Javascript is required
1.
R. Wazirali, R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh, “Secure watermarking schemes and their approaches in the IoT technology: An overview,” Electronics, vol. 10, no. 14, p. 1744, 2021. [Google Scholar] [Crossref]
2.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Networks, vol. 38, no. 4, pp. 393–422, 2002. [Google Scholar] [Crossref]
3.
X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless Commun., vol. 15, no. 4, pp. 60–66, 2008. [Google Scholar] [Crossref]
4.
M. A. Moridi, Y. Kawamura, M. Sharifzadeh, E. K. Chanda, M. Wagner, and H. Okawa, “Performance analysis of ZigBee network topologies for underground space monitoring and communication systems,” Tunnelling Underground Space Technol., vol. 71, pp. 201–209, 2018. [Google Scholar] [Crossref]
5.
M. A. Ertürk, M. A. Aydın, M. T. Büyükakkaşlar, and H. Evirgen, “A survey on LoRaWAN architecture, protocol and technologies,” Future Internet, vol. 11, no. 10, p. 216, 2019. [Google Scholar] [Crossref]
6.
A. S. Budhewar and R. C. Thool, “Improving performance analysis of multimedia wireless sensor network: A survey,” in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, 2015, pp. 1211–1215. [Google Scholar] [Crossref]
7.
V. Jelicic and V. Bilas, “Reducing power consumption of image transmission over IEEE 802.15.4/ZigBee sensor network,” in 2010 IEEE Instrumentation and Measurement Technology Conference Proceedings, Austin, TX, USA, 2010, pp. 1211–1215. [Google Scholar] [Crossref]
8.
O. A. Khashan, R. Ahmad, and N. M. Khafajah, “An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks,” Ad Hoc Networks, vol. 115, p. 102448, 2021. [Google Scholar] [Crossref]
9.
R. Ahmad, E. A. Sundararajan, and T. Abu-Ain, “Analysis the effect of clustering and lightweight encryption approaches on WSNs lifetime,” in 2021 International Conference on Electrical Engineering and Informatics (ICEEI), Kuala Terengganu, Malaysia, 2021, pp. 1–6. [Google Scholar] [Crossref]
10.
L. Sahoo, S. Sen, K. Tiwary, S. Samanta, and T. Senapati, “Modified Floyd–Warshall algorithm for maximum connectivity in wireless sensor network under uncertainty,” Discrete Dyn. Nature Soc., pp. 1–11, 2022. [Google Scholar] [Crossref]
11.
N. Shi, X. Liu, and Y. Guan, “Research on k-means clustering algorithm: An improved k-means clustering algorithm,” in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jian, China, 2010, pp. 63–67. [Google Scholar] [Crossref]
12.
Scikit-Learn-Extra, “KMedoids Demo-scikit-learn-extra 0.2.0 documentation,” 2019. https://Scikit-learn-extra.Readthedocs.io [Google Scholar]
13.
L. A. Zadeh, “Fuzzy logic = computing with words,” IEEE Trans. Fuzzy Syst., vol. 4, no. 2, pp. 103–111, 1996. [Google Scholar] [Crossref]
14.
L. A. Zadeh, “Fuzzy sets,” Inf. Control, vol. 8, no. 3, pp. 338–353, 1965. [Google Scholar] [Crossref]
15.
O. Kulak, H. G. Goren, and A. A. Supciller, “A new multi criteria decision making approach for medical imaging systems considering risk factors,” Appl. Soft Comput., vol. 35, pp. 931–941, 2015. [Google Scholar] [Crossref]
16.
A. D. Amis, R. Prakash, T. H. P. Vuong, and D. T. Huynh, “Max-min d-cluster formation in wireless ad hoc networks,” in Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), Tel Aviv, Israel, 2000, pp. 32–41. [Google Scholar] [Crossref]
17.
S. Basagni, “Distributed clustering for ad hoc networks,” in Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN’99), Perth/Fremantle, WA, Australia, 1999, pp. 310–315. [Google Scholar] [Crossref]
18.
H. Chan and A. Perrig, “ACE: An emergent algorithm for highly uniform cluster formation,” in Wireless Sensor Networks. EWSN 2004. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2004, pp. 154–171. [Google Scholar] [Crossref]
19.
M. Demirbas, A. Arora, and V. Mittal, “FLOC: A fast local clustering service for wireless sensor networks,” in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Florence, Italy, 2004. [Google Scholar]
20.
D. Baker, A. Ephremides, and J. Flynn, “The design and simulation of a mobile radio network with distributed control,” IEEE J. Select. Areas Commun., vol. 2, no. 1, pp. 226–237, 1984. [Google Scholar] [Crossref]
21.
S. Yi, J. Heo, Y. Cho, and J. Hong, “PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks,” Comput. Commun., vol. 30, no. 14–15, pp. 2842–2852, 2007. [Google Scholar] [Crossref]
22.
A. Iranli, M. Maleki, and M. Pedram, “Energy efficient strategies for deployment of a two-level wireless sensor network,” in ISLPED ’05: Proceedings of the 2005 International Symposium on Low Power Electronics and Design, San Diego, CA, USA, 2005, pp. 233–238. [Google Scholar] [Crossref]
23.
P. Kuila and P. K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach,” Eng. Appl. Artif. Intell., vol. 33, pp. 127–140, 2014. [Google Scholar] [Crossref]
24.
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002. [Google Scholar] [Crossref]
25.
H. Hayouni, “EECH/CF: An energy-efficient cluster head election and cluster formation algorithms for WSNs,” Int. J. Sens. Wireless Commun. Control, vol. 12, no. 4, pp. 292–301, 2022. [Google Scholar] [Crossref]
26.
X. Wu and S. Wang, “Performance comparison of LEACH and LEACH-C protocols by NS2,” in 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, Hong Kong, China, 2010, pp. 254–258. [Google Scholar] [Crossref]
27.
H. El Alami and A. Najid, “Energy-efficient fuzzy logic cluster head selection in wireless sensor networks,” in 2016 International Conference on Information Technology for Organizations Development (IT4OD), Fez, Morocco, 2016, pp. 1–7. [Google Scholar] [Crossref]
28.
B. M. Khan, R. Bilal, and R. Young, “Fuzzy-TOPSIS based cluster head selection in mobile wireless sensor networks,” J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 928–943, 2018. [Google Scholar] [Crossref]
29.
P. Azad and V. Sharma, “Cluster head selection in wireless sensor networks under fuzzy environment,” Int. Scholarly Res. Not., pp. 1–8, 2013. [Google Scholar] [Crossref]
30.
S. Sen, L. Sahoo, K. Tiwary, V. Simic, and T. Senapati, “Wireless sensor network lifetime extension via K-medoids and MCDM techniques in uncertain environment,” Appl. Sci., vol. 13, no. 5, p. 3196, 2023. [Google Scholar] [Crossref]
31.
S. Sen, L. Sahoo, K. Tiwary, and T. Senapati, “Entropy weighted TOPSIS based cluster head selection in wireless sensor networks under uncertainty,” Telecom, vol. 4, no. 4, pp. 678–692, 2023. [Google Scholar] [Crossref]
32.
K. P. Sinaga and M. S. Yang, “Unsupervised K-means clustering algorithm,” IEEE Access, vol. 8, pp. 80716–80727, 2020. [Google Scholar] [Crossref]
33.
E. P. Klement, R. Mesiar, and E. Pap, Triangular Norms. Springer Science & Business Media, 2013. [Google Scholar]
34.
B. Schweizer and A. Sklar, Probabilistic Metric Spaces. Dover Publications, 2011. [Google Scholar]
Search
Open Access
Research article

Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty

supriyan sen,
laxminarayan sahoo*,
sumanta lal ghosh
Department of Computer and Information Science, Raiganj University, 733134 Raiganj, India
Journal of Industrial Intelligence
|
Volume 2, Issue 1, 2024
|
Pages 54-62
Received: 02-04-2024,
Revised: 03-11-2024,
Accepted: 03-21-2024,
Available online: 03-30-2024
View Full Article|Download PDF

Abstract:

In the realm of Wireless Sensor Networks (WSNs), energy efficiency emerges as a paramount concern due to the inherent limitations in the energy capacity of sensor nodes. The extension of network lifespan is critically dependent on the strategic selection of Cluster Heads (CHs), a process that necessitates a nuanced approach to optimize communication, resource allocation, and network performance overall. This study proposes a novel methodology for CH selection, integrating Multiple Criteria Decision Making (MCDM) with the K-Means algorithm to facilitate a more discerning aggregation and forwarding of data to the network sink. Central to this approach is the application of the Einstein Weighted Averaging Aggregation (EWA) operator, which introduces a layer of sophistication in handling the uncertainties inherent in WSN deployments. The efficiency of CH selection is vital, as CHs serve as pivotal nodes within the network, their selection and operational efficiency directly influencing the network's energy consumption and data processing capabilities. By employing a meticulously designed clustering process via the K-Means algorithm and selecting CHs based on a comprehensive set of parameters, including, but not limited to, residual energy and node proximity, this methodology seeks to substantially enhance the energy efficiency of WSNs. Comparative analysis with the Low-Energy Adaptive Cluster Hierarchy (LEACH)-Fuzzy Clustering (FC) algorithm underscores the efficacy of the proposed approach, demonstrating a 15% improvement in network lifespan. This advancement not only ensures optimal utilization of limited resources but also promotes the sustainability of WSN deployments, a critical consideration for the widespread application of these networks in various fields. The findings of this study underscore the significance of adopting sophisticated, algorithmically driven strategies for CH selection, highlighting the potential for significant enhancements in WSN longevity through methodical, data-informed decision-making processes.

Keywords: Network longevity, K-Means, $T$-conorm, Cluster head, Low-energy adaptive cluster hierarchy, Residual energy

1. Introduction

Since WSNs are inexpensive, scalable, and simple to set up, they are frequently utilized in real-time applications [1]. As the fundamental components of WSNs, self-organizing sensors can establish an adaptive multi-hop network and send optimized data packets to the base station (BS) for analysis after post-processing [2], [3]. The wireless nodes' memory and remaining energy are the biggest implementation restrictions. For this reason, in order to maximize the benefits of these WSNs, these WSN nodes require a regulating system to regulate their interactions with the access point and one another [4], [5]. Network lifetime can be greatly impacted by sending and receiving multimedia data, using advanced network security techniques, and more [6], [7], [8], [9]. Numerous techniques, like clustering and routing protocols, are used [10] to extend the lifetime of networks and maximize energy efficiency. MCDM, combined with entropy and the EWA operator, can improve CH selection in WSNs, contributing to a longer network lifetime. MCDM aids in evaluating diverse criteria, such as energy consumption, connectivity, and node proximity, to identify optimal CHs. Incorporating entropy assists in quantifying the weight of parameters, allowing for informed decisions on CH selection. The EWA provides a mechanism to aggregate multiple criteria, considering their interdependencies. By employing this integrated approach, WSNs can strategically select CHs based on a comprehensive criteria analysis, promoting efficient energy utilization and balanced network distribution. Consequently, the extension of WSN lifetime is achieved by improving energy depletion, enhancing network resilience and optimizing resource utilization within the specified constraints. To increase energy efficiency and maximize network lifetime, a new algorithm must be developed. This research proposes a new algorithm to maximize the network lifetime, selecting a CH in each round based on specific constraints. The clustering technique based on K-Means [11], which offers energy-efficient clustering in WSN, is the foundation for cluster creation. Fuzzy logic can be effectively used to represent uncertainty in WSNs. WSNs are often deployed in dynamic and unpredictable environments where factors like sensor readings, communication reliability, and environmental conditions can introduce uncertainty. Fuzzy logic provides a mathematical framework to handle this uncertainty by allowing the representation of vague and imprecise information. triangular fuzzy numbers (TFNs) are often used to represent uncertainty because they offer a simple yet effective way to model imprecision and vagueness in real-world data. The choice of TFNs is based on their ease of use, interpretability, and computational efficiency. In this study, TFNs are used to represent uncertainty in WSNs.

2. Related Works

Decision-making holds great importance across scientific disciplines. Employing the MCDM approach proves highly effective for discerning superior alternatives compared to various options in a multitude of scenarios [12]. Numerous studies have been done into clustering using MCDM within WSN, yielding promising results [13], [14], [15], [16], [17], [18]. Heuristic methods are also applicable in WSN for clustering purposes [19], [20]. Clustering approaches in WSN can be broadly categorized into static and dynamic. In the static technique, the CH remains fixed during clustering [21], [22], [23]. Conversely, dynamic clustering involves regular CH rotation. Heinzelman's LEACH [24] stands as an example of dynamic clustering. Despite LEACH's lower algorithmic complexity compared to alternative approaches, its uneven distribution of CHs results in lower energy efficiency. To address this issue in a heterogeneous environment where some nodes possess higher energy capacities, an Energy-Efficient Heterogeneous Cluster (EEHC) [25] has been introduced. In EEHC, nodes take on the role of CHs, with their residual energy determining a weighted election probability. While introducing the concept of heterogeneity, this approach fails to consider several factors in CH selection. A modified version of the LEACH protocol, known as Centralized LEACH (LEACH-C) [26], was introduced to resolve this issue by minimizing the total sum of squared distances between all CHs. This modification resulted in decreased energy consumption when transmitting data from non-cluster-head nodes to their respective CHs. In WSN CH selection, El Alami and Najid [27] introduced an energy-efficient approach based on fuzzy logic. The primary goal of this study is to leverage fuzzy parameters for minimizing energy consumption and enhancing the overall network lifespan. Khan et al. [28] suggested a fuzzy-Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS)-based CH election in mobile networks, employing four criteria. Studies compared this approach with conventional LEACH and fuzzy methods. Azada and Sharma [29] proposed a TOPSIS method focused on the election of cluster leaders using a multiple attribute decision-making approach. In this study, the CHs have been chosen by the MCDM technique based on the entropy-weighted technique. A new algorithm has been developed to select the CHs after each round which directly helps to increase the network lifetime.

3. Preliminaries

3.1 Entropy Weighted Method

Entropy, initially formulated by the German physicist R. Clausius in 1865 as a thermodynamic metric, characterizes the disorder or randomness arising from thermodynamic processes. Claude Shannon later introduced the concept of information entropy in 1948 to quantify uncertainty in communication from information sources. The entropy weight method evaluates the extent to which each criterion in decision-making preserves decision information, determining the relative significance of different features. It essentially gauges the level of unpredictable communication through the utilization of entropy values. The computation of entropy weight involves analyzing the choice matrix. One can consult Sen et al. [30] for further information regarding the entropy weighted technique.

Assume that $Z=\left(z_{i j}\right)_{m \times n}$ be the decision matrix and $w=\left(w_1, w_2, \ldots, w_n\right)$, where $0 \leq w_j \leq 1$ and $\sum w_j=1$ be the weight vector with regard to the $m$ alternatives $A_i(i=1,2, \ldots, m)$ and $n$ criterion $C_j(j=1,2, \ldots, n)$. Now, we can calculate the weight $w_j, j=1,2, \ldots, n$ using the following steps:

Step 1: Compute $p_{i j}=\frac{z_{i j}}{\sum_{i=1}^m z_{i j}}$

Step 2: Compute $E_j=-\frac{1}{\log (m)} \sum_{i=1}^m p_{i j} \log \left(p_{i j}\right)$. It is to be that $p_{i j} \log p_{i j} \rightarrow 0$, when $p_{i j} \rightarrow 0$

Step 3: Compute $U_j=1-E_j$

Step 4: Compute $w_j=\frac{U_j}{\sum_{j=1}^n U_j}=\frac{1-E_j}{\sum_{j=1}^n\left(1-E_j\right)}$

3.2 Triangular Fuzzy Number

A triangular fuzzy number is a representation of uncertainty that is characterized by a triangular-shaped membership function. It is often used in fuzzy logic and fuzzy set theory to model imprecise or vague information.

A fuzzy number $\tilde{A}=(a, b, c)$, where $a \leq b \leq c$ is called triangular fuzzy number (TFN) whose membership function $\mu_{\tilde{A}}(x): X \rightarrow[ 0,1]$ is as follows:

$\mu_{\tilde{A}}(x)= \begin{cases}\frac{x-a}{b-a} & \text { if } a \leq x \leq b \\ 1 & \text { if } x=b \\ \frac{c-x}{c-b} & \text { if } b \leq x \leq c\end{cases}$

Let $\tilde{A}=(a, b, c)$ be a triangular fuzzy number, then $\alpha$-level set of $\tilde{A}$ is $A_\alpha=\left\{x \in X: \mu_{\tilde{A}}(x) \geq \alpha\right\}=\left[A_\alpha^{-}, A_\alpha^{+}\right]$, where $A_\alpha^{-}=a+(b-a) \alpha$ and $A_\alpha^{+}=c-(c-b) \alpha, \alpha \in[ 0,1]$. Now, we can represent $\tilde{A}$ as $\tilde{A}=\underset{\alpha \in[ 0,1]}{\cup} A_\alpha$. Here, we can derive the signed distance [31] from $\left[A_\alpha^{-}, A_\alpha^{+}\right]$ to $\tilde{0}$ as $D\left(A_\alpha, \tilde{0}\right)=\frac{1}{2}\left(A_\alpha^{-}+A_\alpha^{+}\right)$. If $\tilde{A}=(a, b, c)$ be the TFN then we have $D(\tilde{A}, \tilde{0})=\frac{1}{2} \int_0^1\left(A_\alpha^{-}+A_\alpha^{+}\right) d \alpha=0.25(a+2 b+c)$.

3.3 K-Means algorithm

The K-Means [32] algorithm is a popular unsupervised machine learning algorithm used for clustering data. It partitions a dataset into K clusters where each data point belongs to the cluster with the nearest mean. The algorithm is iterative and converges to a solution where the assignment of data points to clusters minimizes the sum of squared distances between data points and their respective cluster centers. K-Means is sensitive to the initial placement of cluster centroids, and different initializations may lead to different results. To mitigate this, the algorithm is often run multiple times with different initializations, and the best result in terms of the sum of squared distances is chosen. K-Means is widely used for tasks such as customer segmentation, image compression, and pattern recognition. However, it has some limitations, such as sensitivity to outliers and the need to specify the number of clusters in advance.

3.4 EWA Method

The notion of a triangular norm was presented by Klement et al. [33] as an extension of the triangle inequality observed in metrics. Schweizer and Sklar [34] are credited with developing the concept of a $T$-norm and the accompanying dual operator $T$-conorm. Let $R_j, j=1,2, \ldots, n$ be the collection of real numbers; then EWA operators can be defined as follows:

$E W A_w\left(R_1, R_2, \ldots, R_n\right)=w_1 \otimes R_1 \oplus w_2 \otimes R_2 \oplus w_3 \otimes R_3 \oplus \ldots \oplus w_n \otimes R_n$, where $w=\left(w_1, w_2, \ldots, w_n\right)$ is the weighted vector of $R_j, j=1,2, \ldots, n$, such that $0 \leq w_j \leq 1, j=1,2, \ldots, n$ and $\sum_{j=1}^n w_j=1$.

It is to be noted that for two real numbers $p$ and $q$ we have used Einstein $T$-norm for product $p \otimes q$ and $T$-conorm for sum $p \oplus q$.

Einstein product is a $T$-norm function $T:[ 0,1] \times[ 0,1] \rightarrow[ 0,1]$ such that

$p \otimes_{\varepsilon} q=\frac{p . q}{1+(1-p)(1-q)} \quad \forall(p, q) \in[ 0,1]^2$
(1)

Einstein sum is a $T$-conorm function $S:[ 0,1] \times[ 0,1] \rightarrow[ 0,1]$ such that

$p \oplus_{\varepsilon} q=\frac{p+q}{1+p \cdot q} \quad \forall(p, q) \in[ 0,1]^2$
(2)

4. System Model Definition and Formulation

The system infrastructure comprises a solitary base station (BS) and an extensive array of sensor nodes, each classified into two categories: common nodes and cluster head nodes. Common nodes are responsible for monitoring the surroundings and transmitting sensor data to the designated cluster head node. The selection of the cluster head node is a meticulous process facilitated by the common nodes. Upon receiving data from the common nodes, the cluster head node amalgamates the information before relaying it to the BS.

The first-order radio energy model explicitly focuses on energy utilization during the communication phase, encompassing energy expenditure in transmission, reception, and data aggregation processes. Eq. (3) represents the computation of energy consumption within this framework, derived from the exchanged bit data between a cluster head node and a common node.

$\tilde{E}_{T X}(\tilde{L}, \tilde{d})=\tilde{E}_{ {elec }} \times \tilde{L}+\tilde{\varepsilon}_{a m p} \times \tilde{L}$
(3)
$\tilde{E}_{R X}(\tilde{L})=\tilde{E}_{ {elec }} \times \tilde{L}$
(4)

$\tilde{E}_{T X}(\tilde{L}, \tilde{d})$ is the energy consumption during the transmission of $L$-bit of data and $\tilde{E}_{R X}(\tilde{L})$ is the energy consumption during receiving of data. Eq. (5) can be used to determine the amplifier's energy usage during the transmission phase where $\tilde{\varepsilon}_{a m p}$ is the amplifier energy consumption during transmission phase.

$\tilde{\varepsilon}_{a m p}=\left\{\begin{array}{l} \tilde{\varepsilon}_{f s} \tilde{d}^2 \text { if } \tilde{d} \leq \tilde{d}_0 \\ \tilde{\varepsilon}_{m p} \tilde{d}^4 \text { if } \tilde{d}>\tilde{d}_0 \end{array}\right.$
(5)

If the value of $\tilde{d}$ less than or equal to $\tilde{d}_0$, then the sensor node will use free-space propagation model. On the other hand, if the system uses multipath fading channel which use $\tilde{\varepsilon}_{f s}$ and $\tilde{\varepsilon}_{m p}$ communication energy parameter, can be used to calculate the value of $\tilde{d}_0$ by Eq. (6).

$\tilde{d}_0=\sqrt{\frac{\tilde{\varepsilon}_{f s}}{\tilde{\varepsilon}_{m p}}}$
(6)

Determining the number of cluster heads in each cycle is crucial for increasing the WSN's lifetime and energy efficiency. We have determined the optimal cluster size $\tilde{k}_{o p t}$ as:

$\tilde{k}_{o p t}=\sqrt{\frac{\tilde{\varepsilon}_{f s}}{\pi\left(\tilde{\varepsilon}_{m p} \tilde{d}_{t o B S}^4-\tilde{E}_{ {elec }}\right)}} \tilde{M} \sqrt{\tilde{N}}$
(7)

where, $\tilde{M}, \tilde{N}$ are represented as area covered and number of nodes in the system. BS defines the base location.

5. Experimental Setup and Results

For this research, a network comprising 100 nodes was established, as shown in Figure 1, featuring a BS located at a central point and a random distribution of nodes throughout the area. Each packet type has a 25-byte packet header, and data messages have a fixed length of 4000 bits. The channel bandwidth was set at a constant 1 Mb/s. The K-Means algorithm divides the network into groups of clusters depending on the value calculated by Eq. (7), as shown in Figure 2. As nodes start to become inactive, the number of clusters undergoes adjustments based on node density, and the optimal value is employed to determine the initial number of clusters. Larger and smaller groups are amalgamated. The BS is characterized as a node with limitless processing power and no energy constraints. Table 1 presents a list of symbols used in this study.

Figure 1. Distribution of 100 nodes over 100×100$\mathrm{m}^2$ area
Figure 2. Clustering of nodes using K-Means algorithm
Table 1. Key parameters of our model

Symbol

Description

$\tilde{d}$

Distance to base station

$\tilde{d}_0$

Fixed measuring distance to base station

$\left(\tilde{C}_x, \tilde{C}_y\right)$

Co-ordinate of cluster head in a WSNs

$\left(\tilde{N}_x, \tilde{N}_y\right)$

Co-ordinate of node in a WSNs

$\tilde{E}_{ {initial }}$

Initial energy

$\tilde{E}_{ {elec }}$

Electronics energy

$\tilde{E}_{T X}$

Data transmission energy consumption

$\tilde{\varepsilon}_{f s}$

Energy amplification to overcome open area

$\tilde{\varepsilon}_{m p}$

Energy amplification in order to navigate the multi-path

$\tilde{E}_{R X}$

Energy consumption while data reception

$\tilde{K}_{o p t}$

Number of cluster heads that is optimal

$\tilde{L}$

Length of data

$\tilde{N}$

Number of nodes in the network as a whole

$\tilde{H}$

Distance between the special node and the common node

$\tilde{n}$

Number of clusters

$\alpha$

Distance from the sink

$\beta$

Average distance of cluster nodes

$\chi$

Number of neighbors

$\delta$

Residual energy

5.1 Node Selection Criteria

As shown in Table 2, the experiment in this study calculates the entropy weights of each parameter, like residual energy, the number of neighbor nodes, the distance from the sink and the average distance of cluster nodes. The best CHs were selected after the first simulation round based on four factors, namely, distance from the sink (BS), average distance of cluster nodes, number of neighbor and residual energy, using the Einstein operator. Using the EWA operator mentioned in Section 3.4, the average weight of each node in each cluster can be calculated.

${ Weight }\left( { node }_i\right)=\frac{1}{\alpha} \otimes(0.1062) \oplus \beta \otimes(0.1300) \oplus \chi \otimes(0.2640) \oplus \delta \otimes(0.4980)$
(8)
Table 2. Entropy weight of each parameter

Distance From the Sink ($\alpha$)

Average Distance of Cluster Nodes ($\beta$)

Number of Neighbors ($\chi$)

Residual Energy ($\delta$)

0.1062

0.1300

0.2640

0.4980

Eq. (8) has been used to determine the weight of each node of each cluster which decided the selection of CHs has been shown in Table 3. We have also considered uncertain parameters for the entire network setup which has been shown in Table 4. Also, we have estimated the optimum range of $\tilde{K}_{ {opt }}$. Here, we have considered $\tilde{\mathrm{N}}$ = 100 nodes, $\tilde{Z}$ = 100m, $\tilde{\varepsilon}_{f s}$ = 10pJ, $\tilde{\varepsilon}_{{mp}}$ = 0.0013pJ and 76m $< \tilde{d}_0 <$ 168m. Therefore, the expected optimum number of clusters to be lied in the range (1,11), i.e. 1 $< \tilde{k}_{ {opt }} <$ 11 which is taken as 9 . Figure 2 shows the clustering of 100 nodes using K-Means algorithm by $\tilde{k}_{ {opt }}$ value.

Table 3. Key parameter for cluster head selection

Cluster Head

Residual Energy

Number of Neighbors

Distance From the Sink

Average Distance of Clusters Nodes

CH1

0.9795

7

156.203

11.232

CH2

0.9754

5

78.223

15.527

CH3

0.9798

9

140.173

28.937

CH4

0.9753

6

136.059

31.049

CH5

0.9788

3

93.444

49.752

CH6

0.9641

4

116.069

24.688

CH7

0.9647

5

86.988

23.348

CH8

0.9657

4

105.367

26.433

CH9

0.9649

6

102.181

18.694

Table 4. The experimental parameter utilized for WSNs

Parameters

Parametric Value as per Assumptions

Defuzzified Value

$\tilde{N}$

100

$\tilde{E}_{ {initial }}$

(0.7,1,1.2)

0.975

Coordinate of BS

(50,175)

Size of the data packet

(495,500,510)

501.25

Hello/broadcast/CH join message

(22,25,28)

25

$\tilde{\varepsilon}_{f s}$

(8,10,12)

10

$\tilde{\varepsilon}_{m p}$

(0.001,0.0013,0.0015)

0.001275

$\tilde{L}$

(47,50,52)

49.75

The number of cycles before the network's single node runs out of energy is used to describe the network's lifespan. Figure 3 displays the experimental outcomes accordingly. Sensor nodes are dispersed at random across a preset area. The plot of network lifetimes displays the number of active nodes with time in cycles. CHs for the first round are selected using the MCDM technique. For the subsequent round, Algorithm 1 is implemented and described below.

Algorithm 1:

Step 1: 100 nodes have been deployed randomly over (100,100)$\mathrm{m}^2$ area with BS coordinates.

Step 2: For the first rounds, the selected CHs will send the data which has been selected by using Eq. (8).

Step 3: Repeat Steps 4 to 9 to choose CHs for subsequent round until all nodes' residual energy is not diminished.

Step 4: Increment the counter if the remaining energy of a node surpasses that of all other nodes within its cluster.

Step 5: If a node is at a greater distance from the sink than the cumulative distance of all other nodes in the cluster, then a counter is incremented.

Step 6: Increase a counter if a node's average distance from other nodes within the cluster is shorter than that of any other nodes.

Step 7: The node with the highest counter value has been considered CHs for the next round.

Step 8: If a cluster contains less than three nodes, assign additional nodes to the nearest cluster.

Step 9: Move to the next round.

Step 10: End.

Figure 3. Number of nodes alive vs. number of rounds of proposed approach

LEACH-FC is an extension of the original LEACH algorithm, incorporating fuzzy logic for improved cluster formation. Its main goal is to enhance energy efficiency and prolong the network lifetime of WSNs. In this study, both the LEACH-FC clustering approach and the approach proposed in this study are implemented in the same environment. Figure 4 shows the network lifetime of LEACH-FC. It has been found that the proposed approach shows a 15% greater network lifetime in comparison with LEACH-FC.

Figure 4. Number of nodes alive vs. number of rounds of LEACH-FC

6. Conclusions

Research on energy efficiency in WSNs is crucial due to the constrained energy resources of sensor nodes. Improving energy efficiency enhances the longevity of WSNs, allowing them to operate for extended periods without frequent battery replacements. This, in turn, promotes sustainable and cost-effective deployment of sensor networks for various applications such as environmental monitoring, healthcare, and smart cities. Efficient energy utilization also contributes to minimizing environmental impact, making WSNs more environmentally friendly and aligning with the broader goal of creating energy-efficient and eco-friendly technological solutions. Entropy, MCDM and K-Means algorithms play significant roles in creating clusters and selecting CHs in WSNs. The integration of these algorithms enables the creation of energy-efficient and well-organized clusters in WSNs. Entropy aids in evaluating the quality of clusters; MCDM ensures comprehensive decision-making for CH selection; and K-Means contributes to the formation of homogeneous and resource-efficient clusters. This combined approach enhances the performance and longevity of WSNs, particularly in applications where energy conservation and network reliability are critical. It has been found that, by applying Algorithm 1 and using these algorithms, the proposed approach shows better network lifetime performance in comparison with the LEACH-FC algorithm.

Data Availability

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References
1.
R. Wazirali, R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh, “Secure watermarking schemes and their approaches in the IoT technology: An overview,” Electronics, vol. 10, no. 14, p. 1744, 2021. [Google Scholar] [Crossref]
2.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A survey,” Comput. Networks, vol. 38, no. 4, pp. 393–422, 2002. [Google Scholar] [Crossref]
3.
X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless Commun., vol. 15, no. 4, pp. 60–66, 2008. [Google Scholar] [Crossref]
4.
M. A. Moridi, Y. Kawamura, M. Sharifzadeh, E. K. Chanda, M. Wagner, and H. Okawa, “Performance analysis of ZigBee network topologies for underground space monitoring and communication systems,” Tunnelling Underground Space Technol., vol. 71, pp. 201–209, 2018. [Google Scholar] [Crossref]
5.
M. A. Ertürk, M. A. Aydın, M. T. Büyükakkaşlar, and H. Evirgen, “A survey on LoRaWAN architecture, protocol and technologies,” Future Internet, vol. 11, no. 10, p. 216, 2019. [Google Scholar] [Crossref]
6.
A. S. Budhewar and R. C. Thool, “Improving performance analysis of multimedia wireless sensor network: A survey,” in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, 2015, pp. 1211–1215. [Google Scholar] [Crossref]
7.
V. Jelicic and V. Bilas, “Reducing power consumption of image transmission over IEEE 802.15.4/ZigBee sensor network,” in 2010 IEEE Instrumentation and Measurement Technology Conference Proceedings, Austin, TX, USA, 2010, pp. 1211–1215. [Google Scholar] [Crossref]
8.
O. A. Khashan, R. Ahmad, and N. M. Khafajah, “An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks,” Ad Hoc Networks, vol. 115, p. 102448, 2021. [Google Scholar] [Crossref]
9.
R. Ahmad, E. A. Sundararajan, and T. Abu-Ain, “Analysis the effect of clustering and lightweight encryption approaches on WSNs lifetime,” in 2021 International Conference on Electrical Engineering and Informatics (ICEEI), Kuala Terengganu, Malaysia, 2021, pp. 1–6. [Google Scholar] [Crossref]
10.
L. Sahoo, S. Sen, K. Tiwary, S. Samanta, and T. Senapati, “Modified Floyd–Warshall algorithm for maximum connectivity in wireless sensor network under uncertainty,” Discrete Dyn. Nature Soc., pp. 1–11, 2022. [Google Scholar] [Crossref]
11.
N. Shi, X. Liu, and Y. Guan, “Research on k-means clustering algorithm: An improved k-means clustering algorithm,” in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jian, China, 2010, pp. 63–67. [Google Scholar] [Crossref]
12.
Scikit-Learn-Extra, “KMedoids Demo-scikit-learn-extra 0.2.0 documentation,” 2019. https://Scikit-learn-extra.Readthedocs.io [Google Scholar]
13.
L. A. Zadeh, “Fuzzy logic = computing with words,” IEEE Trans. Fuzzy Syst., vol. 4, no. 2, pp. 103–111, 1996. [Google Scholar] [Crossref]
14.
L. A. Zadeh, “Fuzzy sets,” Inf. Control, vol. 8, no. 3, pp. 338–353, 1965. [Google Scholar] [Crossref]
15.
O. Kulak, H. G. Goren, and A. A. Supciller, “A new multi criteria decision making approach for medical imaging systems considering risk factors,” Appl. Soft Comput., vol. 35, pp. 931–941, 2015. [Google Scholar] [Crossref]
16.
A. D. Amis, R. Prakash, T. H. P. Vuong, and D. T. Huynh, “Max-min d-cluster formation in wireless ad hoc networks,” in Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), Tel Aviv, Israel, 2000, pp. 32–41. [Google Scholar] [Crossref]
17.
S. Basagni, “Distributed clustering for ad hoc networks,” in Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN’99), Perth/Fremantle, WA, Australia, 1999, pp. 310–315. [Google Scholar] [Crossref]
18.
H. Chan and A. Perrig, “ACE: An emergent algorithm for highly uniform cluster formation,” in Wireless Sensor Networks. EWSN 2004. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2004, pp. 154–171. [Google Scholar] [Crossref]
19.
M. Demirbas, A. Arora, and V. Mittal, “FLOC: A fast local clustering service for wireless sensor networks,” in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Florence, Italy, 2004. [Google Scholar]
20.
D. Baker, A. Ephremides, and J. Flynn, “The design and simulation of a mobile radio network with distributed control,” IEEE J. Select. Areas Commun., vol. 2, no. 1, pp. 226–237, 1984. [Google Scholar] [Crossref]
21.
S. Yi, J. Heo, Y. Cho, and J. Hong, “PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks,” Comput. Commun., vol. 30, no. 14–15, pp. 2842–2852, 2007. [Google Scholar] [Crossref]
22.
A. Iranli, M. Maleki, and M. Pedram, “Energy efficient strategies for deployment of a two-level wireless sensor network,” in ISLPED ’05: Proceedings of the 2005 International Symposium on Low Power Electronics and Design, San Diego, CA, USA, 2005, pp. 233–238. [Google Scholar] [Crossref]
23.
P. Kuila and P. K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach,” Eng. Appl. Artif. Intell., vol. 33, pp. 127–140, 2014. [Google Scholar] [Crossref]
24.
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002. [Google Scholar] [Crossref]
25.
H. Hayouni, “EECH/CF: An energy-efficient cluster head election and cluster formation algorithms for WSNs,” Int. J. Sens. Wireless Commun. Control, vol. 12, no. 4, pp. 292–301, 2022. [Google Scholar] [Crossref]
26.
X. Wu and S. Wang, “Performance comparison of LEACH and LEACH-C protocols by NS2,” in 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, Hong Kong, China, 2010, pp. 254–258. [Google Scholar] [Crossref]
27.
H. El Alami and A. Najid, “Energy-efficient fuzzy logic cluster head selection in wireless sensor networks,” in 2016 International Conference on Information Technology for Organizations Development (IT4OD), Fez, Morocco, 2016, pp. 1–7. [Google Scholar] [Crossref]
28.
B. M. Khan, R. Bilal, and R. Young, “Fuzzy-TOPSIS based cluster head selection in mobile wireless sensor networks,” J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 928–943, 2018. [Google Scholar] [Crossref]
29.
P. Azad and V. Sharma, “Cluster head selection in wireless sensor networks under fuzzy environment,” Int. Scholarly Res. Not., pp. 1–8, 2013. [Google Scholar] [Crossref]
30.
S. Sen, L. Sahoo, K. Tiwary, V. Simic, and T. Senapati, “Wireless sensor network lifetime extension via K-medoids and MCDM techniques in uncertain environment,” Appl. Sci., vol. 13, no. 5, p. 3196, 2023. [Google Scholar] [Crossref]
31.
S. Sen, L. Sahoo, K. Tiwary, and T. Senapati, “Entropy weighted TOPSIS based cluster head selection in wireless sensor networks under uncertainty,” Telecom, vol. 4, no. 4, pp. 678–692, 2023. [Google Scholar] [Crossref]
32.
K. P. Sinaga and M. S. Yang, “Unsupervised K-means clustering algorithm,” IEEE Access, vol. 8, pp. 80716–80727, 2020. [Google Scholar] [Crossref]
33.
E. P. Klement, R. Mesiar, and E. Pap, Triangular Norms. Springer Science & Business Media, 2013. [Google Scholar]
34.
B. Schweizer and A. Sklar, Probabilistic Metric Spaces. Dover Publications, 2011. [Google Scholar]

Cite this:
APA Style
IEEE Style
BibTex Style
MLA Style
Chicago Style
Sen, S., Sahoo, L., & Ghosh, S. L. (2024). Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty. J. Ind Intell., 2(1), 54-62. https://doi.org/10.56578/jii020105
S. Sen, L. Sahoo, and S. L. Ghosh, "Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty," J. Ind Intell., vol. 2, no. 1, pp. 54-62, 2024. https://doi.org/10.56578/jii020105
@research-article{Sen2024LifetimeEO,
title={Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty},
author={Supriyan Sen and Laxminarayan Sahoo and Sumanta Lal Ghosh},
journal={Journal of Industrial Intelligence},
year={2024},
page={54-62},
doi={https://doi.org/10.56578/jii020105}
}
Supriyan Sen, et al. "Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty." Journal of Industrial Intelligence, v 2, pp 54-62. doi: https://doi.org/10.56578/jii020105
Supriyan Sen, Laxminarayan Sahoo and Sumanta Lal Ghosh. "Lifetime Extension of Wireless Sensor Networks by Perceptive Selection of Cluster Head Using K-Means and Einstein Weighted Averaging Aggregation Operator under Uncertainty." Journal of Industrial Intelligence, 2, (2024): 54-62. doi: https://doi.org/10.56578/jii020105
cc
©2024 by the author(s). Published by Acadlore Publishing Services Limited, Hong Kong. This article is available for free download and can be reused and cited, provided that the original published version is credited, under the CC BY 4.0 license.