1159–1183, Apr. 2019, doi: 10.1007/s11276-018- vol. 31, no. 1, p. e3407, Jan. 2018, doi: 10.1002/dac.3407.
1696-1. [28] K. A. Darabkh and J. N. Zomot, ‘‘An improved cluster head selec-
[7] M. Tokala and R. Nallamekala, ‘‘Secured algorithm for routing the mil- tion algorithm for wireless sensor networks,’’ in Proc. 14th Int.
itary field data using dynamic sink: WSN,’’ in Proc. 2nd Int. Conf. Wireless Commun. Mobile Comput. Conf., Jun. 2018, pp. 65–70,
Inventive Commun. Comput. Technol. (ICICCT), Apr. 2018, pp. 471–476, doi: 10.1109/IWCMC.2018.8450446.
doi: 10.1109/ICICCT.2018.8473343. [29] N. Mazumdar and H. Om, ‘‘Distributed fuzzy approach to unequal cluster-
[8] S. Yahiaoui, M. Omar, A. Bouabdallah, E. Natalizio, and Y. Challal,
ing and routing algorithm for wireless sensor networks,’’ Int. J. Commun.
‘‘An energy efficient and QoS aware routing protocol for wireless sen-
Syst., vol. 31, no. 12, p. e3709, May 2018, doi: 10.1002/dac.3709.
sor and actuator networks,’’ AEU—Int. J. Electron. Commun., vol. 83,
[30] K. Cengiz and T. Dag, ‘‘Energy aware multi-hop routing protocol
pp. 193–203, Jan. 2018, doi: 10.1016/j.aeue.2017.08.045.
for WSNs,’’ IEEE Access, vol. 6, pp. 2622–2633, 2018, doi: 10.1109/
[9] H. El Alami and A. Najid, ‘‘ECH: An enhanced clustering hierarchy
ACCESS.2017.2784542.
approach to maximize lifetime of wireless sensor networks,’’ IEEE Access,
[31] M. Mirzaie and S. M. Mazinani, ‘‘Adaptive MCFL: An adaptive multi-
vol. 7, pp. 107142–107153, 2019, doi: 10.1109/ACCESS.2019.2933052.
[10] K. Haseeb, K. M. Almustafa, Z. Jan, T. Saba, and U. Tariq, ‘‘Secure clustering algorithm using fuzzy logic in wireless sensor network,’’ Com-
and energy-aware heuristic routing protocol for wireless sensor network,’’ put. Commun., vol. 111, pp. 56–67, Oct. 2017, doi: 10.1016/j.comcom.
IEEE Access, vol. 8, pp. 163962–163974, 2020, doi: 10.1109/access. 2017.07.005.
2020.3022285. [32] J.-Y. Lee, K.-D. Jung, S.-J. Moon, and H.-Y. Jeong, ‘‘Improvement on
[11] H. Mostafaei and M. S. Obaidat, ‘‘Learning automaton-based self- LEACH protocol of a wide-area wireless sensor network,’’ Multimedia
protection algorithm for wireless sensor networks,’’ IET Netw., vol. 7, no. 5, Tools Appl., vol. 76, no. 19, pp. 19843–19860, Oct. 2017, doi: 10.1007/
pp. 353–361, Sep. 2018, doi: 10.1049/iet-net.2018.0005. s11042-016-3732-4.
[12] Y. H. Robinson, E. G. Julie, R. Kumar, and L. H. Son, ‘‘Probability- [33] B. Kundaliya and S. K. Hadia, ‘‘Enhancing network lifetime with an
based cluster head selection and fuzzy multipath routing for prolonging improved MOD-LEACH,’’ Int. J. Electr. Comput. Eng., vol. 9, no. 5,
lifetime of wireless sensor networks,’’ Peer Netw. Appl., vol. 12, no. 5, pp. 3615–3622, Oct. 2019, doi: 10.11591/ijece.v9i5.pp3615-3622.
pp. 1061–1075, May 2019, doi: 10.1007/s12083-019-00758-8. [34] F. Belabed and R. Boouallegue, ‘‘Clustering approach using node mobil-
[13] B. Jan, H. Farman, M. Khan, and S. H. Ahmad, ‘‘An adaptive energy ity in wireless sensor networks,’’ in Proc. 13th Int. Wireless Com-
efficient scheme for energy constrained wireless sensor networks,’’ in mun. Mobile Comput. Conf., Jun. 2017, pp. 987–992, doi: 10.1109/
Proc. 34th ACM/SIGAPP Symp. Appl. Comput., Apr. 2019, pp. 2391–2398, IWCMC.2017.7986420.
doi: 10.1145/3297280.3297515. [35] Song, Liu, He, and Jiang, ‘‘Research on data fusion scheme for wireless
[14] H. Mostafaei, ‘‘Energy-efficient algorithm for reliable routing of wire- sensor networks with combined improved LEACH and compressed sens-
less sensor networks,’’ IEEE Trans. Ind. Electron., vol. 66, no. 7, ing,’’ Sensors, vol. 19, no. 21, p. 4704, Oct. 2019, doi: 10.3390/s19214704.
pp. 5567–5575, Jul. 2019, doi: 10.1109/TIE.2018.2869345.
[15] K. Cengiz and T. Dag, ‘‘Low energy fixed clustering algorithm (LEFCA)
for wireless sensor networks,’’ in Proc. Int. Conf. Comput. Netw. Commun. SEHAR UMBREEN, photograph and biography not available at the time of
(CoCoNet), Dec. 2015, pp. 79–84, doi: 10.1109/CoCoNet.2015.7411170. publication.
[16] K. Cengiz and T. Dag, ‘‘Multi-hop low energy fixed clustering algorithm
(M-LEFCA) for WSNs,’’ in Proc. IEEE 3rd Int. Symp. Telecommun.
Technol. (ISTT), Nov. 2016, pp. 31–34, doi: 10.1109/ISTT.2016.7918080. DANISH SHEHZAD, photograph and biography not available at the time of
[17] T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan, M. Danesh- publication.
mand, and A. H. Gandomi, ‘‘Residual energy-based cluster-head selection
in WSNs for IoT application,’’ IEEE Internet Things J., vol. 6, no. 3,
pp. 5132–5139, Jun. 2019, doi: 10.1109/JIOT.2019.2897119. NUMAN SHAFI, photograph and biography not available at the time of
[18] P. Gou, F. Li, Z. Li, and X. Jia, ‘‘Improved LEACH protocol publication.
based on efficient clustering in wireless sensor networks,’’ J. Com-
put. Methods Sci. Eng., vol. 19, no. 3, pp. 827–838, Jul. 2019,
doi: 10.3233/JCM-190006. BILAL KHAN received the B.S. degree in computer science from the Depart-
[19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, ‘‘Energy- ment of Computer Science, University of Peshawar, Pakistan, in 2005, the
efficient communication protocol for wireless microsensor networks,’’ M.S. degree in computer security from the University of Bradford, U.K., in
in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., 2000, p. 223,
2008, and the Ph.D. degree in computer networks from Dongguk University.
doi: 10.1109/hicss.2000.926982.
He worked as a Senior Researcher with the Center of Excellence in Infor-
[20] D.-S. Kim and Y.-J. Chung, ‘‘Self-organization routing protocol support-
ing mobile nodes for wireless sensor network,’’ in Proc. 1st Int. Multi- mation Assurance (CoEIA), King Saud University. He has been teaching in
Symposiums Comput. Comput. Sci. (IMSCCS), Jun. 2006, pp. 622–626, FAST-NUCES, Pakistan, since 2017. His research interests include devising
doi: 10.1109/imsccs.2006.265. performance efficient and energy-efficient MAC layer protocols for wireless
[21] G. S. Kumar, P. M. V. Vinu, and K. P. Jacob, ‘‘Mobility metric based local and personal area networks.
LEACH-mobile protocol,’’ in Proc. 16th Int. Conf. Adv. Comput. Com-
mun., Dec. 2008, pp. 248–253, doi: 10.1109/ADCOM.2008.4760456.
[22] P. K. Batra and K. Kant, ‘‘LEACH-MAC: A new cluster head selection USMAN HABIB, photograph and biography not available at the time of
algorithm for wireless sensor networks,’’ Wireless Netw., vol. 22, no. 1, publication.
pp. 49–60, Jan. 2016, doi: 10.1007/s11276-015-0951-y.