Professional Documents
Culture Documents
A New Preventive Routing Method Based On Clustering and Location Prediction in The Mobile Internet of Things
A New Preventive Routing Method Based On Clustering and Location Prediction in The Mobile Internet of Things
A New Preventive Routing Method Based On Clustering and Location Prediction in The Mobile Internet of Things
Abstract—In the world of the Internet of Things (IoT), wire- plan [3]. IoT provides instant access to information on any
less sensor networks (WSNs) are an impressive technology. These high-efficiency and high-performance device [4]. Forecasts
networks are extremely resource constrained and require the show that by 2020, we will have about 50 billion devices
design of energy-efficient routing techniques. The clustering and
location prediction routing method based on multiple mobile connected, of which nearly 5 billion smart devices are now
sinks (CLRP-MMSs) for the Mobile Internet of Things (MIoT) is connected [2], [3]. Humans will have a tiny share of produc-
presented in this article. Recently, mobile sinks are used in rout- ers and recipients in the massive traffic that will occur [5]. It
ing more durability and energy saving in WSN. In this work, first, illustrates the reason for exploring the world of IoT in different
the entire nodes are divided into clusters, and then each cluster research areas because of its opportunities and challenges.
selects a cluster head (CH) by calculating the CH choosing func-
tion (CHCF). When clustering runs on networks with moving Wireless sensor networks (WSNs) are essential in
nodes, the possibility of disconnecting the nodes from CH nodes IoT [6], [7], as these networks include many vital IoT appli-
will cause a lot of data loss. It will change the amount of energy cations. In an IoT network, just like WSN, the nodes
and rate of data received, but the amount of wasted energy is have batteries that accommodate converters to check and
reduced by predicting the location and reducing the sink and receive data from the environment [5]. Nodes transmit sensed
CH nodes’ distance. The simulation results using NS-2 clearly
showed that the proposed method improves energy consump- data autonomously by preparing wireless networks and using
tion at least 28.12% and increases throughput at least 26.74% embedded wireless radio. They are connected to external
compared to energy efficient routing algorithm with mobile sink networks or the Internet to transmit sensed data to remote
support and high-available and location-predictive data gathering users. Although nodes have severe limitations concerning
scheme using mobile sink methods. battery life, storage, communication, and computing, nodes
Index Terms—Clustering, Internet of Things (IoT), location working together can do a more critical job effectively [8].
prediction, mobile sink, routing protocol, wireless sensor network Hierarchical or clustered routing is a better option for sensor
(WSN). networks than flat routing. In cluster-based approaches, scala-
bility is more important, and these methods try to reduce over-
head. These methods attempt to keep the network performance
I. I NTRODUCTION at an optimum level, although the network may have many
moving nodes [9]. Cluster head (CH) nodes are responsible
HE INTERNET of Things (IoT) is one of the growing
T innovations that allows physical devices to communicate
through heterogeneous networks [1], [2]. This smart grid uses
for receiving data in cluster-based approaches, and besides,
they play a role in controlling the node’s task cycle [10]. CH
nodes are periodically updated to share routing responsibilities
embedded technology to communicate, sense, control, and
between nodes. Clustering can reduce redundant and dupli-
Manuscript received October 12, 2020; revised November 13, 2020 and cate data transfer and also reduces the loss of data. In recent
December 13, 2020; accepted December 23, 2020. Date of publication years, several clustering techniques [11] have been proposed
January 6, 2021; date of current version June 23, 2021. (Corresponding
author: Nima Jafari Navimipour.) to save energy [12]. Based on the existing features, clus-
Mahyar Sadrishojaei is with the Department of Computer Engineering, tering consists of two types: 1) equal and 2) unequal [11].
Science and Research Branch, Islamic Azad University, Tehran, Iran (e-mail: Regarding energy efficiency, the unequal clustering strat-
mahyar_sadri@srbiau.ac.ir).
Nima Jafari Navimipour is with the Future Technology Research egy [13], [14] is more promising than the equal clustering
Center, National Yunlin University of Science and Technology, Douliou strategy.
64002, Taiwan, R.O.C., and also with the Department of Computer In the Mobile Internet of Things (MIoT), the nodes’
Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran (e-mail:
jnnima@yuntech.edu.tw). movement causes many changes in the topology, disrupting
Midia Reshadi is with the Department of Computer Engineering, Science the connection of the CH nodes and the cluster member (CM)
and Research Branch, Islamic Azad University, Tehran, Iran (e-mail: nodes, which results in slow data transfer rates and high
reshadi@srbiau.ac.ir).
Mehdi Hosseinzadeh is with the Institute of Research and Development, data loss. Due to these reasons, in addition to location and
Duy Tan University, Da Nang 550000, Vietnam, and also with the energy, the mobility of nodes is also considered as an essential
Mental Health Research Center, Psychosocial Health Research Institute, factor in clustering techniques, such as low-energy-adaptive
Iran University of Medical Sciences, Tehran, Iran (e-mail: hosseinzadeh.m@
iums.ac.ir). clustering hierarchy mobile enhanced (LEACH-ME) [15],
Digital Object Identifier 10.1109/JIOT.2021.3049631 LEACH-Mobile [16], etc., [17], [18].
2327-4662
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10653
In many wireless networks, nodes with less distance algorithm is one of the disadvantages of this method due to
from the sink have more traffic than nodes beyond the fault tolerance and security problems in MA use.
sink [10], [19], so mobile sinks are used as an effective solu- Also, Koosheshi and Ebadi [29] have proposed unequal
tion to this problem in WSN. The benefits of sink mobility clustering with multiple sinks using fuzzy logic, considering
are as follows. First, the problem of “hot spots” [20]–[22] the residual energy, the distance to the nearest rendezvous
is greatly reduced by moving the sink. Second, it reduces nodes (RNs), and the calculated density as the input variables
overall energy consumption [23]–[25]. Third, it increases of fuzzy logic. It means that these variables are considered to
network throughput. Finally, under distributed or separate measure the competitive radius of each experimental CH node.
sensor networks, connectivity can be guaranteed. Although It has also created and proposed a way to select the mobile
introducing sink mobility has many benefits, it presents some sink path intelligently. This method increases the lifespan of
problems and challenges. The mobile sink location must be the network. Still, optimizing the mobile sink movement path
repeatedly broadcast or predicted by the nodes, which may and using multiple mobile sinks are some of the weaknesses
increase the network load. The sink mobility pattern must also of this method.
use an optimized design to work well for data transfer [26]. In Gharaei et al. [30] have presented the collaborative mobile
this work, a method for location prediction and cluster rout- sink sojourn time optimization (CMS2TO) scheme to optimize
ing is proposed to help multiple mobile sinks reduce energy the duration of MS stay in each cluster to balance the lifespan
consumption, increase reliability, and network lifetime. of CH nodes in different network layers. Many mobility-
Briefly, the contributions of the presented method are based schemes use unpredictable mobility patterns, which
summarized as follows. increase energy consumption. The CMS2TO uses a collabora-
1) Presenting a method for solving a routing problem of tive scheme in which all CH nodes work together to calculate
MIoT using clustering and location prediction routing the mobile sink residence time in each cluster, which gives
method based on multiple mobile sinks (CLRP-MMSs). the CH nodes balanced longevity. CMS2TO increases network
2) Modeling the location prediction, clustering network, lifespan, the number of live nodes, and the amount of residual
and highlighting their features. energy. However, it does not support node mobility and is not
3) Offering a routing method for the optimization of life- suitable for large-scale networks.
time and energy consumption. Furthermore, Kim and Chung [16] have presented
4) Evaluating the performance of clustered routing and a mobile-based protocol for WSN that supports moving
location prediction with multiple mobiles sinks. nodes for a typical “hot zone” environment. The introduced
The remainder of this article is as follows. Section II reviews protocol goes beyond LEACH by reducing data packet loss
the previous related work. Section III contains CLRP-MMS for moving nodes. It sends a message that transmits the
with details. Section IV provides performance evaluation. data transfer request to the mobile sensor node from the
Finally, the conclusion and future work are discussed in cluster within a specified time interval in the time division
Section V. multiple access (TDMA) schedule. Because the moving
node and the CH node confirm that the moving node is
in a particular cluster and in the same time slot in the
TDMA, it has better network quality and data transfer than
II. L ITERATURE R EVIEW LEACH. However, compared to LEACH, the energy lost is
Wang et al. [27] have described energy-efficient increased.
dynamic routing with mobile sinks based on clustering Vahabi et al. [31] have described the integration of geo-
for WSN. Depending on the residual energy, the CH nodes graphic and hierarchical routing (IoGHR) with mobile sinks
are selected. The lifespan of the WSN is extended by optimal to save energy in the WSN. The network model used in IoGHR
routes and the limitation of sending update messages to a cer- consists of the main section with many virtual parts, each
tain number of CH nodes. The CH node changing mechanism containing a CH node. The direction of the movement of
reduces the hotspot problem. The lack of support of unequal the mobile sink is predetermined and is moving back and
clusters and node mobility are the main disadvantages of this forth inside the virtual parts of the central section. This algo-
method. rithm increases the lifetime of the network by increasing the
Sasirekha and Swamynathan [28] have introduced a routing amount of remaining energy. IoGHR has less latency and
algorithm called cluster chain mobile agent routing cluster- higher delivery ratio than existing algorithms, but it does not
ing (CCMAR) that deploys WSN in several clusters that run consider a variety of topics, such as optimal route and multiple
in two steps. In the first step, nodes in the cluster are performed mobile sinks.
chain formation to aggregate the data into the CH nodes. In In addition, Zhu et al. [32] have proposed a high-available
the second step, a mobile agent (MA) from the sink node is and location-predictive data gathering scheme using mobile
sent to collect data from all the CH nodes. CCMAR is better sinks (HALPDGSMSSs). In this strategy, time sync helps
than LEACH and PEGASIS in terms of power consumption, nodes find sink locations, thereby reducing nodes’ power con-
transmission latency, and network lifetime. Data collection sumption to update sink locations; also, data collection will
by different routing methods seems to be greatly affected by generally continue if some sinks are unable to work. One can
the underlying network topology. The MA is computationally also balance the energy consumption of the nodes near sta-
superior, but effective dissemination of information on this tionary points by adjusting the direction of a mobile sink’s
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10654 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
TABLE I
S IDE - BY-S IDE C OMPARISON OF D ISCUSSING THE C LUSTERING M ECHANISM
movement. However, when the nodes are mobile, and there is for selecting the CH nodes in this method is the amount
an obstacle in the place of residence, the data upload to the of distance. This scheme reduces the power consumption of
mobile sink is significantly affected. nodes and AUVs as well as delays in data collection. It
Huang et al. [33] have explained a low-cost baseline also increases network lifetime. Select optimized secondary
data-based verifiable trust evaluation (BD-VTE) security CHs to optimize network performance further. Lack of sup-
scheme that includes effective trust assessment, ratio- port for multiple MAs for data collection and the nonoptimal
nal incentives, and route adjustment. This method uses selection of CH nodes are the most critical weaknesses of
unmanned aerial vehicles (UAVs) to assess the reliability this article.
of mobile vehicles (MVs). The BD-VTE design increases Finally, Wang et al. [36] have suggested the energy effi-
accuracy and improves data collection. The cost of collect- cient routing algorithm with mobile sink support (EERAMSS)
ing information is more logical, and security is also ensured as effective ways to improve WSN performance. This method
more effectively. High overload, lack of support for clus- first divides all the different nodes into several segments of
tering, and high complexity are the disadvantages of this the same size and selects a CH node for each segment accord-
method. ing to its member weight. CM nodes calculate the path with
In addition, Li et al. [34] have described trust data collec- optimal energy consumption for data transfer in single-hop and
tions in the smart IoT (T-SIoTs). To optimize security, the multihop to relevant CH nodes. Subsequently, the CH nodes
data center (DC) selects trusted vehicles as mobile collectors adopt a greedy method to form chains for cluster communica-
through analysis and then builds several static data collection tion. The authors investigated the effect of various parameters
stations to ensure coverage of all data areas. DC uses UAVs on network performance and improved it. A disadvantage of
to collect data from trusted vehicles and static stations. In this this method is the lack of support for the nodes’ mobility,
scheme, the first short path for UAVs is designed to reduce which disrupts the network’s communication.
UAV energy consumption. Improving security in T-SIoTs is A side-by-side comparison of the methods examined in clus-
another advantage of this method. Unfortunately, the cost of tering with their main advantages and disadvantages is shown
this method is high, and it has a high overload. in Table I. The main problem with the studied methods in
Huang et al. [35] have presented a low-latency, energy- this section is high energy consumption, lack of support for
efficient, and reliable marine data collection scheme using node mobility, and incompatibility with mobile sinks. In the
AUV. In this article, clustering has been investigated using proposed method, the mentioned cases are solved using mobile
K-means, AUV path optimization through a greedy algorithm, sinks and selecting the CH node and the sink information
and data collection based on matrix completion. The criterion exchange point.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10655
A. System Model
Assuming N and S are the numbers of nodes and sinks, coefficient of transfer amplification in open space. The ampli-
in which the path of mobile sinks is circular and predictable, fication coefficient is shown by εmp when sending multipath.
these paths are ring shaped. Uneven clusters are formed based threshold for nodes is set to d0 and is usually
The transfer
on these paths in different segments. Mobile sinks have unlim- equal to (εfs /εmp ) [40]. For the l bits in the receiver, the
ited battery power, high storage capacity, and ample computing amount of energy consumed by the receiver is the ERX value
power. IoT devices continuously monitor the environment and specified by the following [38]:
send the collected data to the mobile sinks through their CH
nodes [37]. The intracluster transition is planned in TDMA. ERX (l) = l × Eelec . (2)
CH nodes receive data from CM nodes and transmit the Environmental monitoring programs require proper
compressed data to the mobile sinks through single-hop com- data routing to utilize network energy. In this article, the
munications. Transferring single-hop data to mobile sinks number of segments is determined by their angle, then the
is a very effective way to extend the lifetime of wireless clusters are formed, and the CH node is selected based on
networks. Since the nodes are mobile and, in many cases, it is the appropriate function. Finally, by moving the sinks in the
not possible to replace their batteries and also the power con- specified paths, the data are collected from the CH nodes.
sumption has the most critical priority, the proposed method
uses a one-hop connection between CM nodes to CH nodes as
B. Problem Statements
well from CH nodes to the sink, but this data transfer model
may cause network latency. In recent years, WSN is evolving rapidly and is used to collect
It is necessary to consider the following logical assumptions environmental information. In the past, only static nodes were
in the system model. Fig. 1 shows an overview of the network used to collect environmental information, but today, with the
model. advancement of technology, mobile nodes are being used to
1) Homogeneous nodes are randomly distributed. gather information [8]. Nodes in an IoT network produce data at
2) The initial energy of the nodes is the same. fast speeds and send it to the sink for specific purposes [41].
3) All nodes are aware of their speed and location. In this work, a cluster-based method with multiple mobile
4) The mobile sinks have unlimited battery power and high sinks is used. The mobile sink, which is usually mounted
storage capacity. on a high-powered MV, begins its periodic movement from
5) Data transmission and reception are the most important a certain point and finally returns. The data of CH nodes
energy consumption activities. are collected during the move. After planning the route, the
6) All links have sufficient data transfer capacity mobile sink can move near the CH nodes and collects the
In this method, the power consumption ETX per node is data. Therefore, it consumes less energy. Although it is more
related to the distance to the destination node and the size of challenging to implement hierarchical routing when nodes are
data sent and is obtained by the following [38], [39]: moving, the combination of location prediction and clustering
techniques in IoT networks works successfully.
l × Eelec + l × εfs × d2 , if d < d0 In this method, the sinks are mobile and move very close to
ETX (l, d) = (1)
l × Eelec + l × εmp × d4 , if d ≥ d0 . the CH node to receive the collected data. Therefore, the path
loss between the CH node and the sink is negligible. Besides,
l and d represent the number of data bits sent and the dis- due to the proximity of the sink to the CH node at the time
tance to the receiving node, respectively. The energy consumed of data collection, the probability of error is minimal, and no
per bit is given by Eelec when transmitting data εfs represent the data retransfer is required.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10656 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10657
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10658 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10659
follows [32]:
tr = SP(ts + tm ). (12)
Tc is the length of time a mobile sink passes in RDL, which
can be calculated by the following [32]:
t
tc = t − (tr + ta ) (13)
tr + ta
tc
p= . (14)
ts + tm
Parameters p and t represent the number of passed stop
points and the time elapsed, respectively.
The CH node that needs data transfer calculates the mobile
sink’s current position using (15)–(23) equations
(tc − ts p)Vsi
θ= . (15)
Fig. 10. Positions of mobile sinks after t. 2π Rsi
IF
πr
Therefore, the nodes of one part of the network will not be 0 < (tc − ts p)Vsi < . (16)
2
destroyed sooner than the other parts, and the network will Then
have a longer lifetime. The predictions of mobile sinks depend
on the CH node’s clock’s sync and the calibration of the Location(t) = (cos θ Rsi , sin θ Rsi ). (17)
location information.
IF
The mobile sink has its clock as well as every node in the πr
network. The loose time sync is the first step during a receive < (tc − ts p)Vsi < π r. (18)
2
data period (RDP). When a mobile sink enters the network,
it broadcasts a motion preparation (MP) message to the entire Then
π
π
network. The MP message contains information of the start Location(t) = −sin θ − Rsi , cos θ − Rsi . (19)
point of the mobile sink S(x, y), current time t, mobile sink 2 2
speed Vsi , the number of stop points on the route, the resi- IF
dence time at each stop point, and the radius of the circular 3π r
π r < (tc − ts p)Vsi < . (20)
route r. Moving mobile sinks to the starting points is done 2
after broadcasting the MP messages and the time sync [57]. Then
As shown in Fig. 9, the coupled sinks MS1 and MS1 reach the
starting points 1SP1 and 2SP1 , respectively. Location(t) = (−cos(θ − π )Rsi , −sin(θ − π )Rsi ). (21)
After finishing broadcasting MP messages, each mobile sink IF
starts moving along a predetermined route and resides at stop 3π r
points for data collection, then returns to the starting point, < (tc − ts p)Vsi < 2π. (22)
waits for a fixed time ta (the period can be used to set the 2
route) and repeat the previous process. This iteration process Then
is called a receive data loop (RDL). The sink radio receiver 3π 3π
Location(t) = sin θ − Rsi , cos θ − Rsi . (23)
is on at stop points only, and receiving data from CH nodes 2 2
only occurs at stop points. The stop time in stop points is ts In the wireless propagation energy model, the power trans-
and the interval of movement between the two stopping points mission level is related to the distance’s square. So, more
is denoted by tm . SP represents the number of multiple stop distance means higher energy consumption. To reduce the
points, and they are evenly distributed along the sink path. energy consumption in the CH nodes, selecting the nearest
It is assumed that all mobile sinks have the same ts and tm , connection point is proposed. The CH nodes select one of the
concerning the above, the tm is obtained by (11) to facilitate two stop points for data exchange according to the calculation
the prediction of CH nodes for mobile sinks for all moving of speed and time to have more energy storage.
sinks to have the same RDL length This method uses location prediction, and each cluster can
K use two stop points for data transfer. So, considering the CH
SP = (10) node movement and time’s velocity and direction, the stop
2
2π Rsi points where the exchange of information between the CH
tm = (11) node and the mobile sink occurs is selected. It will reduce
SP ∗ Vsi
energy consumption. In Fig. 11, you can see that CH6 selects
where Rsi represents the radius of the movement of each one of the two points 2SP2 or 2SP3 for the data transfer, as
mobile sink. Tr is the time of each RDL calculated in as mentioned above. The following equations determine the angle
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10660 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
Fig. 11. Example of choosing 2SP2 or 2SP3 by CH6 according to the speed
and direction of movement in C6.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10661
TABLE III
S IMULATION PARAMETERS
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10662 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10663
the same cluster, and a location prediction plan with multiple [20] G. Wang, J. Cao, H. Wang, and M. Guo, “Polynomial regression for
mobile sinks was also suggested. The CH nodes do the cal- data gathering in environmental monitoring applications,” in Proc. IEEE
Global Telecommun. Conf. (IEEE GLOBECOM), 2007, pp. 1307–1311.
culation of the location of the moving sinks according to the [21] G. Han, X. Yang, L. Liu, and W. Zhang, “A joint energy replenishment
time sync. The simulation results showed that this proposed and data collection algorithm in wireless rechargeable sensor networks,”
method improves energy consumption, increases network life- IEEE Internet Things J., vol. 5, no. 4, pp. 2596–2604, Aug. 2018.
[22] J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim, “An intelligent
time and throughput, and reduces node mobility’s destructive data gathering schema with data fusion supported for mobile sink in
effects. wireless sensor networks,” Int. J. Distrib. Sens. Netw., vol. 15, no. 3,
In the future, we can try to optimize the CLRP-MMS with 2019, Art. no. 15501477198.
the obstacle scenario and look for the optimal path of different [23] C. Chen, J. Ma, and K. Yu, “Designing energy-efficient wireless sensor
networks with mobile sinks,” in Proc. ACM Int. Workshop (WSNA),
mobile sinks. It is also possible to test real scenarios to show 2006.
the abilities of the proposed method. [24] E. Ekici, Y. Gu, and D. Bozdag, “Mobility-based communication
in wireless sensor networks,” IEEE Commun. Mag., vol. 44, no. 7,
pp. 56–62, Sep. 2006.
[25] G. Han, L. Liu, S. Chan, R. Yu, and Y. Yang, “HySense: A hybrid
R EFERENCES mobile crowdsensing framework for sensing opportunities compensa-
[1] L. Atzori, A. Iera, and G. Morabito, “Understanding the Internet of tion under dynamic coverage constraint,” IEEE Commun. Mag., vol. 55,
Things: Definition, potentials, and societal role of a fast evolving no. 3, pp. 93–99, Mar. 2017.
paradigm,” Ad Hoc Netw., vol. 56, pp. 122–140, Mar. 2017. [26] J. Wang, Y. Gao, C. Zhou, R. S. Sherratt, and L. Wang, “Optimal
[2] M. Hamzei and N. J. Navimipour, “Toward efficient service composition coverage multi-path scheduling scheme with multiple mobile sinks for
techniques in the Internet of Things,” IEEE Internet Things J., vol. 5, WSNs,” Comput. Mater. Continua, vol. 62, no. 2, pp. 695–711, 2020.
no. 5, pp. 3774–3787, Oct. 2018. [27] J. Wang, J. Cao, S. Ji, and J. H. Park, “Energy-efficient cluster-based
[3] J. Chase, The Evolution of the Internet of Things, vol. 1. Dallas, TX, dynamic routes adjustment approach for wireless sensor networks with
USA: Texas Instrum., 2013. mobile sinks,” J. Supercomput., vol. 73, no. 7, pp. 3277–3290, 2017.
[4] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and [28] S. Sasirekha and S. Swamynathan, “Cluster-chain mobile agent routing
challenges in technology and standardization,” Wireless Pers. Commun., algorithm for efficient data aggregation in wireless sensor network,” J.
vol. 58, no. 1, pp. 49–69, 2011. Commun. Netw., vol. 19, no. 4, pp. 392–401, Aug. 2017.
[5] L. Tan and N. Wang. “Future Internet: The Internet of Things,” in Proc. [29] K. Koosheshi and S. Ebadi, “Optimization energy consumption with
3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), pp. 376–380, 2010. multiple mobile sinks using fuzzy logic in wireless sensor networks,”
[6] Z. Ghanbari, N. J. Navimipour, M. Hosseinzadeh, and A. Darwesh, Wireless Netw., vol. 25, no. 3, pp. 1215–1234, 2019.
“Resource allocation mechanisms and approaches on the Internet of [30] N. Gharaei, K. A. Bakar, S. Z. M. Hashim, A. H. Pourasl, and S. A. Butt,
Things,” Clust. Comput., vol. 22, no. 4, pp. 1253–1282, 2019. “Collaborative mobile sink sojourn time optimization scheme for cluster-
[7] X. Liu, T. Qiu, B. Dai, L. Yang, A. Liu, and J. Wang, “Swarm based wireless sensor networks,” IEEE Sensors J., vol. 18, no. 16,
intelligence-based rendezvous selection via edge computing for mobile pp. 6669–6676, Aug. 2018.
sensor networks,” IEEE Internet Things J., vol. 7, no. 10, pp. 9471–9480, [31] S. Vahabi, M. Eslaminejad, and S. E. Dashti, “Integration of geo-
Oct. 2020. graphic and hierarchical routing protocols for energy saving in wireless
[8] M. Narendran and P. Prakasam, “An energy aware competition based sensor networks with mobile sink,” Wireless Netw., vol. 25, no. 5,
clustering for cluster head selection in wireless sensor network with pp. 2953–2961, 2019.
mobility,” Clust. Comput., vol. 22, no. 5, pp. 11019–11028, 2019. [32] C. Zhu, K. Quan, G. Han, and J. J. P. C. Rodrigues, “A high-available and
[9] B. Pourghebleh and N. J. Navimipour, “Towards efficient data collection location predictive data gathering scheme with mobile sinks for wireless
mechanisms in the vehicular ad hoc networks,” Int. J. Commun. Syst., sensor networks,” Comput. Netw., vol. 145, pp. 156–164, Nov. 2018.
vol. 32, no. 5, 2019, Art. no. e3893. [33] S. Huang, A. Liu, S. Zhang, T. Wang, and N. Xiong, “BD-VTE: A novel
[10] A. Pushpalatha and G. Kousalya, “A prolonged network life time and baseline data based verifiable trust evaluation scheme for smart network
reliable data transmission aware optimal sink relocation mechanism,” systems,” IEEE Trans. Netw. Sci. Eng., early access, Aug. 7, 2020,
Clust. Comput., vol. 22, no. 5, pp. 12049–12058, 2019. doi: 10.1109/TNSE.2020.3014455.
[11] M. M. Afsar and M.-H. Tayarani-N, “Clustering in sensor networks: [34] T. Li, W. Liu, T. Wang, Z. Ming, X. Li, and M. Ma, “Trust data col-
A literature survey,” J. Netw. Comput. Appl., vol. 46, pp. 198–226, lections via vehicles joint with unmanned aerial vehicles in the smart
Nov. 2014. Internet of Things,” Trans. Emerg. Telecommun. Technol., Art. no. e3956,
[12] N. Choudhury, R. Matam, M. Mukherjee, J. Lloret, and E. Kalaimannan, 2020.
“NCHR: A nonthreshold-based cluster-head rotation scheme for IEEE [35] M. Huang, K. Zhang, Z. Zeng, T. Wang, and Y. Liu, “An AUV-assisted
802.15.4 cluster-tree networks,” IEEE Internet Things J., vol. 8, no. 1, data gathering scheme based on clustering and matrix completion for
pp. 168–178, Jan. 2021. smart ocean,” IEEE Internet Things J., vol. 7, no. 10, pp. 9904–9918,
[13] D. Wei, Y. Jin, S. Vural, K. Moessner, and R. Tafazolli, “An energy- Oct. 2020.
efficient clustering solution for wireless sensor networks,” IEEE Trans. [36] J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim, “Energy
Wireless Commun., vol. 10, no. 11, pp. 3973–3983, Nov. 2011. efficient routing algorithm with mobile sink support for wireless sensor
[14] H. Li, Y. Liu, W. Chen, W. Jia, B. Li, and J. Xiong, “COCA: networks,” Sensors, vol. 19, no. 7, p. 1494, 2019.
Constructing optimal clustering architecture to maximize sensor network [37] B. Pourghebleh, K. Wakil, and N. J. Navimipour, “A comprehensive
lifetime,” Comput. Commun., vol. 36, no. 3, pp. 256–268, 2013. study on the trust management techniques in the Internet of Things,”
[15] G. S. Kumar, M. V. V. Paul, G. Athithan, and K. P. Jacob, “Routing IEEE Internet Things J., vol. 6, no. 6, pp. 9326–9337, Dec. 2019.
protocol enhancement for handling node mobility in wireless sensor [38] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-
networks,” in Proc. IEEE Region 10 Conf., 2008, pp. 1–6. efficient communication protocol for wireless microsensor networks,”
[16] D.-S. Kim and Y.-J. Chung, “Self-organization routing protocol sup- in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., 2000, pp. 1–10.
porting mobile nodes for wireless sensor network,” in Proc. 1st Int. [39] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An
Multi-Symp. Comput. Comput. Sci. (IMSCCS), 2006, pp. 622–626. application-specific protocol architecture for wireless microsensor
[17] A. Nayebi and H. Sarbazi-Azad, “Performance modeling of the LEACH networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,
protocol for mobile wireless sensor networks,” J. Parallel Distrib. Oct. 2002.
Comput., vol. 71, no. 6, pp. 812–821, 2011. [40] V. Srividhya and T. Shankar, “Energy proficient clustering technique
[18] S. Ali, S. A. Madani, A. ur Rehman Khan, and I. A. Khan, “Routing pro- for lifetime enhancement of cognitive radio–based heterogeneous wire-
tocols for mobile sensor networks: A comparative study,” 2014. [Online]. less sensor network,” Int. J. Distrib. Sens. Netw., vol. 14, no. 3, 2018,
Available: arXiv:1403.3162. Art. no. 1550147718767598.
[19] W. K. Lai, C. S. Fan, and L. Y. Lin, “Arranging cluster sizes and trans- [41] P. Azad, N. J. Navimipour, A. M. Rahmani, and A. Sharifi , “The role of
mission ranges for wireless sensor networks,” Inf. Sci., vol. 183, no. 1, structured and unstructured data managing mechanisms in the Internet
pp. 117–131, 2012. of Things,” Clust. Comput., vol. 23, no. 2, pp. 1185–1198, 2020.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10664 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021
[42] K. Ramesh and D. K. Somasundaram, “A comparative study of cluster- Nima Jafari Navimipour received the B.S. degree
head selection algorithms in wireless sensor networks,” 2012. [Online]. in computer engineering and software engineering
Available: arXiv:1205.1673. from Tabriz Branch, Islamic Azad University, Tabriz,
[43] A. Al-Baz and A. El-Sayed, “Energy-aware enhancement of LEACH Iran, in 2007, the M.Sc. degree in computer engi-
protocol in wireless sensor network,” in Proc. 5th Int. Conf. Comput. neering, computer architecture, from Tabriz Branch,
Theory Appl. (ICCTA), pp. 144–149, 2015. Islamic Azad University in 2009, and the Ph.D.
[44] S. Soro and W. B. Heinzelman, “Cluster head election techniques for degree in computer engineering, computer architec-
coverage preservation in wireless sensor networks,” Ad Hoc Netw., vol. 7, ture, from Science and Research Branch, Islamic
no. 5, pp. 955–972, 2009. Azad University, Tehran, Iran, in 2014.
[45] M. B. Yassein, Y. Khamayseh, and W. Mardini, “Improvement on He has published many papers in various journals
LEACH protocol of wireless sensor network (VLEACH),” Int. J. Digit. and conference proceedings. His research interests
Content Technol. Appl., vol. 3, no. 2, p. 13, 2009. include cloud computing, IoT, traffic control, computational intelligence,
[46] R. ELkamel and A. Cherif, “Energy-efficient routing protocol to improve evolutionary computing, and wireless networks.
energy consumption in wireless sensors networks,” Int. J. Commun.
Syst., vol. 30, no. 17, 2017, Art. no. e3360.
[47] R. Tarighi, K. Farajzadeh, and H. Hematkhah, “Prolong network life-
time and improve efficiency in WSN-UAV systems using new clustering
parameters and CSMA modification,” Int. J. Commun. Syst., vol. 33,
no. 7, 2020, Art. no. e4324.
[48] J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H.-J. Kim, “An empower
hamilton loop based data collection algorithm with mobile agent for
WSNs,” Human-centric Comput. Inf. Sci., vol. 9, no. 1, p. 18, 2019.
[49] M. F. Khan, F. Aadil, M. Maqsood, S. H. R. Bukhari, and M. Hussain,
“Moth flame clustering algorithm for Internet of Vehicle (MFCA-IoV),”
IEEE Access, vol. 7, pp. 11613–11629, 2018.
[50] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed
clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile
Comput., vol. 3, no. 4, pp. 366–379, Oct.–Dec. 2004.
[51] L. Yu, N. Wang, W. Zhang, and C. Zheng, “GROUP: A grid-clustering
routing protocol for wireless sensor networks,” in Proc. Int. Conf.
Wireless Commun. Netw. Mobile Comput., pp. 1–5, 2006.
[52] H. Lin, L. Wang, and R. Kong, “Energy efficient clustering protocol Midia Reshadi received B.Sc. degree in computer
for large-scale sensor networks,” IEEE Sensors J., vol. 15, no. 12, engineering from Arak Branch of Islamic Azad
pp. 7150–7160, Dec. 2015. University, Arak, Iran, in 2003. He also received the
[53] J. Wang, Y. Gao, W. Liu, W. Wu, and S.-J. Lim, “An asynchronous M.Sc. and Ph.D. degrees in computer architecture
clustering and mobile data gathering schema based on timer mechanism from the Science and Research Branch of Islamic
in wireless sensor networks,” Comput. Mater. Continua, vol. 58, no. 3, Azad University, Tehran, Iran, in 2005 and 2010,
pp. 711–725, 2019. respectively.
[54] A. Mehmood, S. Khan, B. Shams, and J. Lloret, “Energy-efficient He is currently an Assistant Professor with the
multi-level and distance-aware clustering mechanism for WSNs,” Int. Department of Computer Engineering, Science and
J. Commun. Syst., vol. 28, no. 5, pp. 972–989, 2015. Research Branch of Azad University since 2010. His
[55] A. Al-Baz and A. El-Sayed, “A new algorithm for cluster head selection research interests are Network-on-chip, including
in LEACH protocol for wireless sensor networks,” Int. J. Commun. Syst., performance and cost improvement in topology, routing and application-
vol. 31, no. 1, 2018, Art. no. e3407. mapping design levels of various types of NoCs, such as 3D, photonic, and
[56] B. Pourghebleh and N. J. Navimipour, “Data aggregation mechanisms wireless. Recently, he has started carrying out research in NoC based deep
in the Internet of Things: A systematic review of the literature and neural network accelerators and Silicon interposer based NoC with his team
recommendations for future research,” J. Netw. Comput. Appl., vol. 97, consists of M.Sc. and Ph.D. students.
pp. 23–34, Nov. 2017.
[57] J. Wang, Y. Gao, X. Yin, F. Li, and H.-J. Kim, “An enhanced
PEGASIS algorithm with mobile sink support for wireless sensor
networks,” Wireless Commun. Mobile Comput., vol. 2018, Jan. 2018,
Art. no. 9472075.
[58] J. Wang, Y. Gao, K. Wang, A. K. Sangaiah, and S.-J. Lim, “An affinity
propagation-based self-adaptive clustering method for wireless sensor
networks,” Sensors, vol. 19, no. 11, p. 2579, 2019.
[59] A. Jain, M. Khari, E. Verdú, S. Omatsu, and R. G. Crespo, “A route
selection approach for variable data transmission in wireless sensor
networks,” Clust. Comput., vol. 23, pp. 1697–1709, Apr. 2020.
[60] O. Ibrihich, S.-D. Krit, J. Laassiri, and S. El Hajji “Study and simula-
tion of protocols of WSN using NS2,” in Transactions on Engineering
Technologies. Dordrecht, The Netherlands, Springer, 2015, pp. 467–480.
Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.