evidence-efficient multihop clustering routing scheme for...

15
Research Article Evidence-Efficient Multihop Clustering Routing Scheme for Large-Scale Wireless Sensor Networks Zhihua Li and Ping Xin Department of Computer Science and Technology, School of Internet of ings Engineering, Jiangnan University, Wuxi, Jiangsu 214122, China Correspondence should be addressed to Zhihua Li; [email protected] Received 22 August 2017; Accepted 30 October 2017; Published 19 November 2017 Academic Editor: Paolo Barsocchi Copyright © 2017 Zhihua Li and Ping Xin. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Energy consumption and transmission reliability are the most common issues in wireless sensor networks (WSNs). By studying the broadcast nature of data transmission in WSNs, the mechanism of guaranteeing reliable transmission is abstracted as propagation of responsibility and availability. e responsibility and availability represent the accumulated evidence of nodes to support reliable transmission. Based on the developed mechanism, an evidence-efficient cluster head rotation strategy and algorithm are presented. Furthermore, backbone construction algorithm is studied to generate the minimum aggregation tree inside the candidate cluster heads. A minimum aggregation tree-based multihop routing scheme is also investigated, which allows the elected cluster heads to choose the optimally main path to forward data locally and dynamically. As a hybridization of the above, an evidence-efficient multihop clustering routing (EEMCR) method is proposed. e EEMCR method is simulated, validated, and compared with some previous algorithms. e experimental results show that EEMCR outperforms them in terms of prolonging network lifetime, improving transmission reliability, postponing emergence of death nodes, enhancing coverage preservation, and degrading energy consumption. 1. Introduction Decreasing energy consumption, improving energy effi- ciency, and enhancing transmission reliability are still main challenges of wireless sensor networks (WSNs). e related technique-efficient issues, such as clustering routing, topol- ogy control, and multihop transmission, are widely used to improve energy efficiency for WSNs [1–20]. On the other hand, it is very important to note that hybridization combi- nation of various approaches may affect total performance. Hierarchical topology control, in which nodes are grouped into clusters and cluster heads (CHs) are elected for each cluster to form a backbone construction, can effectively utilize the limited resources of sensor nodes. Hierarchical topology benefits maximizing the network lifetime and optimizing the data delivery ratio on each link. Clustering technique has been proven energy-efficient in WSNs [3, 5– 7, 10, 11, 13], in which the low-energy adaptive clustering hierarchy (LEACH) [21] protocol is the most typical one. However, because of its energy-intensive data transmission and routing tasks, a CH node consumes much more energy than regular sensors. us, an energy-efficient mechanism for CHs rotation or election, minimizing energy consumption of each node, and maximizing the network lifetime while guar- anteeing transmission reliability are still attractive challenges. Multihop routing is one of two main communication modes for WSNs. In comparison with multipath routing, its transmission has generally been considered an efficient energy-saving approach, especially for large-scale sensor networks [3, 7, 10, 14, 16]. e most commonly used multihop topology is the aggregation tree rooted at the sink [22]. However, the tree topology has an inherent deficiency in that each sensor has only one path to the sink, and the path is not necessarily optimal which results in that the traffic flow passing through these sensors may be unbalanced, thereby making some sensors run out of their energy quickly and even shortening the network lifetime [22]. On the other hand, the clustering routing algorithms [15, 17] integrated the famous Dijkstra algorithm and used the Dijkstra algorithm to build Hindawi Wireless Communications and Mobile Computing Volume 2017, Article ID 1914956, 14 pages https://doi.org/10.1155/2017/1914956

Upload: others

Post on 22-May-2020

18 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Research ArticleEvidence-Efficient Multihop Clustering Routing Scheme forLarge-Scale Wireless Sensor Networks

Zhihua Li and Ping Xin

Department of Computer Science and Technology School of Internet of Things Engineering Jiangnan University WuxiJiangsu 214122 China

Correspondence should be addressed to Zhihua Li zhlijiangnaneducn

Received 22 August 2017 Accepted 30 October 2017 Published 19 November 2017

Academic Editor Paolo Barsocchi

Copyright copy 2017 Zhihua Li and Ping Xin This is an open access article distributed under the Creative Commons AttributionLicense which permits unrestricted use distribution and reproduction in any medium provided the original work is properlycited

Energy consumption and transmission reliability are the most common issues in wireless sensor networks (WSNs) By studying thebroadcast nature of data transmission in WSNs the mechanism of guaranteeing reliable transmission is abstracted as propagationof responsibility and availabilityThe responsibility and availability represent the accumulated evidence of nodes to support reliabletransmission Based on the developedmechanism an evidence-efficient cluster head rotation strategy and algorithm are presentedFurthermore backbone construction algorithm is studied to generate the minimum aggregation tree inside the candidate clusterheads A minimum aggregation tree-based multihop routing scheme is also investigated which allows the elected cluster heads tochoose the optimally main path to forward data locally and dynamically As a hybridization of the above an evidence-efficientmultihop clustering routing (EEMCR) method is proposed The EEMCR method is simulated validated and compared withsome previous algorithmsThe experimental results show that EEMCR outperforms them in terms of prolonging network lifetimeimproving transmission reliability postponing emergence of death nodes enhancing coverage preservation and degrading energyconsumption

1 Introduction

Decreasing energy consumption improving energy effi-ciency and enhancing transmission reliability are still mainchallenges of wireless sensor networks (WSNs) The relatedtechnique-efficient issues such as clustering routing topol-ogy control and multihop transmission are widely used toimprove energy efficiency for WSNs [1ndash20] On the otherhand it is very important to note that hybridization combi-nation of various approaches may affect total performance

Hierarchical topology control in which nodes aregrouped into clusters and cluster heads (CHs) are elected foreach cluster to form a backbone construction can effectivelyutilize the limited resources of sensor nodes Hierarchicaltopology benefits maximizing the network lifetime andoptimizing the data delivery ratio on each link Clusteringtechnique has been proven energy-efficient in WSNs [3 5ndash7 10 11 13] in which the low-energy adaptive clusteringhierarchy (LEACH) [21] protocol is the most typical oneHowever because of its energy-intensive data transmission

and routing tasks a CH node consumes much more energythan regular sensorsThus an energy-efficientmechanism forCHs rotation or election minimizing energy consumption ofeach node and maximizing the network lifetime while guar-anteeing transmission reliability are still attractive challenges

Multihop routing is one of two main communicationmodes for WSNs In comparison with multipath routingits transmission has generally been considered an efficientenergy-saving approach especially for large-scale sensornetworks [3 7 10 14 16]Themost commonly usedmultihoptopology is the aggregation tree rooted at the sink [22]However the tree topology has an inherent deficiency in thateach sensor has only one path to the sink and the path isnot necessarily optimal which results in that the traffic flowpassing through these sensors may be unbalanced therebymaking some sensors run out of their energy quickly and evenshortening the network lifetime [22] On the other hand theclustering routing algorithms [15 17] integrated the famousDijkstra algorithm and used the Dijkstra algorithm to build

HindawiWireless Communications and Mobile ComputingVolume 2017 Article ID 1914956 14 pageshttpsdoiorg10115520171914956

2 Wireless Communications and Mobile Computing

Sink

0 10 20 30 40 50 60 70 80 90 1000

102030405060708090

100

1

2

3

4

5 67

8 9

10

11

12

13

14

15 16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

4445

46

47

48

49

50

51

52

53

54

55

56

57

5859

60

61

62

63

6465

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

9697

98

99

100

Nodes

CHs

The accumulatedevidenceThe optimum multihopcommunication paths

Figure 1 A demo of the principles employed in the proposedscheme

the shortest path tree with minimum energy consumptionfor each CH to the sink node Namely the CHs couldautomatically form a number of multihop communicationpaths The collected data is continuously transmitted to thesink node via the cluster head-adjacent multihop routing thateffectively shared the overloading of different CHs Howeverthe deficiency of imbalanced distribution of CHs has not beentreated which makes the size of some clusters too large andit is easy to incur the fast energy consumption in some localclusters

In this paper we also address the LEACH-improvedscheme By studying the broadcast nature of data trans-mission in WSNs it is abstracted as a propagation ofresponsibility and availability of nodes The responsibilityand availability integrate sufficient considerations on variousnetwork factors including the residual energy of nodesdistance between nodes distance between the CHs andthe base station and energy loss on the node-joint linksEssentially the responsibility and availability express theaccumulated evidence of nodes to support high-qualitycommunication Namely the responsibility and availabilityrepresent the comprehensive capability of nodes against nodefailures and link losses Based on the above developmentan evidence-efficient CH rotation scheme and algorithmare proposed Furthermore in order to improve the datatransmission reliability between the candidate CHs to thebase station the well-known Kruskal algorithm [23] isemployed to generate the minimum aggregation tree that isa backbone construction algorithm is also developed As ahybridization of the presented subalgorithms an evidence-efficient multihop clustering routing (EEMCR) method isproposed An example of the working mechanism employedin the EEMCR method is demonstrated by several clustersin Figure 1 And more the experimental comparison andanalysis are also examined with the previous algorithms

As far as we know the main contribution of this paperhas at least the following points (1) the eligibility evidenceof a node as a CH is regarded as the sum of responsibilityand availability (eg the accumulated evidence) whichincreases its robustness against random node failures (2)the mechanism of clustering is in terms of the propagation

of responsibility and availability globally which reduces thenegative intercluster communication interference (3) theoptimummultihop communication paths are achieved by thebackbone construction algorithm for the CHs which ensuresthe node-joint link reliability against link failures (4) theassociated algorithms and methods are developed and havevalidated their promising performance

The rest of this paper is organized as follows The relatedworks are introduced in Section 2 In Section 3 we describethe system assumptions and communication models InSection 4 the mechanism and algorithm of CH rotationare examined and proposed We derive the framework ofthe EEMCR scheme and present the overview and thedetailed design of it in Section 5 Promising experimentresults are given in Section 6 and from the effectiveness andefficiency perspective some validations and comparisons areperformed which are followed by the concluding remarksand future works in Section 7

2 Related Works

21 General Clustering Routing Grouping nodes into clustershas been themost popular approach for supporting scalabilityin WSNs [4] Besides the well-known LEACH and LEACH-developed algorithms significant attention has been paid toclustering routingmechanism and algorithms yielding a largeamount of publications [3 5ndash7 10ndash13 17 18 20 24] Theseproposed clustering techniques usually include three phasesCH determination clustering and data transmission Theprevious research works address either one of the issues oroverall three phases fromdifferent perspectives and also theirimprovements and developments with respect to the existingresearches

Usually clustering is typically based on the energy reserveof sensor nodes and nodersquos proximity to the CH [25]Regardless of any of their improvements or developmentthe reduction of energy consumption prolonging the net-work lifetime and improving transmission reliability are thebasic goals in WSNs Energy-efficient clustering techniqueis applied to reduce energy consumption interference andmaintaining connectivity and coverage in WSNs Youniset al [26] proposed a Hybrid Energy-Efficient DistributedClustering (HEED) protocol HEED is a distributed cluster-ing protocol in which a CH election scheme is presentedwith the comprehensive treatment of the residual energyand intracluster communication cost HEED ensures a uni-form distribution of CHs and inter-CH connectivity by anadjustable probability of CH election But the mechanismthat the sensor doubles its probability to become CH duringa repetition phase is not reasonable enough Zhou et al[27] proposed an Energy-Efficient Strong Head clustering(EESH) In EESH nodes are promotedCHs according to theirrespective residual energies their respective degrees and thedistance to and the residual energy of their neighbors Forthat EESH evaluates a cost function for every sensor in thenetwork and iteratively elects the node having the greatestcost as CH This process terminates when all the sensorsin the network are connected to at least one CH Chamamand Pierre [28] proposed a distributed energy-efficient

Wireless Communications and Mobile Computing 3

cluster formation (EECF) protocol EECF elected the CHsfollowing a three-waymessage exchange between each sensorand its neighbors Sensorrsquos eligibility to be elected CH isbased on its residual energy and its degreeThus the messageexchanges complexity of 119874(1) and a worst-case convergencetime complexity of O(N)

Additionally some nonclustering routing methods ormodels [29 30] have also been published They also haveprominent performance on either or all aspects such asdegrading excessive communication energy consumptionprolonging the lifetime and enhancing the transmissionreliability

22 LEACH-Improved Clustering Routing The LEACH pro-tocol one of the first clustering routing protocols proposedfor WSNs is an adaptive distributed algorithm that formsclusters of sensors based on the received signal strength anduses local CHs as routers to the sink node [28] In LEACHeach node has an equivalent opportunity to become CHand through a random rotation of CHs LEACH provides abalance of energy consumption for each node However CHstransmit data directly to the sink node which can be energy-consuming in large-scale WSNs Power-efficient Gather-ing in Sensor Information Systems (PEGASIS) [31] andHierarchical-PEGASIS are two improvements of LEACHUnlike the existing multiple clusters in LEACH PEGASISand Hierarchical-PEGASIS constructed chains of sensornodes so that each sensor node is transmitted and receivedfrom a neighbor and only one node was selected from thatchain to transmit data to the sink node [28] Unfortunatelythe communication between the elected CH and the basestation is one-hop which may waste energy and prove to beunsuitable for large-scaleWSNs [28] Obviously they need tobe improved in-depth

Based on the LEACH algorithm two factors the energyand distance were cast into modifying the threshold func-tion of LEACH protocol a cluster head multihop routingimproved algorithm (CMRAOL) based on LEACH [21] wasproposed in which the multihop communication approachwas adopted and a reliable path was built between the CHsand the sink node the energy consumption of the networkwas effectively balanced but the CH election process wastoo complex Thus the algorithm was only suitable forstatic networks the improved low-energy adaptive clusteringhierarchy-centralized (LEACH-C) algorithm [13] sufficientlyconsidered two factors the energy and number of CHsThe energy consumption of each node improves to be morebalanced but the clustering overhead was too large

Additionally some of the existing clustering routingalgorithms [3 7 10 13 14] did not consider the residualenergy and the deployment location of nodes in responseto this deficiency several researches are carried out in theEBAPC algorithm [18] The EBAPC algorithm defined anew concept of fitness factor and employed the strategy ofcluster center determination inAP algorithm [24]The clustercenter determination strategy [24] was approximated as anelection scheme of the CHs with sufficient consideration ofthe residual energy of nodes In contrast to the previous algo-rithms the CH election was more reasonable and the energy

consumption got more balanced However the EBAPC algo-rithm did not regard the relation between the location ofthe base station and the entire energy consumption of thenetwork which easily leads to high energy consumption ofsome local nodes even premature death of some importantnodes affects the network lifetime and the service quality ofthe network the ELBC and BM-ELBC algorithm [19] basedon EBAPC algorithm were proposed respectively A newconcept of energy level with sufficient consideration of twofactors the residual energy of nodes and distance betweendifferent nodes was introduced the proposed algorithmsmade energy consumption more balanced and they signif-icantly prolonged the network lifetime However the defini-tion of energy level was relatively rough which easily spurredan unreasonable CH election such as taking the remotelyunreasonable nodes as the second level CHs This situationultimately affected the transmission efficiency and trans-mission delay as well as the network lifetime A clusteringrouting algorithm that introduces a new definition of nodecompetitiveness based on it was presented [20] The APBCSalgorithm made the node-joint clustering more uniform andmade the node deployment more reasonable However theAPBCS algorithm had not given an appropriate solutionscheme to satisfy the requirement of multihop transmissionscheme within the node-joint CHs as a result increasing theenergy consumption on some CHs When the scale of WSNsgets large it leads to the occurrence of a premature death forthe CHs such that it was unable to guarantee the coveragepreservation and network connectivity

The differences covered between the proposed EEMCRscheme and the previous researches include the following thenature of data transmission in WSNs is abstracted as propa-gation of responsibility and availability and the responsibilityand availability are taken as the accumulated evidence ofnodes for guaranteeing transmission reliability the responsi-bility and availability integrate comprehensive considerationson several network factors an evidence-efficient cluster headrotation mechanism and algorithm are presented backboneconstruction algorithm is developed to generate a minimumaggregation tree essentially the branches inside the gen-erated minimum aggregation tree construct the multihopcommunication paths The experimental results show thatthere exists a remarkable improvement on prolonging thenetwork lifetime postponing the death of nodes savingenergy and conducting coverage preservation

3 Assumptions and Models

31 System Assumptions Assuming that 119899 nodes are ran-domly deployed in a target area in which each node hasthe same configuration and data processing capability thelocation of each node is known-available Additionally thispaper makes the following assumptions(1) All the sensor nodes in the system have the sameorganization and initial energy 1198640(2) All sensor nodes adaptively adjust the transmissionpower according to their need

4 Wireless Communications and Mobile Computing

Amplifiercircuit

Transmittingcircuit

Receivingcircuit

d

l bit data l bit data

EF= times l EF= times lGJ times l times dn

E28(l d)ET8(l d)

Figure 2 Wireless transceiver circuit energy consumption model

32 Communication Model In this paper a well-knowncommon first-order wireless energy consumptionmodel [32]is employed which is shown in Figure 2

With respect to the abovemodel the energy consumptionof transmitting l bit data is composed of transmission circuitpower and power amplification losses Different power con-sumption models are employed with different distances andthe energy consumption of transmitting l bit data by nodescan be calculated by the following formula

119864TX (119897 119889) = 119864TX elec (119897) + 119864TX amp (119897 119889)=

119897119864elec + 119897120576fs1198892 119889 lt 1198890119897119864elec + 119897120576amp1198894 119889 ge 1198890

(1)

where 119864elec represents the energy consumption by a circuitprocessing a single bit data 120576fs denotes the coefficient ofpower amplifier in the free spacemodel 120576amp is the coefficientof multidiameter attenuation model of power amplifier and1198890 is the critical distance between free space propagationmodel and multipath attenuation model and is calculated asthe following formula

1198890 = radic 120576fs120576amp (2)

The energy consumption by the node receiving 119897 bit datais formalized as the following formula

119864Rx (119897) = 119864Rxminuselec (119897) = 119897119864elec (3)

4 Evidence-Efficient Cluster HeadRotation Mechanism

In this section we discuss the issue of CH rotation Firstwe think that the essence of CH election in clusteringtopology is equivalent to determining the cluster centroidsof cluster algorithms in data mining The Affinity Propa-gation (AP) [24] cluster algorithm is very prominent at itsperformance on carrying out large amount of data Thuswe employ the propagation mechanism in AP algorithmand study the scheme of CH rotation associated with it

Under sufficient consideration of several network factorsincluding the residual energy of nodes distance betweennodes energy consumption associated transmission distanceand amount of data and abstracting the capability of guaran-teeing transmission reliability in WSNs as the responsibilityand availability propagation between node-joint links themaximum sum of responsibility and availability is taken asthe accumulated evidence of CH rotation Namely if theaccumulated evidence of a node is relatively large then ithas a relatively high possibility of becoming a CH which isin charge of maintaining the node-joint links and ensuringtransmission reliability

Additionally since the energy efficiency is one of the crit-ical factors that influence the network lifetime in particularseveral new definitions with respect to the measurement orestimation of energy consumption are presented as follows

Definition 1 Node-Energy-Level (NEL) is used to measurethe energy consumption of nodes in the network NEL iscalculated as Formula (4)

NEL = (119864remain

119864init )1119873live (4)

where 119873live denotes the number of surviving nodes in thecurrent status of the network 119864init represents the initialenergy of a node 119864remain denotes the residual energy ofa node The meaning of NEL shows that the higher theresidual energy of a node the greater the value of the nodeenergy level (eg NEL) which indicates that the stronger thecurrent node activity the greater the coverage preservationas well as the better the quality of service (QoS) In contrastwhen the residual energy of nodes is lower the node energylevel is smaller which indicates that the smaller coveragepreservation and the worse QoS

Definition 2 The Energy-Cost EC(119894 119895) is defined as thefollowing formula

EC (119894 119895) = ET (119894 119895)119864remain119894

(5)

where 119864remain119894 denotes the current remainder energy of CH i

and ET(119894 119895) represents the real amount of energy consumedbyCH 119894 to transmit a unit data to CH j EC(119894 119895) only expressesa logical transmission overhead rather than a real metric ofenergy consumption Itsmeaning not only shows consideringthe energy consumption of the real data transmission butalso takes into account the residual energy level of nodesthemselves

Definition 3 119904(119894 119895) indicates the level of node j appropriatefor the cluster head to node i which is called the orientation-tended matrix and defined as the following formula

119904 (119894 119895) = minus(120572 lowast (119889 (119895 119861) lowast 119864remain

119895 )NEL + (1 minus 120572) lowast 119889 (119894 119895)) 119894 = 119895 120572 isin [0 1]119875 (119895) 119894 = 119895 (6)

Wireless Communications and Mobile Computing 5

whereB represents the base station119889(119894 119895) is the distance fromnode i to node j and with the Euclidean distance to express119889(119895 119861) is the distance between node j and base station119864remain

119895

is the current residual energy of node j NEL is the Node-Energy-Level (eg NEL) of the current node and is calculatedusing Formula (4) 120572 is a weight used to adjust the residualenergy and distance in the CH election scheme Usually anode with a larger value of 120572 and more remainder energyand closer to the base station is easier to become a CH 119875 isthe orientation-tended parameter that is the diagonal valuein the orientation-tended matrix defined as the followingformula

119875 (119894) = minusNEL times ( 119864init119894119864remain119894

) (7)

where 119864init119894 is the initial energy of node i It can be seen from

Formula (7) because the orientation-tended matrix is alwaysnegative Thus the more the residual energy of the node thegreater the value of the orientation-tended parameter 119875 aswell as the higher the probability that the node will becomethe CH

Based on the above this paper integrates inspirationson the broadcast nature of data transmission in WSNs andthe idea in AP algorithm Furthermore we give improve-ment recognition of the responsibility and availabilityrespectively

Definition 4 The eligibility evidence of a node as a clusterhead is quantified using the responsibility and availabilityThey are defined as follows

119903 (119894 119896) = 119904 (119894 119896) minusmax 119886 (119894 1198961015840) + 119904 (119894 1198961015840)(1198961015840 isin 1 2 119899 1198961015840 = 119896) (8)

119886 (119894 119896) = min0 119903 (119896 119896) +sum1198941015840

max 0 119903 (1198941015840 119896)(1198941015840 isin 1 2 119899 1198941015840 = 119894 1198941015840 = 119896)

(9)

where 119903(119894 119896) is the responsibility between node i and nodek If k is taken as the potential CH then responsibility istransmitted from node i to node k and is equivalent to theaccumulated evidence for node k to be the CH of node i119886(119894 119896) as the availability between node i and k transmits fromnode k to node i It implies the accumulated evidence fornode i to select node k as its CH Thus it measures whetherk can finally become the real CH after each cycle of self-adaptation

Formulas (8) and (9) iterate according to Formulas (10)and (11) respectively

119903new (119894 119896) = (1 minus 120582) 119903 (119894 119896) + 120582119903old (119894 119896) (10)

119886new (119894 119896) = (1 minus 120582) 119886 (119894 119896) + 120582119886old (119894 119896) (11)

where 120582 isin [0 1] is the learning rate in updating 119903(119894 119896) and119886(119894 119896) At the beginning of the iteration their initial valuesare set to ldquo0rdquo

Usually link losses and node failures are the primaryreasons to influence transmission reliability in WSNs unfor-tunately they are negatively affected bymanynetwork factorsIn this paper we take the availability and responsibility as thecomprehensive evidence against node failures and link losseswhich aims to improve the total performance includingtransmission reliability and other properties To this pointthe availability and responsibility provide a logical metric fornodes to guarantee transmission reliability

Furthermore in order to ensure the rationality of CHrotation and correctness of CH election mechanism we givethe following theorem and proof

Theorem 5 The greater the sum of responsibility and avail-ability the greater the possibility of a node to become a clusterhead

Proof The essence of a ldquoclusterrdquo in the clustering routingis similar to the ldquocluster analyzerdquo in the associated clusteralgorithms of datamining thus the CH election likes the pro-cedure of determining the cluster centroids in the algorithmsof dataminingMoreover the well-knownAP algorithm is anessential cluster algorithm and its cluster procedure is carriedout by the propagation of responsibility and availability inwhich the first critical business is to adaptively determinethe different cluster centroids according to the changeableorientation parameter The cluster procedure is iterativelyongoing until all of the data items are clustered This aboveidea is equivalent to the mechanism of the CH rotation inWSNs and equivalently applied in selecting the CHs that isthere exists a set of dynamic candidate CHs composed of alarge amount of nodes which correspond to the cluster cen-troids and are traversed by the propagation of responsibilityand availability In each cycle of the clustering the node-joint links build the interpath within a single cluster and thecluster head-joint links set up the intrapath between differentclusters During the propagation processing the availabilityand responsibility denote the capability of resisting nodesfailures and link losses as well as their propagation directionwhich guides the data transmission paths Obviously thegreater the sumof responsibility and availability is the greaterthe probability that a node becomes a CH would be Thetheorem is proved

Consequently in a real clustering phase each cycleincludes two phases cluster head election and clusteringThe two phases are periodically ongoing until any noderuns out of its energy The responsibility and availabilitytransmit themselves within nodes-joint links in the clusteringprocedureThe sumof ldquo119903(119894 119896)+119886(119894 119896)rdquo is adaptively changingThe larger the sumof 119903(119894 119896)+119886(119894 119896) the greater the probabilitythat the node k becomes aCH otherwise the node k is unableto become aCHNamely as for node 119894 it always selects node 119896that maximizes the sum of 119903(119894 119896) + 119886(119894 119896) Furthermore if 119894 =119896 node 119894 is the CH otherwise 119894 = 119896 node 119896 is the CH of nodei In combination with Definitions 1 2 and 3 and the above-mentioned analysis it indicates that the nodes with moreresidual energy and little amount of data to transmit have ahigh probability to be CHs Apparently the CHs election isan adaptive and dynamic process

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 2: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

2 Wireless Communications and Mobile Computing

Sink

0 10 20 30 40 50 60 70 80 90 1000

102030405060708090

100

1

2

3

4

5 67

8 9

10

11

12

13

14

15 16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

4445

46

47

48

49

50

51

52

53

54

55

56

57

5859

60

61

62

63

6465

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

9697

98

99

100

Nodes

CHs

The accumulatedevidenceThe optimum multihopcommunication paths

Figure 1 A demo of the principles employed in the proposedscheme

the shortest path tree with minimum energy consumptionfor each CH to the sink node Namely the CHs couldautomatically form a number of multihop communicationpaths The collected data is continuously transmitted to thesink node via the cluster head-adjacent multihop routing thateffectively shared the overloading of different CHs Howeverthe deficiency of imbalanced distribution of CHs has not beentreated which makes the size of some clusters too large andit is easy to incur the fast energy consumption in some localclusters

In this paper we also address the LEACH-improvedscheme By studying the broadcast nature of data trans-mission in WSNs it is abstracted as a propagation ofresponsibility and availability of nodes The responsibilityand availability integrate sufficient considerations on variousnetwork factors including the residual energy of nodesdistance between nodes distance between the CHs andthe base station and energy loss on the node-joint linksEssentially the responsibility and availability express theaccumulated evidence of nodes to support high-qualitycommunication Namely the responsibility and availabilityrepresent the comprehensive capability of nodes against nodefailures and link losses Based on the above developmentan evidence-efficient CH rotation scheme and algorithmare proposed Furthermore in order to improve the datatransmission reliability between the candidate CHs to thebase station the well-known Kruskal algorithm [23] isemployed to generate the minimum aggregation tree that isa backbone construction algorithm is also developed As ahybridization of the presented subalgorithms an evidence-efficient multihop clustering routing (EEMCR) method isproposed An example of the working mechanism employedin the EEMCR method is demonstrated by several clustersin Figure 1 And more the experimental comparison andanalysis are also examined with the previous algorithms

As far as we know the main contribution of this paperhas at least the following points (1) the eligibility evidenceof a node as a CH is regarded as the sum of responsibilityand availability (eg the accumulated evidence) whichincreases its robustness against random node failures (2)the mechanism of clustering is in terms of the propagation

of responsibility and availability globally which reduces thenegative intercluster communication interference (3) theoptimummultihop communication paths are achieved by thebackbone construction algorithm for the CHs which ensuresthe node-joint link reliability against link failures (4) theassociated algorithms and methods are developed and havevalidated their promising performance

The rest of this paper is organized as follows The relatedworks are introduced in Section 2 In Section 3 we describethe system assumptions and communication models InSection 4 the mechanism and algorithm of CH rotationare examined and proposed We derive the framework ofthe EEMCR scheme and present the overview and thedetailed design of it in Section 5 Promising experimentresults are given in Section 6 and from the effectiveness andefficiency perspective some validations and comparisons areperformed which are followed by the concluding remarksand future works in Section 7

2 Related Works

21 General Clustering Routing Grouping nodes into clustershas been themost popular approach for supporting scalabilityin WSNs [4] Besides the well-known LEACH and LEACH-developed algorithms significant attention has been paid toclustering routingmechanism and algorithms yielding a largeamount of publications [3 5ndash7 10ndash13 17 18 20 24] Theseproposed clustering techniques usually include three phasesCH determination clustering and data transmission Theprevious research works address either one of the issues oroverall three phases fromdifferent perspectives and also theirimprovements and developments with respect to the existingresearches

Usually clustering is typically based on the energy reserveof sensor nodes and nodersquos proximity to the CH [25]Regardless of any of their improvements or developmentthe reduction of energy consumption prolonging the net-work lifetime and improving transmission reliability are thebasic goals in WSNs Energy-efficient clustering techniqueis applied to reduce energy consumption interference andmaintaining connectivity and coverage in WSNs Youniset al [26] proposed a Hybrid Energy-Efficient DistributedClustering (HEED) protocol HEED is a distributed cluster-ing protocol in which a CH election scheme is presentedwith the comprehensive treatment of the residual energyand intracluster communication cost HEED ensures a uni-form distribution of CHs and inter-CH connectivity by anadjustable probability of CH election But the mechanismthat the sensor doubles its probability to become CH duringa repetition phase is not reasonable enough Zhou et al[27] proposed an Energy-Efficient Strong Head clustering(EESH) In EESH nodes are promotedCHs according to theirrespective residual energies their respective degrees and thedistance to and the residual energy of their neighbors Forthat EESH evaluates a cost function for every sensor in thenetwork and iteratively elects the node having the greatestcost as CH This process terminates when all the sensorsin the network are connected to at least one CH Chamamand Pierre [28] proposed a distributed energy-efficient

Wireless Communications and Mobile Computing 3

cluster formation (EECF) protocol EECF elected the CHsfollowing a three-waymessage exchange between each sensorand its neighbors Sensorrsquos eligibility to be elected CH isbased on its residual energy and its degreeThus the messageexchanges complexity of 119874(1) and a worst-case convergencetime complexity of O(N)

Additionally some nonclustering routing methods ormodels [29 30] have also been published They also haveprominent performance on either or all aspects such asdegrading excessive communication energy consumptionprolonging the lifetime and enhancing the transmissionreliability

22 LEACH-Improved Clustering Routing The LEACH pro-tocol one of the first clustering routing protocols proposedfor WSNs is an adaptive distributed algorithm that formsclusters of sensors based on the received signal strength anduses local CHs as routers to the sink node [28] In LEACHeach node has an equivalent opportunity to become CHand through a random rotation of CHs LEACH provides abalance of energy consumption for each node However CHstransmit data directly to the sink node which can be energy-consuming in large-scale WSNs Power-efficient Gather-ing in Sensor Information Systems (PEGASIS) [31] andHierarchical-PEGASIS are two improvements of LEACHUnlike the existing multiple clusters in LEACH PEGASISand Hierarchical-PEGASIS constructed chains of sensornodes so that each sensor node is transmitted and receivedfrom a neighbor and only one node was selected from thatchain to transmit data to the sink node [28] Unfortunatelythe communication between the elected CH and the basestation is one-hop which may waste energy and prove to beunsuitable for large-scaleWSNs [28] Obviously they need tobe improved in-depth

Based on the LEACH algorithm two factors the energyand distance were cast into modifying the threshold func-tion of LEACH protocol a cluster head multihop routingimproved algorithm (CMRAOL) based on LEACH [21] wasproposed in which the multihop communication approachwas adopted and a reliable path was built between the CHsand the sink node the energy consumption of the networkwas effectively balanced but the CH election process wastoo complex Thus the algorithm was only suitable forstatic networks the improved low-energy adaptive clusteringhierarchy-centralized (LEACH-C) algorithm [13] sufficientlyconsidered two factors the energy and number of CHsThe energy consumption of each node improves to be morebalanced but the clustering overhead was too large

Additionally some of the existing clustering routingalgorithms [3 7 10 13 14] did not consider the residualenergy and the deployment location of nodes in responseto this deficiency several researches are carried out in theEBAPC algorithm [18] The EBAPC algorithm defined anew concept of fitness factor and employed the strategy ofcluster center determination inAP algorithm [24]The clustercenter determination strategy [24] was approximated as anelection scheme of the CHs with sufficient consideration ofthe residual energy of nodes In contrast to the previous algo-rithms the CH election was more reasonable and the energy

consumption got more balanced However the EBAPC algo-rithm did not regard the relation between the location ofthe base station and the entire energy consumption of thenetwork which easily leads to high energy consumption ofsome local nodes even premature death of some importantnodes affects the network lifetime and the service quality ofthe network the ELBC and BM-ELBC algorithm [19] basedon EBAPC algorithm were proposed respectively A newconcept of energy level with sufficient consideration of twofactors the residual energy of nodes and distance betweendifferent nodes was introduced the proposed algorithmsmade energy consumption more balanced and they signif-icantly prolonged the network lifetime However the defini-tion of energy level was relatively rough which easily spurredan unreasonable CH election such as taking the remotelyunreasonable nodes as the second level CHs This situationultimately affected the transmission efficiency and trans-mission delay as well as the network lifetime A clusteringrouting algorithm that introduces a new definition of nodecompetitiveness based on it was presented [20] The APBCSalgorithm made the node-joint clustering more uniform andmade the node deployment more reasonable However theAPBCS algorithm had not given an appropriate solutionscheme to satisfy the requirement of multihop transmissionscheme within the node-joint CHs as a result increasing theenergy consumption on some CHs When the scale of WSNsgets large it leads to the occurrence of a premature death forthe CHs such that it was unable to guarantee the coveragepreservation and network connectivity

The differences covered between the proposed EEMCRscheme and the previous researches include the following thenature of data transmission in WSNs is abstracted as propa-gation of responsibility and availability and the responsibilityand availability are taken as the accumulated evidence ofnodes for guaranteeing transmission reliability the responsi-bility and availability integrate comprehensive considerationson several network factors an evidence-efficient cluster headrotation mechanism and algorithm are presented backboneconstruction algorithm is developed to generate a minimumaggregation tree essentially the branches inside the gen-erated minimum aggregation tree construct the multihopcommunication paths The experimental results show thatthere exists a remarkable improvement on prolonging thenetwork lifetime postponing the death of nodes savingenergy and conducting coverage preservation

3 Assumptions and Models

31 System Assumptions Assuming that 119899 nodes are ran-domly deployed in a target area in which each node hasthe same configuration and data processing capability thelocation of each node is known-available Additionally thispaper makes the following assumptions(1) All the sensor nodes in the system have the sameorganization and initial energy 1198640(2) All sensor nodes adaptively adjust the transmissionpower according to their need

4 Wireless Communications and Mobile Computing

Amplifiercircuit

Transmittingcircuit

Receivingcircuit

d

l bit data l bit data

EF= times l EF= times lGJ times l times dn

E28(l d)ET8(l d)

Figure 2 Wireless transceiver circuit energy consumption model

32 Communication Model In this paper a well-knowncommon first-order wireless energy consumptionmodel [32]is employed which is shown in Figure 2

With respect to the abovemodel the energy consumptionof transmitting l bit data is composed of transmission circuitpower and power amplification losses Different power con-sumption models are employed with different distances andthe energy consumption of transmitting l bit data by nodescan be calculated by the following formula

119864TX (119897 119889) = 119864TX elec (119897) + 119864TX amp (119897 119889)=

119897119864elec + 119897120576fs1198892 119889 lt 1198890119897119864elec + 119897120576amp1198894 119889 ge 1198890

(1)

where 119864elec represents the energy consumption by a circuitprocessing a single bit data 120576fs denotes the coefficient ofpower amplifier in the free spacemodel 120576amp is the coefficientof multidiameter attenuation model of power amplifier and1198890 is the critical distance between free space propagationmodel and multipath attenuation model and is calculated asthe following formula

1198890 = radic 120576fs120576amp (2)

The energy consumption by the node receiving 119897 bit datais formalized as the following formula

119864Rx (119897) = 119864Rxminuselec (119897) = 119897119864elec (3)

4 Evidence-Efficient Cluster HeadRotation Mechanism

In this section we discuss the issue of CH rotation Firstwe think that the essence of CH election in clusteringtopology is equivalent to determining the cluster centroidsof cluster algorithms in data mining The Affinity Propa-gation (AP) [24] cluster algorithm is very prominent at itsperformance on carrying out large amount of data Thuswe employ the propagation mechanism in AP algorithmand study the scheme of CH rotation associated with it

Under sufficient consideration of several network factorsincluding the residual energy of nodes distance betweennodes energy consumption associated transmission distanceand amount of data and abstracting the capability of guaran-teeing transmission reliability in WSNs as the responsibilityand availability propagation between node-joint links themaximum sum of responsibility and availability is taken asthe accumulated evidence of CH rotation Namely if theaccumulated evidence of a node is relatively large then ithas a relatively high possibility of becoming a CH which isin charge of maintaining the node-joint links and ensuringtransmission reliability

Additionally since the energy efficiency is one of the crit-ical factors that influence the network lifetime in particularseveral new definitions with respect to the measurement orestimation of energy consumption are presented as follows

Definition 1 Node-Energy-Level (NEL) is used to measurethe energy consumption of nodes in the network NEL iscalculated as Formula (4)

NEL = (119864remain

119864init )1119873live (4)

where 119873live denotes the number of surviving nodes in thecurrent status of the network 119864init represents the initialenergy of a node 119864remain denotes the residual energy ofa node The meaning of NEL shows that the higher theresidual energy of a node the greater the value of the nodeenergy level (eg NEL) which indicates that the stronger thecurrent node activity the greater the coverage preservationas well as the better the quality of service (QoS) In contrastwhen the residual energy of nodes is lower the node energylevel is smaller which indicates that the smaller coveragepreservation and the worse QoS

Definition 2 The Energy-Cost EC(119894 119895) is defined as thefollowing formula

EC (119894 119895) = ET (119894 119895)119864remain119894

(5)

where 119864remain119894 denotes the current remainder energy of CH i

and ET(119894 119895) represents the real amount of energy consumedbyCH 119894 to transmit a unit data to CH j EC(119894 119895) only expressesa logical transmission overhead rather than a real metric ofenergy consumption Itsmeaning not only shows consideringthe energy consumption of the real data transmission butalso takes into account the residual energy level of nodesthemselves

Definition 3 119904(119894 119895) indicates the level of node j appropriatefor the cluster head to node i which is called the orientation-tended matrix and defined as the following formula

119904 (119894 119895) = minus(120572 lowast (119889 (119895 119861) lowast 119864remain

119895 )NEL + (1 minus 120572) lowast 119889 (119894 119895)) 119894 = 119895 120572 isin [0 1]119875 (119895) 119894 = 119895 (6)

Wireless Communications and Mobile Computing 5

whereB represents the base station119889(119894 119895) is the distance fromnode i to node j and with the Euclidean distance to express119889(119895 119861) is the distance between node j and base station119864remain

119895

is the current residual energy of node j NEL is the Node-Energy-Level (eg NEL) of the current node and is calculatedusing Formula (4) 120572 is a weight used to adjust the residualenergy and distance in the CH election scheme Usually anode with a larger value of 120572 and more remainder energyand closer to the base station is easier to become a CH 119875 isthe orientation-tended parameter that is the diagonal valuein the orientation-tended matrix defined as the followingformula

119875 (119894) = minusNEL times ( 119864init119894119864remain119894

) (7)

where 119864init119894 is the initial energy of node i It can be seen from

Formula (7) because the orientation-tended matrix is alwaysnegative Thus the more the residual energy of the node thegreater the value of the orientation-tended parameter 119875 aswell as the higher the probability that the node will becomethe CH

Based on the above this paper integrates inspirationson the broadcast nature of data transmission in WSNs andthe idea in AP algorithm Furthermore we give improve-ment recognition of the responsibility and availabilityrespectively

Definition 4 The eligibility evidence of a node as a clusterhead is quantified using the responsibility and availabilityThey are defined as follows

119903 (119894 119896) = 119904 (119894 119896) minusmax 119886 (119894 1198961015840) + 119904 (119894 1198961015840)(1198961015840 isin 1 2 119899 1198961015840 = 119896) (8)

119886 (119894 119896) = min0 119903 (119896 119896) +sum1198941015840

max 0 119903 (1198941015840 119896)(1198941015840 isin 1 2 119899 1198941015840 = 119894 1198941015840 = 119896)

(9)

where 119903(119894 119896) is the responsibility between node i and nodek If k is taken as the potential CH then responsibility istransmitted from node i to node k and is equivalent to theaccumulated evidence for node k to be the CH of node i119886(119894 119896) as the availability between node i and k transmits fromnode k to node i It implies the accumulated evidence fornode i to select node k as its CH Thus it measures whetherk can finally become the real CH after each cycle of self-adaptation

Formulas (8) and (9) iterate according to Formulas (10)and (11) respectively

119903new (119894 119896) = (1 minus 120582) 119903 (119894 119896) + 120582119903old (119894 119896) (10)

119886new (119894 119896) = (1 minus 120582) 119886 (119894 119896) + 120582119886old (119894 119896) (11)

where 120582 isin [0 1] is the learning rate in updating 119903(119894 119896) and119886(119894 119896) At the beginning of the iteration their initial valuesare set to ldquo0rdquo

Usually link losses and node failures are the primaryreasons to influence transmission reliability in WSNs unfor-tunately they are negatively affected bymanynetwork factorsIn this paper we take the availability and responsibility as thecomprehensive evidence against node failures and link losseswhich aims to improve the total performance includingtransmission reliability and other properties To this pointthe availability and responsibility provide a logical metric fornodes to guarantee transmission reliability

Furthermore in order to ensure the rationality of CHrotation and correctness of CH election mechanism we givethe following theorem and proof

Theorem 5 The greater the sum of responsibility and avail-ability the greater the possibility of a node to become a clusterhead

Proof The essence of a ldquoclusterrdquo in the clustering routingis similar to the ldquocluster analyzerdquo in the associated clusteralgorithms of datamining thus the CH election likes the pro-cedure of determining the cluster centroids in the algorithmsof dataminingMoreover the well-knownAP algorithm is anessential cluster algorithm and its cluster procedure is carriedout by the propagation of responsibility and availability inwhich the first critical business is to adaptively determinethe different cluster centroids according to the changeableorientation parameter The cluster procedure is iterativelyongoing until all of the data items are clustered This aboveidea is equivalent to the mechanism of the CH rotation inWSNs and equivalently applied in selecting the CHs that isthere exists a set of dynamic candidate CHs composed of alarge amount of nodes which correspond to the cluster cen-troids and are traversed by the propagation of responsibilityand availability In each cycle of the clustering the node-joint links build the interpath within a single cluster and thecluster head-joint links set up the intrapath between differentclusters During the propagation processing the availabilityand responsibility denote the capability of resisting nodesfailures and link losses as well as their propagation directionwhich guides the data transmission paths Obviously thegreater the sumof responsibility and availability is the greaterthe probability that a node becomes a CH would be Thetheorem is proved

Consequently in a real clustering phase each cycleincludes two phases cluster head election and clusteringThe two phases are periodically ongoing until any noderuns out of its energy The responsibility and availabilitytransmit themselves within nodes-joint links in the clusteringprocedureThe sumof ldquo119903(119894 119896)+119886(119894 119896)rdquo is adaptively changingThe larger the sumof 119903(119894 119896)+119886(119894 119896) the greater the probabilitythat the node k becomes aCH otherwise the node k is unableto become aCHNamely as for node 119894 it always selects node 119896that maximizes the sum of 119903(119894 119896) + 119886(119894 119896) Furthermore if 119894 =119896 node 119894 is the CH otherwise 119894 = 119896 node 119896 is the CH of nodei In combination with Definitions 1 2 and 3 and the above-mentioned analysis it indicates that the nodes with moreresidual energy and little amount of data to transmit have ahigh probability to be CHs Apparently the CHs election isan adaptive and dynamic process

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 3: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 3

cluster formation (EECF) protocol EECF elected the CHsfollowing a three-waymessage exchange between each sensorand its neighbors Sensorrsquos eligibility to be elected CH isbased on its residual energy and its degreeThus the messageexchanges complexity of 119874(1) and a worst-case convergencetime complexity of O(N)

Additionally some nonclustering routing methods ormodels [29 30] have also been published They also haveprominent performance on either or all aspects such asdegrading excessive communication energy consumptionprolonging the lifetime and enhancing the transmissionreliability

22 LEACH-Improved Clustering Routing The LEACH pro-tocol one of the first clustering routing protocols proposedfor WSNs is an adaptive distributed algorithm that formsclusters of sensors based on the received signal strength anduses local CHs as routers to the sink node [28] In LEACHeach node has an equivalent opportunity to become CHand through a random rotation of CHs LEACH provides abalance of energy consumption for each node However CHstransmit data directly to the sink node which can be energy-consuming in large-scale WSNs Power-efficient Gather-ing in Sensor Information Systems (PEGASIS) [31] andHierarchical-PEGASIS are two improvements of LEACHUnlike the existing multiple clusters in LEACH PEGASISand Hierarchical-PEGASIS constructed chains of sensornodes so that each sensor node is transmitted and receivedfrom a neighbor and only one node was selected from thatchain to transmit data to the sink node [28] Unfortunatelythe communication between the elected CH and the basestation is one-hop which may waste energy and prove to beunsuitable for large-scaleWSNs [28] Obviously they need tobe improved in-depth

Based on the LEACH algorithm two factors the energyand distance were cast into modifying the threshold func-tion of LEACH protocol a cluster head multihop routingimproved algorithm (CMRAOL) based on LEACH [21] wasproposed in which the multihop communication approachwas adopted and a reliable path was built between the CHsand the sink node the energy consumption of the networkwas effectively balanced but the CH election process wastoo complex Thus the algorithm was only suitable forstatic networks the improved low-energy adaptive clusteringhierarchy-centralized (LEACH-C) algorithm [13] sufficientlyconsidered two factors the energy and number of CHsThe energy consumption of each node improves to be morebalanced but the clustering overhead was too large

Additionally some of the existing clustering routingalgorithms [3 7 10 13 14] did not consider the residualenergy and the deployment location of nodes in responseto this deficiency several researches are carried out in theEBAPC algorithm [18] The EBAPC algorithm defined anew concept of fitness factor and employed the strategy ofcluster center determination inAP algorithm [24]The clustercenter determination strategy [24] was approximated as anelection scheme of the CHs with sufficient consideration ofthe residual energy of nodes In contrast to the previous algo-rithms the CH election was more reasonable and the energy

consumption got more balanced However the EBAPC algo-rithm did not regard the relation between the location ofthe base station and the entire energy consumption of thenetwork which easily leads to high energy consumption ofsome local nodes even premature death of some importantnodes affects the network lifetime and the service quality ofthe network the ELBC and BM-ELBC algorithm [19] basedon EBAPC algorithm were proposed respectively A newconcept of energy level with sufficient consideration of twofactors the residual energy of nodes and distance betweendifferent nodes was introduced the proposed algorithmsmade energy consumption more balanced and they signif-icantly prolonged the network lifetime However the defini-tion of energy level was relatively rough which easily spurredan unreasonable CH election such as taking the remotelyunreasonable nodes as the second level CHs This situationultimately affected the transmission efficiency and trans-mission delay as well as the network lifetime A clusteringrouting algorithm that introduces a new definition of nodecompetitiveness based on it was presented [20] The APBCSalgorithm made the node-joint clustering more uniform andmade the node deployment more reasonable However theAPBCS algorithm had not given an appropriate solutionscheme to satisfy the requirement of multihop transmissionscheme within the node-joint CHs as a result increasing theenergy consumption on some CHs When the scale of WSNsgets large it leads to the occurrence of a premature death forthe CHs such that it was unable to guarantee the coveragepreservation and network connectivity

The differences covered between the proposed EEMCRscheme and the previous researches include the following thenature of data transmission in WSNs is abstracted as propa-gation of responsibility and availability and the responsibilityand availability are taken as the accumulated evidence ofnodes for guaranteeing transmission reliability the responsi-bility and availability integrate comprehensive considerationson several network factors an evidence-efficient cluster headrotation mechanism and algorithm are presented backboneconstruction algorithm is developed to generate a minimumaggregation tree essentially the branches inside the gen-erated minimum aggregation tree construct the multihopcommunication paths The experimental results show thatthere exists a remarkable improvement on prolonging thenetwork lifetime postponing the death of nodes savingenergy and conducting coverage preservation

3 Assumptions and Models

31 System Assumptions Assuming that 119899 nodes are ran-domly deployed in a target area in which each node hasthe same configuration and data processing capability thelocation of each node is known-available Additionally thispaper makes the following assumptions(1) All the sensor nodes in the system have the sameorganization and initial energy 1198640(2) All sensor nodes adaptively adjust the transmissionpower according to their need

4 Wireless Communications and Mobile Computing

Amplifiercircuit

Transmittingcircuit

Receivingcircuit

d

l bit data l bit data

EF= times l EF= times lGJ times l times dn

E28(l d)ET8(l d)

Figure 2 Wireless transceiver circuit energy consumption model

32 Communication Model In this paper a well-knowncommon first-order wireless energy consumptionmodel [32]is employed which is shown in Figure 2

With respect to the abovemodel the energy consumptionof transmitting l bit data is composed of transmission circuitpower and power amplification losses Different power con-sumption models are employed with different distances andthe energy consumption of transmitting l bit data by nodescan be calculated by the following formula

119864TX (119897 119889) = 119864TX elec (119897) + 119864TX amp (119897 119889)=

119897119864elec + 119897120576fs1198892 119889 lt 1198890119897119864elec + 119897120576amp1198894 119889 ge 1198890

(1)

where 119864elec represents the energy consumption by a circuitprocessing a single bit data 120576fs denotes the coefficient ofpower amplifier in the free spacemodel 120576amp is the coefficientof multidiameter attenuation model of power amplifier and1198890 is the critical distance between free space propagationmodel and multipath attenuation model and is calculated asthe following formula

1198890 = radic 120576fs120576amp (2)

The energy consumption by the node receiving 119897 bit datais formalized as the following formula

119864Rx (119897) = 119864Rxminuselec (119897) = 119897119864elec (3)

4 Evidence-Efficient Cluster HeadRotation Mechanism

In this section we discuss the issue of CH rotation Firstwe think that the essence of CH election in clusteringtopology is equivalent to determining the cluster centroidsof cluster algorithms in data mining The Affinity Propa-gation (AP) [24] cluster algorithm is very prominent at itsperformance on carrying out large amount of data Thuswe employ the propagation mechanism in AP algorithmand study the scheme of CH rotation associated with it

Under sufficient consideration of several network factorsincluding the residual energy of nodes distance betweennodes energy consumption associated transmission distanceand amount of data and abstracting the capability of guaran-teeing transmission reliability in WSNs as the responsibilityand availability propagation between node-joint links themaximum sum of responsibility and availability is taken asthe accumulated evidence of CH rotation Namely if theaccumulated evidence of a node is relatively large then ithas a relatively high possibility of becoming a CH which isin charge of maintaining the node-joint links and ensuringtransmission reliability

Additionally since the energy efficiency is one of the crit-ical factors that influence the network lifetime in particularseveral new definitions with respect to the measurement orestimation of energy consumption are presented as follows

Definition 1 Node-Energy-Level (NEL) is used to measurethe energy consumption of nodes in the network NEL iscalculated as Formula (4)

NEL = (119864remain

119864init )1119873live (4)

where 119873live denotes the number of surviving nodes in thecurrent status of the network 119864init represents the initialenergy of a node 119864remain denotes the residual energy ofa node The meaning of NEL shows that the higher theresidual energy of a node the greater the value of the nodeenergy level (eg NEL) which indicates that the stronger thecurrent node activity the greater the coverage preservationas well as the better the quality of service (QoS) In contrastwhen the residual energy of nodes is lower the node energylevel is smaller which indicates that the smaller coveragepreservation and the worse QoS

Definition 2 The Energy-Cost EC(119894 119895) is defined as thefollowing formula

EC (119894 119895) = ET (119894 119895)119864remain119894

(5)

where 119864remain119894 denotes the current remainder energy of CH i

and ET(119894 119895) represents the real amount of energy consumedbyCH 119894 to transmit a unit data to CH j EC(119894 119895) only expressesa logical transmission overhead rather than a real metric ofenergy consumption Itsmeaning not only shows consideringthe energy consumption of the real data transmission butalso takes into account the residual energy level of nodesthemselves

Definition 3 119904(119894 119895) indicates the level of node j appropriatefor the cluster head to node i which is called the orientation-tended matrix and defined as the following formula

119904 (119894 119895) = minus(120572 lowast (119889 (119895 119861) lowast 119864remain

119895 )NEL + (1 minus 120572) lowast 119889 (119894 119895)) 119894 = 119895 120572 isin [0 1]119875 (119895) 119894 = 119895 (6)

Wireless Communications and Mobile Computing 5

whereB represents the base station119889(119894 119895) is the distance fromnode i to node j and with the Euclidean distance to express119889(119895 119861) is the distance between node j and base station119864remain

119895

is the current residual energy of node j NEL is the Node-Energy-Level (eg NEL) of the current node and is calculatedusing Formula (4) 120572 is a weight used to adjust the residualenergy and distance in the CH election scheme Usually anode with a larger value of 120572 and more remainder energyand closer to the base station is easier to become a CH 119875 isthe orientation-tended parameter that is the diagonal valuein the orientation-tended matrix defined as the followingformula

119875 (119894) = minusNEL times ( 119864init119894119864remain119894

) (7)

where 119864init119894 is the initial energy of node i It can be seen from

Formula (7) because the orientation-tended matrix is alwaysnegative Thus the more the residual energy of the node thegreater the value of the orientation-tended parameter 119875 aswell as the higher the probability that the node will becomethe CH

Based on the above this paper integrates inspirationson the broadcast nature of data transmission in WSNs andthe idea in AP algorithm Furthermore we give improve-ment recognition of the responsibility and availabilityrespectively

Definition 4 The eligibility evidence of a node as a clusterhead is quantified using the responsibility and availabilityThey are defined as follows

119903 (119894 119896) = 119904 (119894 119896) minusmax 119886 (119894 1198961015840) + 119904 (119894 1198961015840)(1198961015840 isin 1 2 119899 1198961015840 = 119896) (8)

119886 (119894 119896) = min0 119903 (119896 119896) +sum1198941015840

max 0 119903 (1198941015840 119896)(1198941015840 isin 1 2 119899 1198941015840 = 119894 1198941015840 = 119896)

(9)

where 119903(119894 119896) is the responsibility between node i and nodek If k is taken as the potential CH then responsibility istransmitted from node i to node k and is equivalent to theaccumulated evidence for node k to be the CH of node i119886(119894 119896) as the availability between node i and k transmits fromnode k to node i It implies the accumulated evidence fornode i to select node k as its CH Thus it measures whetherk can finally become the real CH after each cycle of self-adaptation

Formulas (8) and (9) iterate according to Formulas (10)and (11) respectively

119903new (119894 119896) = (1 minus 120582) 119903 (119894 119896) + 120582119903old (119894 119896) (10)

119886new (119894 119896) = (1 minus 120582) 119886 (119894 119896) + 120582119886old (119894 119896) (11)

where 120582 isin [0 1] is the learning rate in updating 119903(119894 119896) and119886(119894 119896) At the beginning of the iteration their initial valuesare set to ldquo0rdquo

Usually link losses and node failures are the primaryreasons to influence transmission reliability in WSNs unfor-tunately they are negatively affected bymanynetwork factorsIn this paper we take the availability and responsibility as thecomprehensive evidence against node failures and link losseswhich aims to improve the total performance includingtransmission reliability and other properties To this pointthe availability and responsibility provide a logical metric fornodes to guarantee transmission reliability

Furthermore in order to ensure the rationality of CHrotation and correctness of CH election mechanism we givethe following theorem and proof

Theorem 5 The greater the sum of responsibility and avail-ability the greater the possibility of a node to become a clusterhead

Proof The essence of a ldquoclusterrdquo in the clustering routingis similar to the ldquocluster analyzerdquo in the associated clusteralgorithms of datamining thus the CH election likes the pro-cedure of determining the cluster centroids in the algorithmsof dataminingMoreover the well-knownAP algorithm is anessential cluster algorithm and its cluster procedure is carriedout by the propagation of responsibility and availability inwhich the first critical business is to adaptively determinethe different cluster centroids according to the changeableorientation parameter The cluster procedure is iterativelyongoing until all of the data items are clustered This aboveidea is equivalent to the mechanism of the CH rotation inWSNs and equivalently applied in selecting the CHs that isthere exists a set of dynamic candidate CHs composed of alarge amount of nodes which correspond to the cluster cen-troids and are traversed by the propagation of responsibilityand availability In each cycle of the clustering the node-joint links build the interpath within a single cluster and thecluster head-joint links set up the intrapath between differentclusters During the propagation processing the availabilityand responsibility denote the capability of resisting nodesfailures and link losses as well as their propagation directionwhich guides the data transmission paths Obviously thegreater the sumof responsibility and availability is the greaterthe probability that a node becomes a CH would be Thetheorem is proved

Consequently in a real clustering phase each cycleincludes two phases cluster head election and clusteringThe two phases are periodically ongoing until any noderuns out of its energy The responsibility and availabilitytransmit themselves within nodes-joint links in the clusteringprocedureThe sumof ldquo119903(119894 119896)+119886(119894 119896)rdquo is adaptively changingThe larger the sumof 119903(119894 119896)+119886(119894 119896) the greater the probabilitythat the node k becomes aCH otherwise the node k is unableto become aCHNamely as for node 119894 it always selects node 119896that maximizes the sum of 119903(119894 119896) + 119886(119894 119896) Furthermore if 119894 =119896 node 119894 is the CH otherwise 119894 = 119896 node 119896 is the CH of nodei In combination with Definitions 1 2 and 3 and the above-mentioned analysis it indicates that the nodes with moreresidual energy and little amount of data to transmit have ahigh probability to be CHs Apparently the CHs election isan adaptive and dynamic process

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 4: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

4 Wireless Communications and Mobile Computing

Amplifiercircuit

Transmittingcircuit

Receivingcircuit

d

l bit data l bit data

EF= times l EF= times lGJ times l times dn

E28(l d)ET8(l d)

Figure 2 Wireless transceiver circuit energy consumption model

32 Communication Model In this paper a well-knowncommon first-order wireless energy consumptionmodel [32]is employed which is shown in Figure 2

With respect to the abovemodel the energy consumptionof transmitting l bit data is composed of transmission circuitpower and power amplification losses Different power con-sumption models are employed with different distances andthe energy consumption of transmitting l bit data by nodescan be calculated by the following formula

119864TX (119897 119889) = 119864TX elec (119897) + 119864TX amp (119897 119889)=

119897119864elec + 119897120576fs1198892 119889 lt 1198890119897119864elec + 119897120576amp1198894 119889 ge 1198890

(1)

where 119864elec represents the energy consumption by a circuitprocessing a single bit data 120576fs denotes the coefficient ofpower amplifier in the free spacemodel 120576amp is the coefficientof multidiameter attenuation model of power amplifier and1198890 is the critical distance between free space propagationmodel and multipath attenuation model and is calculated asthe following formula

1198890 = radic 120576fs120576amp (2)

The energy consumption by the node receiving 119897 bit datais formalized as the following formula

119864Rx (119897) = 119864Rxminuselec (119897) = 119897119864elec (3)

4 Evidence-Efficient Cluster HeadRotation Mechanism

In this section we discuss the issue of CH rotation Firstwe think that the essence of CH election in clusteringtopology is equivalent to determining the cluster centroidsof cluster algorithms in data mining The Affinity Propa-gation (AP) [24] cluster algorithm is very prominent at itsperformance on carrying out large amount of data Thuswe employ the propagation mechanism in AP algorithmand study the scheme of CH rotation associated with it

Under sufficient consideration of several network factorsincluding the residual energy of nodes distance betweennodes energy consumption associated transmission distanceand amount of data and abstracting the capability of guaran-teeing transmission reliability in WSNs as the responsibilityand availability propagation between node-joint links themaximum sum of responsibility and availability is taken asthe accumulated evidence of CH rotation Namely if theaccumulated evidence of a node is relatively large then ithas a relatively high possibility of becoming a CH which isin charge of maintaining the node-joint links and ensuringtransmission reliability

Additionally since the energy efficiency is one of the crit-ical factors that influence the network lifetime in particularseveral new definitions with respect to the measurement orestimation of energy consumption are presented as follows

Definition 1 Node-Energy-Level (NEL) is used to measurethe energy consumption of nodes in the network NEL iscalculated as Formula (4)

NEL = (119864remain

119864init )1119873live (4)

where 119873live denotes the number of surviving nodes in thecurrent status of the network 119864init represents the initialenergy of a node 119864remain denotes the residual energy ofa node The meaning of NEL shows that the higher theresidual energy of a node the greater the value of the nodeenergy level (eg NEL) which indicates that the stronger thecurrent node activity the greater the coverage preservationas well as the better the quality of service (QoS) In contrastwhen the residual energy of nodes is lower the node energylevel is smaller which indicates that the smaller coveragepreservation and the worse QoS

Definition 2 The Energy-Cost EC(119894 119895) is defined as thefollowing formula

EC (119894 119895) = ET (119894 119895)119864remain119894

(5)

where 119864remain119894 denotes the current remainder energy of CH i

and ET(119894 119895) represents the real amount of energy consumedbyCH 119894 to transmit a unit data to CH j EC(119894 119895) only expressesa logical transmission overhead rather than a real metric ofenergy consumption Itsmeaning not only shows consideringthe energy consumption of the real data transmission butalso takes into account the residual energy level of nodesthemselves

Definition 3 119904(119894 119895) indicates the level of node j appropriatefor the cluster head to node i which is called the orientation-tended matrix and defined as the following formula

119904 (119894 119895) = minus(120572 lowast (119889 (119895 119861) lowast 119864remain

119895 )NEL + (1 minus 120572) lowast 119889 (119894 119895)) 119894 = 119895 120572 isin [0 1]119875 (119895) 119894 = 119895 (6)

Wireless Communications and Mobile Computing 5

whereB represents the base station119889(119894 119895) is the distance fromnode i to node j and with the Euclidean distance to express119889(119895 119861) is the distance between node j and base station119864remain

119895

is the current residual energy of node j NEL is the Node-Energy-Level (eg NEL) of the current node and is calculatedusing Formula (4) 120572 is a weight used to adjust the residualenergy and distance in the CH election scheme Usually anode with a larger value of 120572 and more remainder energyand closer to the base station is easier to become a CH 119875 isthe orientation-tended parameter that is the diagonal valuein the orientation-tended matrix defined as the followingformula

119875 (119894) = minusNEL times ( 119864init119894119864remain119894

) (7)

where 119864init119894 is the initial energy of node i It can be seen from

Formula (7) because the orientation-tended matrix is alwaysnegative Thus the more the residual energy of the node thegreater the value of the orientation-tended parameter 119875 aswell as the higher the probability that the node will becomethe CH

Based on the above this paper integrates inspirationson the broadcast nature of data transmission in WSNs andthe idea in AP algorithm Furthermore we give improve-ment recognition of the responsibility and availabilityrespectively

Definition 4 The eligibility evidence of a node as a clusterhead is quantified using the responsibility and availabilityThey are defined as follows

119903 (119894 119896) = 119904 (119894 119896) minusmax 119886 (119894 1198961015840) + 119904 (119894 1198961015840)(1198961015840 isin 1 2 119899 1198961015840 = 119896) (8)

119886 (119894 119896) = min0 119903 (119896 119896) +sum1198941015840

max 0 119903 (1198941015840 119896)(1198941015840 isin 1 2 119899 1198941015840 = 119894 1198941015840 = 119896)

(9)

where 119903(119894 119896) is the responsibility between node i and nodek If k is taken as the potential CH then responsibility istransmitted from node i to node k and is equivalent to theaccumulated evidence for node k to be the CH of node i119886(119894 119896) as the availability between node i and k transmits fromnode k to node i It implies the accumulated evidence fornode i to select node k as its CH Thus it measures whetherk can finally become the real CH after each cycle of self-adaptation

Formulas (8) and (9) iterate according to Formulas (10)and (11) respectively

119903new (119894 119896) = (1 minus 120582) 119903 (119894 119896) + 120582119903old (119894 119896) (10)

119886new (119894 119896) = (1 minus 120582) 119886 (119894 119896) + 120582119886old (119894 119896) (11)

where 120582 isin [0 1] is the learning rate in updating 119903(119894 119896) and119886(119894 119896) At the beginning of the iteration their initial valuesare set to ldquo0rdquo

Usually link losses and node failures are the primaryreasons to influence transmission reliability in WSNs unfor-tunately they are negatively affected bymanynetwork factorsIn this paper we take the availability and responsibility as thecomprehensive evidence against node failures and link losseswhich aims to improve the total performance includingtransmission reliability and other properties To this pointthe availability and responsibility provide a logical metric fornodes to guarantee transmission reliability

Furthermore in order to ensure the rationality of CHrotation and correctness of CH election mechanism we givethe following theorem and proof

Theorem 5 The greater the sum of responsibility and avail-ability the greater the possibility of a node to become a clusterhead

Proof The essence of a ldquoclusterrdquo in the clustering routingis similar to the ldquocluster analyzerdquo in the associated clusteralgorithms of datamining thus the CH election likes the pro-cedure of determining the cluster centroids in the algorithmsof dataminingMoreover the well-knownAP algorithm is anessential cluster algorithm and its cluster procedure is carriedout by the propagation of responsibility and availability inwhich the first critical business is to adaptively determinethe different cluster centroids according to the changeableorientation parameter The cluster procedure is iterativelyongoing until all of the data items are clustered This aboveidea is equivalent to the mechanism of the CH rotation inWSNs and equivalently applied in selecting the CHs that isthere exists a set of dynamic candidate CHs composed of alarge amount of nodes which correspond to the cluster cen-troids and are traversed by the propagation of responsibilityand availability In each cycle of the clustering the node-joint links build the interpath within a single cluster and thecluster head-joint links set up the intrapath between differentclusters During the propagation processing the availabilityand responsibility denote the capability of resisting nodesfailures and link losses as well as their propagation directionwhich guides the data transmission paths Obviously thegreater the sumof responsibility and availability is the greaterthe probability that a node becomes a CH would be Thetheorem is proved

Consequently in a real clustering phase each cycleincludes two phases cluster head election and clusteringThe two phases are periodically ongoing until any noderuns out of its energy The responsibility and availabilitytransmit themselves within nodes-joint links in the clusteringprocedureThe sumof ldquo119903(119894 119896)+119886(119894 119896)rdquo is adaptively changingThe larger the sumof 119903(119894 119896)+119886(119894 119896) the greater the probabilitythat the node k becomes aCH otherwise the node k is unableto become aCHNamely as for node 119894 it always selects node 119896that maximizes the sum of 119903(119894 119896) + 119886(119894 119896) Furthermore if 119894 =119896 node 119894 is the CH otherwise 119894 = 119896 node 119896 is the CH of nodei In combination with Definitions 1 2 and 3 and the above-mentioned analysis it indicates that the nodes with moreresidual energy and little amount of data to transmit have ahigh probability to be CHs Apparently the CHs election isan adaptive and dynamic process

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 5: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 5

whereB represents the base station119889(119894 119895) is the distance fromnode i to node j and with the Euclidean distance to express119889(119895 119861) is the distance between node j and base station119864remain

119895

is the current residual energy of node j NEL is the Node-Energy-Level (eg NEL) of the current node and is calculatedusing Formula (4) 120572 is a weight used to adjust the residualenergy and distance in the CH election scheme Usually anode with a larger value of 120572 and more remainder energyand closer to the base station is easier to become a CH 119875 isthe orientation-tended parameter that is the diagonal valuein the orientation-tended matrix defined as the followingformula

119875 (119894) = minusNEL times ( 119864init119894119864remain119894

) (7)

where 119864init119894 is the initial energy of node i It can be seen from

Formula (7) because the orientation-tended matrix is alwaysnegative Thus the more the residual energy of the node thegreater the value of the orientation-tended parameter 119875 aswell as the higher the probability that the node will becomethe CH

Based on the above this paper integrates inspirationson the broadcast nature of data transmission in WSNs andthe idea in AP algorithm Furthermore we give improve-ment recognition of the responsibility and availabilityrespectively

Definition 4 The eligibility evidence of a node as a clusterhead is quantified using the responsibility and availabilityThey are defined as follows

119903 (119894 119896) = 119904 (119894 119896) minusmax 119886 (119894 1198961015840) + 119904 (119894 1198961015840)(1198961015840 isin 1 2 119899 1198961015840 = 119896) (8)

119886 (119894 119896) = min0 119903 (119896 119896) +sum1198941015840

max 0 119903 (1198941015840 119896)(1198941015840 isin 1 2 119899 1198941015840 = 119894 1198941015840 = 119896)

(9)

where 119903(119894 119896) is the responsibility between node i and nodek If k is taken as the potential CH then responsibility istransmitted from node i to node k and is equivalent to theaccumulated evidence for node k to be the CH of node i119886(119894 119896) as the availability between node i and k transmits fromnode k to node i It implies the accumulated evidence fornode i to select node k as its CH Thus it measures whetherk can finally become the real CH after each cycle of self-adaptation

Formulas (8) and (9) iterate according to Formulas (10)and (11) respectively

119903new (119894 119896) = (1 minus 120582) 119903 (119894 119896) + 120582119903old (119894 119896) (10)

119886new (119894 119896) = (1 minus 120582) 119886 (119894 119896) + 120582119886old (119894 119896) (11)

where 120582 isin [0 1] is the learning rate in updating 119903(119894 119896) and119886(119894 119896) At the beginning of the iteration their initial valuesare set to ldquo0rdquo

Usually link losses and node failures are the primaryreasons to influence transmission reliability in WSNs unfor-tunately they are negatively affected bymanynetwork factorsIn this paper we take the availability and responsibility as thecomprehensive evidence against node failures and link losseswhich aims to improve the total performance includingtransmission reliability and other properties To this pointthe availability and responsibility provide a logical metric fornodes to guarantee transmission reliability

Furthermore in order to ensure the rationality of CHrotation and correctness of CH election mechanism we givethe following theorem and proof

Theorem 5 The greater the sum of responsibility and avail-ability the greater the possibility of a node to become a clusterhead

Proof The essence of a ldquoclusterrdquo in the clustering routingis similar to the ldquocluster analyzerdquo in the associated clusteralgorithms of datamining thus the CH election likes the pro-cedure of determining the cluster centroids in the algorithmsof dataminingMoreover the well-knownAP algorithm is anessential cluster algorithm and its cluster procedure is carriedout by the propagation of responsibility and availability inwhich the first critical business is to adaptively determinethe different cluster centroids according to the changeableorientation parameter The cluster procedure is iterativelyongoing until all of the data items are clustered This aboveidea is equivalent to the mechanism of the CH rotation inWSNs and equivalently applied in selecting the CHs that isthere exists a set of dynamic candidate CHs composed of alarge amount of nodes which correspond to the cluster cen-troids and are traversed by the propagation of responsibilityand availability In each cycle of the clustering the node-joint links build the interpath within a single cluster and thecluster head-joint links set up the intrapath between differentclusters During the propagation processing the availabilityand responsibility denote the capability of resisting nodesfailures and link losses as well as their propagation directionwhich guides the data transmission paths Obviously thegreater the sumof responsibility and availability is the greaterthe probability that a node becomes a CH would be Thetheorem is proved

Consequently in a real clustering phase each cycleincludes two phases cluster head election and clusteringThe two phases are periodically ongoing until any noderuns out of its energy The responsibility and availabilitytransmit themselves within nodes-joint links in the clusteringprocedureThe sumof ldquo119903(119894 119896)+119886(119894 119896)rdquo is adaptively changingThe larger the sumof 119903(119894 119896)+119886(119894 119896) the greater the probabilitythat the node k becomes aCH otherwise the node k is unableto become aCHNamely as for node 119894 it always selects node 119896that maximizes the sum of 119903(119894 119896) + 119886(119894 119896) Furthermore if 119894 =119896 node 119894 is the CH otherwise 119894 = 119896 node 119896 is the CH of nodei In combination with Definitions 1 2 and 3 and the above-mentioned analysis it indicates that the nodes with moreresidual energy and little amount of data to transmit have ahigh probability to be CHs Apparently the CHs election isan adaptive and dynamic process

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 6: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

6 Wireless Communications and Mobile Computing

InputMax iterations IterMaxOutput Candidate cluster head nodes(1) Calculate NEL according to Formula (4) and send the NEL value to sink node(2) Sink node calculate the 119878 and 119875 according to Formula (6) amp (7) respectively(3) Sink node broadcast the 119878 and 119875(4) Set119872119886119909 = 0(5) while (Current iterations 119868119905119890119903 lt 119868119905119890119903119872119886119909)(6) Calculate 119903(119894 119895) and 119886(119894 119895) according to Formula (8) amp (9) amp (10) amp (11)(7) Obtain node k with max(119886(119894 119896) + 119903(119894 119896)) for node i(8) if 119894 = 119896(9) Node i is the cluster head(10) else if 119894 = 119896(11) Node k is the cluster head of node i(12) end(13) Current iterations 119868119905119890119903 = 119868119905119890119903 + 1(14) end

Algorithm 1 Clustering

Lemma 6 The propagation direction of responsibility andavailability as themultihop transmission path effectively avoidthe node failures

Proof Use reduction to absurdity to prove it From theperspective of the definition of responsibility and availabilityas long as a node fails in the network its availability auto-matically gets ldquo0rdquo and the associated responsibility of it alsobecomes ldquo0rdquo that is the responsibility or availability does notcontinuously spread along such a path including these nodesThus the lemma is proved

Lemma 7 The termination condition for the propagation ofresponsibility and availability is the energy exhaustion of anynode in the network

Proof As it can be seen from the aforementioned Definitions1 2 3 and 4 once the energy of a node in the network getsldquo0rdquo then its corresponding orientation-tended parameterbecomes ldquo0rdquo As long as the orientation-tended parameter isldquo0rdquo the node is unlikely to be elected as the CH in the nextcycle of clustering Similarly we can see that once the energyof all nodes in the network gets ldquo0rdquo the transmission of theresponsibility and availability is automatically terminated

Evidently the aforementioned description is a globalelection scheme for CH rotation Namely all of the runningnodes also have the same opportunity to become candidateCHs regardlesswhether they used to beCHs or notUndoubt-edly this scheme is helpful to achieve balance in energyconsumption of each node and prevent the premature deathof any node thereby guaranteeing coverage preservation andprolonging the network lifetime

5 EEMCR Routing Scheme

In this section we talk about the proposed EEMCR routingscheme in detail Exactly EEMCR scheme inherits the basicframework of LEACH algorithm which hybrids the basic

processing of clustering and data transmission within eachcycle In fact EEMCR scheme integrates several subalgo-rithms on CH rotation and backbone construction suchhybridization subalgorithms are ongoing in an iterationmode and they finally complete multihop clustering routingThe details of each subalgorithm are discussed in the follow-ing parts respectively

51 Clustering The EEMCR conducts the clustering in themechanism of iteration cycle by cycle which is similar tothat in LEACH algorithm However the LEACH protocolrandomly replaces the CHs in each cycle of iteration incontrast the EEMCR method adaptively updates the CHsaccording to the accumulated evidence of each node In theinitial stage of each cycle for the proposed EEMCR the basestation calculates the orientation-tended matrix of the nodesin terms of the Formula (6) and broadcasts it to all nodesThenodes that successfully receive the orientation-tendedmatrixcalculate their own responsibility and availability accordingto Formulas (8) and (9) At the same time for any node i thealgorithm takes the node k thatmaximizes the sum of 119903(119894 119896)+119886(119894 119896) as the CH in the current cycle of iteration Along withthe ongoing iteration each node updates its responsibilityand availability according to Formulas (10) and (11) until thedemands of iterations or the convergence of the algorithm isachieved

Summarizing the above steps describes the clusteringalgorithm as shown in Algorithm 1

Theorem 8 The time complexity of clustering algorithm is119874(119899)Proof The termination condition of Algorithm 1 is either thenumber of iterations exceeds the set threshold or the CHswithout any ongoing changes Obviously there is no negativeimpact on the complexity of the algorithm Therefore thetime complexity of Algorithm 1 is also 119874(119899)

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 7: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 7

(1) Qlarr 0 lowast Initialization Q is the set of theminimum aggregation tree(2) for each path 119890(119894 119895) isin 119866 lowastG represents the node set of the candidate cluster heads(3) Sort the path 119890(119894 119895) into an increasing order by weight EC(119894 119895)(4) end(5) for each 119890(119894 119895) isin 119866 taken in an ascending order by weight EC(119894 119895)(6) if 119890(119894 119895) notin 119876ampampNo loop then(7) Qlarr 119876 cup 119890(119894 119895)(8) end(9) end(10) return Q

Algorithm 2 Backbone construction

52 Backbone Construction Backbone construction essen-tially consists of generating minimum aggregation tree andminimum aggregation tree-based multihop communicationpaths according to graph theory On the other hand the mul-tihop transmission path selection problem is very complexThe following theorem is given firstly

Theorem 9 Multihop routing with respect to the cluster headsin WSNs is an NP-complete problem

Proof At the stage of building the minimum aggregationtree the energy consumption of each CH depends on itsEC (eg Definition 2) with its neighbor CHs It can beseen from Definition 2 that the EC of a CH is determinedby its residual energy and its distance to the neighbor-adjacent CHs Therefore in order to minimize the energyconsumption and improve the transmission reliability weneed to find a spanning tree so that the number of its neighborCHs for eachCH is the smallest and the interdistance betweenthe different CHs is the shortest Namely it is necessary tofind a minimum spanning tree Garey and Johnson [33] haveproved that the minimum spanning tree problem is an NP-complete problem

Additionally the well-known Kruskal algorithm in thefield of graph theory is suitable for solving the NP-completeproblems [23] In this paper we also employ it to conductthe issue of multihop routing selection within CHs to tryto achieve an approximate solution for it In fact the goalis to construct the connected graph with Kruskal algorithmin which the selected child nodes from the candidate CHstake the value of the EC as the vertexes (eg Definition 2)between a pairwise of the selected nodes and the weight onthe corresponding edge Finally the essence of the multihopcommunication path construction is to generate an aggrega-tion tree from the connected graph of which the edge with arelative minimum weight is the criteria for selection namelyselecting the edges from the graph to build a tree accordingto the ascending order of the weight Once a single edge witha relatively small weight is selected and the currently selectededge with the previously selected edges does not form a loopthen it is preserved in the generated tree otherwise the latestselected edge is removed As a result it finally obtains a treewith 119899clusterminus1 items of edgesThus the theorem is proved

Furthermore the construction of multihop communi-cation paths within the candidate CHs is as follows firstusing the proposed Algorithm 1 to determine the candidateCHs second the selected CH nodes deliver a status messageto the base station The status message is expressed as aframe of 119899119900119889119890 119868119863 119899119900119889119890 119903119890119904119894119889119906119886119897 119890119899119890119903g119910 119897119900119888119886119905119894119900119899 thirdthe base station calculates the EC between the CHs basedon the received status messages and broadcasts the obtainedEC information to all of the CHs finally the CHs that havereceived the broadcasting message from the base stationcooperatively construct an aggregation tree whose root nodeis the base station Consequently the data can be transmittedto the base station with a multihop transmission approachalong the paths inside the generated aggregation tree theforwarded data get to the base station along the branchesfrom the leaves to the root inside the generated aggregationtree Essentially the built aggregation tree is the backboneconstruction

In summary backbone construction algorithm is pre-sented as shown in Algorithm 2

Theorem 10 The generated tree conducted by the Kruskal-based method is a minimum aggregation tree

Since the typical Kruskal algorithm targets to find anundistorted minimum aggregation tree thus we use thereduction to absurdity to prove theTheorem 10

Proof Assuming that there exists a really minimum aggre-gation tree 1198791 in the network in contrast 1198792 is anotheraggregation tree obtained by the Kruskal algorithm and 1198791 =1198792 thus there is at least one path e that falls inside 1198792 ratherthan 1198791 If the path e is removed from 1198792 1198792 becomes twoparts of nonconnected subtrees which are denoted by 119879119886 and119879119887 respectively On the other hand there must be a path 119891existing in 1198792 of which one of the vertex of 119891 is located in119879119886 and the other one is located in 119879119887 satisfying the conditionEC(119891) lt EC(119890) Furthermore it is impossible to select path edue to the EC(119891) lt EC(119890) in contrast the path119891 is preferablyselected according to the Kruskal-associated aggregation treegeneration method Under the worst situation if the path eis forced to join the connected subsets the loop inevitablyemerges This result is in contradiction with the basic idea of

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 8: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

8 Wireless Communications and Mobile Computing

(1) Initializing network parameters(2) Sink node collects all the related parameters of the nodes in the network(3) if sink node receives all the relevant parameters of the nodes in the network(4) call Algorithm 1(5) call Algoithm 2(6) end(7) Sink node broadcasts cluster head information and minimum aggregation tree information(8) for each node i received the cluster head information and minimum aggregation tree information(9) if (node i is the CH)(10) Find the next hop (eg cluster head) from the clues in the minimum aggregation tree(11) else(12) Find its cluster head from the candidate cluster heads(13) end(14) end(15) for each member of a cluster in the network(16) Performing data transmission by single-hop mode(17) end(18) for each CH in the network(19) Performing data forwarding(20) end

Algorithm 3 EEMCR method

the Kruskal algorithm Namely only when 1198791 = 1198792 holdsTheorem 10 is correct Proof is completed

Based on the above analysis and proof under the consid-eration of building a new tree denoted as 1198793 1198793 satisfies thefollowing formula

1198793 = 1198792 minus 119890 + 119891 (12)which implies that using path 119891 connects 119879119886 and 119879119887 Incontrast 1198793 is the finally generated aggregation tree using theKruskal-based method It is easy to find that the EC of 1198793 isless than that of 1198792 which implies retaining the edge with asmall weight of EC and removing the edge with a large weightof EC Similarly as for m different paths which exist in 1198791and 1198792 the minimum aggregation tree 1198791 can be successfullyachieved by m times of the transformations like the abovesteps Namely the agglomeration trees in the network canbe transformed into the minimized aggregation tree by theKruskal-like algorithm that is the minimum aggregationtree 1198791 must be available

53 Evidence-Efficient Multihop Clustering Routing SchemeHybridizing the aforementioned Algorithm 1 Algorithm 2and some necessary steps are described as an evidence-efficient multihop clustering routing (EEMCR) method asshown in Algorithm 3 In Algorithm 3 to the intraclustercommunication the CH and its members communicatedirectly with single-hop transmission mode whereas themultihop communication approach is examinedwithin inter-clusters

Theorem 11 The time complexity of EEMCR scheme is119874(119899 log 119899)Proof Assuming the connected graph 119866(119881 119864) with 119899119905 ver-tices and 119899119890 edges using results from the process of building

the minimum aggregation tree according to the Kruskalalgorithm and the weight of each edge is the correspondingEC (eg Definition 2) Firstly since the Kruskal algorithmbuilds a subgraph with only 119899119905 vertices without any edge atthis time this subgraph can be equivalently regarded as aforest with 119899119905 items of trees and the vertices in the subgraphare taken as the root node of each tree respectively Thenthe Kruskal algorithm selects an edge from the candidate setof edges in the network with the relative smallest weightand if the two vertices of the selected edges belong to twoitems of different trees the two pieces of trees are combinedas a new tree by connecting the two vertices that is theselected edge is added to the subgraph In contrast if thetwo vertices of the selected edge have fallen into the sametree the selected edge is not desirable instead the next edgewith the relative smallest weight is tried continuously Thissimilar process continues until there remains only one treein the forest that is the built subgraph contains 119899119905 minus 1 itemsof edges Consequently EEMCR scheme just scans the 119899119890items of edges at most once and selecting the edge with theminimum EC requires only the time of 119874(119899 log 119899) Thus thetime complexity of Kruskal-basedminimum aggregation treegeneration method is 119874(119899 log 119899)

In summary since the time complexity of clustering is119874(119899) and the time complexity of backbone constructionis 119874(119899 log 119899) the time complexity of EEMCR method is119874(119899 log 119899)6 Experimental Analysis and Comparison

In this section several experiments are arranged to validatethe effectiveness and efficiency of the proposed methodfrom different aspects The parameters configured in thesimulation experiments are shown in Table 1 All of theexperiments are realized using Matlab R2010b

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 9: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 9

0 50 100 1500

102030405060708090

100

(a) The clustering results using EEMCR0 50 100 150

0102030405060708090

100

(b) The clustering results using LEACH

Figure 3 The clustering results

Table 1 Parameters in the experiments

Parameter type Parameter valueNode distribution area 100m times 100mSink location (150 50)Node numbers 100sim850Initial energy of sensor node 1198640 03 JCircuit processing data consumption energy 119864elec 50 nJbitPacket length 2000 bitsControl packet length 32 bits120576fs 100 pJbitm2120576amp 00013 pJbitm4

Data aggregation energy consumption 5 nJbitsignalData aggregation rate 06120582 0IterMax 1000120574 09

61 Effectiveness Figures 3(a) and 3(b) are the experimentalresults of clusters using EEMCR and LEACH algorithmsrespectively The horizontal and vertical coordinates of thegraph represent the location information of the nodes ldquo0rdquorepresents an ordinary node and the sinkrsquos location is (15050) The noncluster head nodes in Figure 3(a) are connectedto the CH with a red dashed line and the CH node isconnected to the sink with a dark blue dashed line thenoncluster head node in Figure 3(b) is connected to theCH with a solid line and the CH is connected to the sinkwith a dashed line Obviously due to EEMCR scheme takinginto account several network factors the distribution of thedetermined CHs is reasonable and the scale of clusters isrelatively appropriate in contrast the CH distribution usingLEACH algorithm is random and the cluster size is too large

Furthermore to validate the influence of the proposedclustering and backbone construction algorithm on theperformance we fundamentally implement the LEACH[21] LEACH-C [13] and CMRAOL [14] algorithms respec-tively Additionally through casting the proposed CH rota-tion mechanism and minimum aggregation tree generationinstead of the original ones in the LEACH algorithm the

Table 2 Comparisons of the five algorithms

Name FirstDeath LifeTime MaxEC MinECLEACH 24 301 00167 00011LEACH-CS 65 377 00074 00015LEACH-C 43 345 00141 00007LEACH-MT 36 326 00117 00009CMRAOL 33 313 00150 00021

hybrid results are expressed as LEACH-CS and LEACH-MT respectively Namely embedding the proposed clus-tering algorithm replaces the clustering phase in LEACHand generates the LEACH-CS method the backbone con-struction algorithm builds the communication path insteadof the original one in LEACH the generated combinationmethod is denoted as LEACH-MT So the LEACH LEACH-C and LEACH-CS are associated with the LEACH algo-rithm and with or without considering the proposed clusterhead rotation mechanism whereas the LEACH-MT andCMRAOL algorithms consider the multihop transmissionapproach Finally the effectiveness is validated on severalindices including the network lifetime (LifeTime) emergenceof first death node (FirstDeath) maximum average energyconsumption (MaxEC) and minimum average energy con-sumption (MinEC) of nodes The experimental results areshown in Table 2

Regarding the first emergence of death nodes in Table 2the first emergence time is during the 65th cycle of clus-tering in LEACH-CS that is far later than that of theother compared algorithms LEACH-C is the second bestwherein the LEACH algorithm first causes the death nodeto emerge at its 24th cycle and is the worst This is becauseLEACH-CS employs the proposed evidence-efficient clusterhead rotation mechanism to elect the CHs and achievesa significantly delayed energy consumption of each nodeand effectively prolongs the network lifetime Although theLEACH-C algorithm takes the energy factor into accountin the CH election stage it consumes more energy in theclustering stage which leads to the premature death of thecluster nodes compared to the LEACH-CS However the firstemergence of death nodes in LEACH-C compared with that

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 10: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

10 Wireless Communications and Mobile Computing

in LEACH algorithm is improved the cause reason is becauseLEACH-C utilizes a cluster head election strategy againstthat of randomly selecting the CHs in LEACH algorithmThe impropermechanism in LEACH results in insignificantlylarge amounts of energy consumption

The network lifetime mainly reflects the capability ofdifferent algorithms to allocate the energy and schedulethe task of data transmission As shown in Table 2 thenetwork lifetime of LEACH-CS algorithm is the longest andthe network lifetime of LEACH-C algorithm is the secondlongest The network lifetime of these two algorithms greatlyimproved in comparison with that of LEACH algorithmThe main reason is that a relatively proper cluster headelection is taken in them which results in slowing energyconsumption and effectively prolonging their lifetime Onthe other hand the lifetime of LEACH-MT and CMRAOLalgorithms is relatively close and also longer than that of theLEACHalgorithmThe primary reasons are that the LEACH-MT andCMRAOL employ amultihop communicationmodeand leverage link redundancy to improve data transmissionefficiency and energy consumption However in comparisonwith the LEACH-CS and LEACH-C the LEACH-MT andCMRAOL only lead to a little achieved improvement forthe network lifetime since the CH election is not entirelyreasonable in the clustering stage in which the clusteringprocess still consumes a large amount of energy against theLEACH-CS algorithm

The maximum average energy consumption and min-imum average energy consumption of the nodes is ana-lyzed The difference between the maximum average energyconsumption and minimum average energy consumptionfor the nodes is regarded as the index a larger differenceindicates the more energy consumption is centralized on afew nodes with a large amount of workload in contrast asmaller difference indicates the energy consumption and itsdistribution is more reasonable and uniform which benefitsthe coverage preservation From Table 2 the difference ofaverage energy consumption using LEACH-CS is the smallestone of 00059 the difference of average energy consumptionusing LEACHalgorithm is the largest one of 00156 Althoughthe LEACH-MT and CMRAOL algorithms employ multi-hop communication approach their difference of averageenergy consumption also reaches more than 001 The aboveresults indicate that LEACH-CS achieves a promising balancebetween energy consumption of nodes thus prolonging thenetwork lifetime and enhancing coverage preservation

In summary the hybridization LEACH-CS methodshows the best performance in terms of the indices LifeTimeFirstDeath MaxEC and MinEC The experimental resultsindicate that the proposed cluster head rotation mechanismeffectively limits the transmission range and set of neighborsof nodes

62 Efficiency In this part experimental comparisons andanalyses are performed between the EEMCR method andother methods such as the LEACH-developed algorithmincluding BM-ELBC [19] ELBC [19] and EBAPC [18] aswell as LEACH [21] itself on the indices including the totalenergy consumption of networks survival time of nodes

0 50 100 150 200 250 300 350 4000

102030405060708090

100

Cycles

Num

ber o

f dea

th n

odes

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 4 The death nodes versus the cycle of clustering

average energy consumption of nodes and influence of thesink location which are to show its efficiency

Usually the emergence of death nodes is later andnumberof death nodes is less which indicates higher coverage preser-vation less communication holes better energy efficiencyand higher QoS Experiment 1 clearly shows the effect thatthe proposed EEMCR method has on the emergence ofdeath nodes The results of the experiment are presented inFigure 4 As shown in Figure 4 the emergence of death nodeswith EEMCR is the latest one and BM-ELBC algorithm isthe second latest In particular the EEMCR method is farlater than that of the other compared algorithms When thecycle gets 400 almost half of the nodes are also survivingfor the proposed EEMCR method it is very prominentamong the compared algorithms The main reason for thissituation is that EEMCRmethod examines an effective clusterhead rotation mechanism which effectively avoids the rapidenergy consumption for the CHs thereby slowing the deathof nodes and enhancing the coverage preservation On theother hand since the EEMCR algorithm is based on themultihop transmission mode associated with the minimumaggregation tree-based generation methods which buildsnode-joint paths with the smallest EC (eg Definition 2)between the CHs that is the optimum path consequentlythe energy consumption in the process of forwarding data tothe base station significantly degrades Namely it improvesthe energy efficiency and reduces the monitoring blind areaAlthough the BM-ELBC algorithm also employs the multi-hop communicationmode it only considers the transmissioncapability rather than the energy losses on the multihopcommunication path according to the residual energy of theCHs This case incurs fast energy consumption for the CHswith a higher opportunity of carrying out the data transmis-sion tasks and leading to premature death of these CHs Incontrast LEACH and ELBC algorithms firstly generate deathnodes and the EBAPC algorithm is the second This is firstlybecause LEACH ELBC and EBAPC algorithms are onlybased on single-hop communication mode Additionally theCHs election is relatively unreasonable in LEACH protocol

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 11: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 11

0 50 100 150 200 250 3000

5

10

15

20

25

30

Cycles

LEACHEBAPCELBC

BM-ELBCEEMCR

The t

otal

resid

ual e

nerg

y (J

)

Figure 5 The residual energy versus the cycle of clustering

Additionally EBAPC algorithm is not the algorithmwhose emergence of death nodes is the earliest one but itsuptrend gradient is the largest one that is its ratio of deathnodes is the highest The primary reasons which caused thisphenomenon are that the CHs have to undertake more dataforwarding tasks after the cluster formation which spur a fastenergy consumption on some nodes thus it is not even goodas that of LEACH algorithm

Experiment 2 demonstrates how the algorithms performin relation to the speed of total energy consumption in thenetwork Generally the speed of total energy consumptionis one of the key indices to evaluate the comprehensiveperformance of networks The more and faster the totalenergy consumption is the shorter the survival time of nodesis The experimental results are shown in Figure 5 It can beseen from Figure 5 that the descending trend of the totalenergy consumption of EEMCR method is the slowest theBM-ELBC algorithm is the second slowestThey are superiorto that of LEACH and EBAPC algorithm This is becauseEEMCR and BM-ELBC algorithms use the multihop trans-mission approach whereby leveraging the link redundancy toimprove the transmission reliability and balance the energyconsumption of CHs as well as slowing down the speedof energy consumption for the whole network Moreoverin comparison with the BM-ELBC algorithm the EEMCRalgorithm has outperformed it on saving energy This ismainly because the optimum CH election and the selectedclusters head always choose the best multihop routing forforwarding their aggregation data to the base station therebyachieving an effective reduction of the insignificant energyconsumption In contrast LEACH and EBAPC likely choosethe nodes with less residual energy as CHs in the procedureof clusteringwhich causes fast energy consumption and leadssome nodes to premature death

Experiment 3 shows how the average energy consump-tion of nodes is affected by the algorithms The experimentalresults are shown in Figure 6 Generally the average energyconsumption of nodes fully reflects equilibrium level ofenergy consumption and also shows the optimization levelof the selected multihop routing for data forwarding from

0 10 20 30 40 50 60 70 80 90 1000

1

2

3

4

5

6

7

8

ID of nodes

LEACHEBAPCELBC

BM-ELBCEEMCR

The a

vera

ge en

ergy

cons

umpt

ion

(J)

times10minus3

Figure 6 The average energy consumption of different nodes

another aspect Under the same premise the lower theaverage energy consumption of nodes is the longer the nodesurvives the stronger the coverage preservation is and themore reasonable the forwarding routing selection is Thecloser the average energy consumption of each node themore similar the energy consumption of different nodessuggesting the self-organization and multihop transmissionpath of each node in WSNs are more reasonable and theenergy consumption is more balanced which may lead toa closer survival time of each node and more integrity ofthe network connectivity As shown in Figure 6 the averageenergy consumption of nodes with the EEMCR algorithm isthe most stable and is apparently lower than that of othercompared algorithms The BM-ELBC algorithm shows thesecond best These experimental results indicate that thetransmission paths using EEMCR algorithm are perfect theenergy consumption among different nodes achieves balanc-ing the survival time of the nodes is close to each other andthe capability to guarantee transmission reliability in WSNsis relatively strong This is due to the EEMCR algorithmemploying the evidence-efficient cluster head rotation mech-anism to examine the clustering procedure which results in arational distribution of clusters and a proper size of clustersas well as a balanced energy consumption among differentnodes Besides this the selected minimum aggregation tree-based multihop routing using EEMCR algorithm leveragesthe link redundancy to improve transmission reliability andenergy efficiency Although the EBAPC algorithm also showsrelatively stable average energy consumption among differentnodes its fluctuation is stronger than that of EEMCR algo-rithm and weaker than that of the remaining compared algo-rithmsThe spurred reason is that the EBAPC algorithm alsoreasonably assigns the data forwarding tasks and dispersesthe energy consumption in WSNs to a certain extent Incontrast LEACH and ELBC algorithms show a strong fluctu-ation of the average energy consumption on some nodes Forexample with the combined analysis shown in Figure 3(b)

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 12: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

12 Wireless Communications and Mobile Computing

100 110 120 130 140 150 160 170 180 190 2000

50100150200250300350400450

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

deat

h no

deCy

cles u

ntil

the fi

rst

(a) The emergence of the first death node versus the changing location ofthe sink

100 110 120 130 140 150 160 170 180 190 200100

200

300

400

500

600

700

800

Location of the sink node

LEACHEBAPCELBC

BM-ELBCEEMCR

Life

time

(b) The survival time versus the changing location of the sink node

Figure 7The influence of base station location on the survival time

since the size of clusters is unreasonable using LEACHalgorithm some CHs have to undertake very large amountsof data transmission which results in the distinguishedfluctuation in energy consumption On the other handthe average energy consumption between different nodes isvery large which indicates that the energy consumption iscentralized on a few nodes and the energy consumption isunbalanced the distribution of nodes shown in Figure 3(b)also verifies this point Like that of LEACH algorithm thesimilar fluctuation also happens in the ELBC algorithm theprimary reasons are due to the unreasonable CH electionand lead to a tremendous variation of energy consumptionfor some local nodes In summary Figure 6 shows thatthe generated multihop communication path using EEMCRalgorithm is reliable data forwarding efficiency is relativelyhigh thus not only slowing the overall energy consumptionbut also globally balancing energy consumption of differentnodes

Experiment 4 shows how changing the base stationlocation affects the algorithm performance Changing thelocation of the base station can better evaluate the robustnessof the algorithm to the variation environment The experi-mental results are shown in Figure 7 The base station moves

0 100 200 300 400 500 600 700 800 900100

200

300

400

500

600

700

800

Node number

Life

time

LEACHEBAPCELBC

BM-ELBCEEMCR

Figure 8 The influence of the scale on algorithms

from (100 50) to (200 50) namely taking shifting horizontalcoordinate as an example The distance between the basestation and the target area gets farther and farther theemergence of the first death node with the five comparedalgorithms is getting more and more early and the lifetimegets shorter and shorter With respect to the descendingtrend the EEMCR algorithm is the slowest which indicatesthat the emergence of the first death node is effectivelypostponed At the same time this phenomenon indicates thatEEMCR algorithm has a better robustness to adapt to thechanging configuration this is mainly because it employs theefficient cluster head rotation mechanism while choosing abestmultihop routingAndmore since considering the resid-ual energy of nodes it degrades the possibility of theCHswithlower residual energy as the intermediate forwarding nodesand significantly avoids their rapid energy consumption andeven causing the premature death of the nodes undertakingforwarding tasks Additionally when the base station isfarther the BM-ELBC algorithm also delays the occurrenceof the first death node but it is still earlier than that ofEEMCR algorithm this is mainly because the BM-ELBCalgorithm failed to choose the optimum communicationpathwhich easily leads to increasing the energy consumptionand shortening the network lifetime

Experiment 5 demonstrates the algorithm capability toadapt to large-scale WSNs and the nodes changes betweenthe ranges of 50ndash850 The experimental results are shownin Figure 8 in which the lifetime is taken as the primaryevaluation index

Usually as the scale of the network increases that isthe number of nodes in the network becomes larger theworkload also increases accordingly and thus theCHelectiongets more critical Figure 8 shows the network lifetimechanges with the increasing number of nodes from 50 to 850Especially after the number of nodes is greater than 200 thelifetime of the proposed EEMCR scheme is more prominentthan that of the others and the survival time of the networkincreases greatly This situation indicates that the proposedEEMCR algorithm can effectively prevent the occurrence ofpremature death of nodes and prolong the network lifetime

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 13: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

Wireless Communications and Mobile Computing 13

Namely it indicates that it is suitable for the large-scaleWSNs Furthermore the deeper reason is that taking theaccumulated evidence of responsibility and availability as thedeterministic criterion for the cluster head election is reliableand promising On the other hand the scheme of Kruskal-based construction of the minimum aggregation tree ensuresthat the generated communication path is optimum which iseffectively against link losses

Additionally besides the LEACH algorithm has a littlefluctuation and ELBC has an abrupt change the lifetime ofthe network generated by the remainder three algorithmsshowsmore or less uptrendThe reason causing the changingsin LEACH algorithm is the unreasonable CHs electionmechanism For ELBC algorithm it has a relatively longerlifetimewhen the number of nodes is less than 200 its lifetimeeven reaches 621 within the size of 50 of nodes and thenthe network lifetime performs stably and remains at around390 which indicates that the ELBC algorithm only has abetter adaptability to the small-scale network The reasoncovered is primarily that the ELBC algorithm delivers datadirectly to the base station after the cluster formation whichmakes it easy to encounter the bottleneck problem of datatransmission such as data collision

Based on the above experimental analyses and compar-isons the effectiveness of the proposed EEMCR scheme isconvincing and its efficiency is promising

7 Conclusion and Future Works

In the light of network lifetime coverage preservationtransmission reliability and energy consumption a novelEEMCR scheme has been proposed In EEMCR scheme theguaranteeing capability of a link or a node of data transmis-sion is comprehensively considered The support of nodesthemselves and node-joint links to data transmission areabstracted as a propagation of responsibility and availabilitythat is the accumulated evidence The responsibility andavailability integrate considerations on the residual energyof nodes CH location energy consumption on the selectedcommunication path and distance between nodes The pre-sented cluster head rotation mechanism makes a globallyreasonable CH distribution proper size of clustering anduniform allocation of energy consumption On the otherhand backbone construction algorithm is employed to buildtheminimumaggregation tree within the candidate CHs andthe generatedminimum aggregation tree provides an energy-efficientmultihop routing to guarantee the optimal and short-est path between the CHs to the base station This schemecan effectively improve coverage preservation save energyand even degrade the link redundancy Although the EEMCRscheme inherits the infrastructure of LEACH algorithmthe theoretical analysis and empirical results demonstratethe promising performance over the LEACH algorithmsRegarding emergence of the first death node equilibriumof energy assignment rationality of CH distribution andconvergence rate of the proposed algorithm our scheme ispromising The proposed scheme is applicable for the large-scale WSNs In the future works the performance of ourscheme could be evaluated when embedded in the design

of new routing protocols Beyond that various kinds ofprotocols design and topology construction methods basedon the presented innovations for different layer of WSNswould be studied

Conflicts of Interest

The authors declare that they have no conflicts of interest

Acknowledgments

This work is supported by the Future Research ProjectsFunds for the Science and Technology Department of JiangsuProvince (Grant no BY2013015-23) and the FundamentalResearch Funds for the Ministry of Education (Grant noJUSRP211A 41)

References

[1] O Durmaz Incel A Ghosh B Krishnamachari and K Chin-talapudi ldquoFast data collection in tree-based wireless sensornetworksrdquo IEEE Transactions on Mobile Computing vol 11 no1 pp 86ndash99 2012

[2] O Gnawali R Fonseca K Jamieson M Kazandjieva D Mossand P Levis ldquoCTP an efficient robust and reliable collectiontree protocol for wireless sensor networksrdquo ACM Transactionson Sensor Networks vol 10 no 1 article 16 2013

[3] Y Jin L Wang Y Kim and X Yang ldquoEEMC An energy-efficient multi-level clustering algorithm for large-scale wirelesssensor networksrdquo Computer Networks vol 52 no 3 pp 542ndash562 2008

[4] A P Renold and S Chandrakala ldquoSurvey on state scheduling-based topology control in unattended wireless sensor net-worksrdquo Computers and Electrical Engineering vol 56 pp 334ndash349 2016

[5] Z X Liu Q C Zheng L Xue and X P Guan ldquoA distributedenergy-efficient clustering algorithmwith improved coverage inwireless sensor networksrdquoFutureGenerationComputer Systemsvol 28 no 5 pp 780ndash790 2012

[6] S Soro and W B Heinzelman ldquoCluster head election tech-niques for coverage preservation in wireless sensor networksrdquoAd Hoc Networks vol 7 no 5 pp 955ndash972 2009

[7] C-H Lung and C Zhou ldquoUsing hierarchical agglomerativeclustering in wireless sensor networks an energy-efficient andflexible approachrdquo Ad Hoc Networks vol 8 no 3 pp 328ndash3442010

[8] W R Heinzelman A Chandrakasan and H Balakrish-nan ldquoEnergy-efficient communication protocol for wirelessmicrosensor networksrdquo in Proceedings of the 33rd AnnualHawaii International Conference on System Siences (HICSS rsquo00)vol 2 IEEE January 2000

[9] M Cobos F Antonacci A Alexandridis A Mouchtaris andB Lee ldquoA Survey of Sound Source Localization Methods inWireless Acoustic Sensor NetworksrdquoWireless Communicationsand Mobile Computing vol 2017 pp 1ndash24 2017

[10] O Younis and S Fahmy ldquoDistributed clustering in ad-hocsensor networks a hybrid energy-efficient approachrdquo in Pro-ceedings of the 23rd Annual Joint Conference of the IEEEComputer and Communications Societies ( INFOCOM rsquo04) vol1 pp 629ndash640 March 2004

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 14: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

14 Wireless Communications and Mobile Computing

[11] B Wang H B Lim D Ma and D Yang ldquoA coverage-awareclustering protocol for wireless sensor networksrdquo in Proceedingsof the 2010 6th International Conference on Mobile Ad-hoc andSensor Networks MSN 2010 pp 85ndash90 China December 2010

[12] L M C Arboleda and N Nasser ldquoComparison of clusteringalgorithms and protocols for wireless sensor networksrdquo inProceedings of the IEEE Canadian Conference on Electrical andComputer Engineering (CCECE rsquo06) pp 1787ndash1792 OttawaCanada May 2006

[13] C Li M Ye G Chen and J Wu ldquoAn energy-efficient unequalclusteringmechanism for wireless sensor networksrdquo in Proceed-ings of the 2nd IEEE International Conference on Mobile Ad-hocand Sensor Systems (MASS rsquo05) pp 597ndash604 Washington DCUSA November 2005

[14] E Leao C Montez R Moraes P Portugal and F VasquesldquoAlternative Path Communication in Wide-Scale Cluster-TreeWireless Sensor Networks Using Inactive Periodsrdquo Sensors vol17 no 5 p 1049 2017

[15] L-J Chen M Liu D-X Chen and L Xie ldquoTopology evolutionof wireless sensor networks among cluster heads by randomwalkersrdquo Jisuanji XuebaoChinese Journal of Computers vol 32no 1 pp 69ndash76 2009

[16] Y-H Zhu W-D Wu V C M Leung and L-H YangldquoEnergy-efficient tree-based message ferrying routing schemesfor wireless sensor networksrdquo in Proceedings of the 3rd Interna-tional Conference on Communications and Networking in ChinaChinaCom 2008 pp 843ndash847 China August 2008

[17] Y Jiang and H Zhang ldquoBase station controlled intelligentclustering routing in wireless sensor networksrdquo in Advances inArtificial Intelligence vol 6657 of Lecture Notes in Comput Scipp 210ndash215 Springer Heidelberg 2011

[18] K X Cui and Z H Li ldquoClutering Network Topology ControlAlgorithm for EBAPCBased onEnergyrdquoComputer Engineeringvol 38 no 23 pp 104ndash108 2012

[19] P F Li ldquoEnergy-level Based Clustering Network Control Algo-rithmrdquo Computer Science vol 41 no 3 pp 96ndash99 2014

[20] X Yin ldquoAffinity propagation clustering algorithm based onnode competing strengthrdquo Computer Engineering and Applica-tions vol 51 no 8 pp 79ndash84 2015

[21] W B Heinzelman A P Chandrakasan and H Balakrish-nan ldquoAn application-specific protocol architecture for wirelessmicrosensor networksrdquo IEEE Transactions onWireless Commu-nications vol 1 no 4 pp 660ndash670 2002

[22] Y Tao Y Zhang and Y Ji ldquoFlow-balanced routing for multi-hop clustered wireless sensor networksrdquo Ad Hoc Networks vol11 no 1 pp 541ndash554 2013

[23] M S Levin and A A Zamkovoy ldquoMulticriteria Steiner treewith the cost of Steiner verticesrdquo Journal of CommunicationsTechnology and Electronics vol 56 no 12 pp 1527ndash1542 2011

[24] B J Frey and D Dueck ldquoClustering by passing messagesbetween data pointsrdquo American Association for the Advance-ment of Science Science vol 315 no 5814 pp 972ndash976 2007

[25] M Younis P Munshi G Gupta and S M Elsharkawy ldquoOnefficient clustering of wireless sensor networksrdquo in Proceedingsof the DSSNS 2006 2nd IEEE Workshop on Dependability andSecurity in Sensor Networks and Systems pp 78ndash87 USA April2006

[26] O Younis M Krunz and S Ramasubramanian ldquoNode clus-tering in wireless sensor networks recent developments anddeployment challengesrdquo IEEE Network vol 20 no 3 pp 20ndash25 2006

[27] W Zhou H-M Chen and X-F Zhang ldquoAn energy efficientstrong head clustering algorithm for wireless sensor networksrdquoin Proceedings of the 2007 International Conference on WirelessCommunications Networking and Mobile Computing WiCOM2007 pp 2584ndash2587 China September 2007

[28] A Chamam and S Pierre ldquoA distributed energy-efficientclustering protocol for wireless sensor networksrdquo Computersand Electrical Engineering vol 36 no 2 pp 303ndash312 2010

[29] M Khalily-Dermany M Shamsi and M J Nadjafi-Arani ldquoAconvex optimization model for topology control in network-coding-based-wireless-sensor networksrdquoAdHoc Networks vol59 pp 1ndash11 2017

[30] B Yin H Shi and Y Shang ldquoAn efficient algorithm forconstructing a connected dominating set in mobile ad hocnetworksrdquo Journal of Parallel and Distributed Computing vol71 no 1 pp 27ndash39 2011

[31] S Lindsey and C S Raghavendra ldquoPEGASIS power-efficientgathering in sensor information systemsrdquo in Proceedings of theIEEE Aerospace Conference vol 3 pp 1125ndash1130 Big Sky MontUSA March 2002

[32] L Keller E Atsan K Argyraki and C Fragouli ldquoSenseCodenetwork coding for reliable sensor networksrdquo ACM Transac-tions on Sensor Networks vol 9 no 2 article 25 2013

[33] M R Garey and D S Johnson Computers and IntractabilityA Guide to the Theory of NP-Completeness W H Freeman SanFrancisco Calif USA 1979

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 15: Evidence-Efficient Multihop Clustering Routing Scheme for ...downloads.hindawi.com/journals/wcmc/2017/1914956.pdfEvidence-Efficient Multihop Clustering Routing Scheme for Large-Scale

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal of

Volume 201

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 201

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of