A New Preventive Routing Method Based On Clustering and Location Prediction in The Mobile Internet of Things

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

10652 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO.

13, JULY 1, 2021

A New Preventive Routing Method Based on


Clustering and Location Prediction in the
Mobile Internet of Things
Mahyar Sadrishojaei , Nima Jafari Navimipour , Midia Reshadi, and Mehdi Hosseinzadeh

Abstract—In the world of the Internet of Things (IoT), wire- plan [3]. IoT provides instant access to information on any
less sensor networks (WSNs) are an impressive technology. These high-efficiency and high-performance device [4]. Forecasts
networks are extremely resource constrained and require the show that by 2020, we will have about 50 billion devices
design of energy-efficient routing techniques. The clustering and
location prediction routing method based on multiple mobile connected, of which nearly 5 billion smart devices are now
sinks (CLRP-MMSs) for the Mobile Internet of Things (MIoT) is connected [2], [3]. Humans will have a tiny share of produc-
presented in this article. Recently, mobile sinks are used in rout- ers and recipients in the massive traffic that will occur [5]. It
ing more durability and energy saving in WSN. In this work, first, illustrates the reason for exploring the world of IoT in different
the entire nodes are divided into clusters, and then each cluster research areas because of its opportunities and challenges.
selects a cluster head (CH) by calculating the CH choosing func-
tion (CHCF). When clustering runs on networks with moving Wireless sensor networks (WSNs) are essential in
nodes, the possibility of disconnecting the nodes from CH nodes IoT [6], [7], as these networks include many vital IoT appli-
will cause a lot of data loss. It will change the amount of energy cations. In an IoT network, just like WSN, the nodes
and rate of data received, but the amount of wasted energy is have batteries that accommodate converters to check and
reduced by predicting the location and reducing the sink and receive data from the environment [5]. Nodes transmit sensed
CH nodes’ distance. The simulation results using NS-2 clearly
showed that the proposed method improves energy consump- data autonomously by preparing wireless networks and using
tion at least 28.12% and increases throughput at least 26.74% embedded wireless radio. They are connected to external
compared to energy efficient routing algorithm with mobile sink networks or the Internet to transmit sensed data to remote
support and high-available and location-predictive data gathering users. Although nodes have severe limitations concerning
scheme using mobile sink methods. battery life, storage, communication, and computing, nodes
Index Terms—Clustering, Internet of Things (IoT), location working together can do a more critical job effectively [8].
prediction, mobile sink, routing protocol, wireless sensor network Hierarchical or clustered routing is a better option for sensor
(WSN). networks than flat routing. In cluster-based approaches, scala-
bility is more important, and these methods try to reduce over-
head. These methods attempt to keep the network performance
I. I NTRODUCTION at an optimum level, although the network may have many
moving nodes [9]. Cluster head (CH) nodes are responsible
HE INTERNET of Things (IoT) is one of the growing
T innovations that allows physical devices to communicate
through heterogeneous networks [1], [2]. This smart grid uses
for receiving data in cluster-based approaches, and besides,
they play a role in controlling the node’s task cycle [10]. CH
nodes are periodically updated to share routing responsibilities
embedded technology to communicate, sense, control, and
between nodes. Clustering can reduce redundant and dupli-
Manuscript received October 12, 2020; revised November 13, 2020 and cate data transfer and also reduces the loss of data. In recent
December 13, 2020; accepted December 23, 2020. Date of publication years, several clustering techniques [11] have been proposed
January 6, 2021; date of current version June 23, 2021. (Corresponding
author: Nima Jafari Navimipour.) to save energy [12]. Based on the existing features, clus-
Mahyar Sadrishojaei is with the Department of Computer Engineering, tering consists of two types: 1) equal and 2) unequal [11].
Science and Research Branch, Islamic Azad University, Tehran, Iran (e-mail: Regarding energy efficiency, the unequal clustering strat-
mahyar_sadri@srbiau.ac.ir).
Nima Jafari Navimipour is with the Future Technology Research egy [13], [14] is more promising than the equal clustering
Center, National Yunlin University of Science and Technology, Douliou strategy.
64002, Taiwan, R.O.C., and also with the Department of Computer In the Mobile Internet of Things (MIoT), the nodes’
Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran (e-mail:
jnnima@yuntech.edu.tw). movement causes many changes in the topology, disrupting
Midia Reshadi is with the Department of Computer Engineering, Science the connection of the CH nodes and the cluster member (CM)
and Research Branch, Islamic Azad University, Tehran, Iran (e-mail: nodes, which results in slow data transfer rates and high
reshadi@srbiau.ac.ir).
Mehdi Hosseinzadeh is with the Institute of Research and Development, data loss. Due to these reasons, in addition to location and
Duy Tan University, Da Nang 550000, Vietnam, and also with the energy, the mobility of nodes is also considered as an essential
Mental Health Research Center, Psychosocial Health Research Institute, factor in clustering techniques, such as low-energy-adaptive
Iran University of Medical Sciences, Tehran, Iran (e-mail: hosseinzadeh.m@
iums.ac.ir). clustering hierarchy mobile enhanced (LEACH-ME) [15],
Digital Object Identifier 10.1109/JIOT.2021.3049631 LEACH-Mobile [16], etc., [17], [18].
2327-4662 
c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10653

In many wireless networks, nodes with less distance algorithm is one of the disadvantages of this method due to
from the sink have more traffic than nodes beyond the fault tolerance and security problems in MA use.
sink [10], [19], so mobile sinks are used as an effective solu- Also, Koosheshi and Ebadi [29] have proposed unequal
tion to this problem in WSN. The benefits of sink mobility clustering with multiple sinks using fuzzy logic, considering
are as follows. First, the problem of “hot spots” [20]–[22] the residual energy, the distance to the nearest rendezvous
is greatly reduced by moving the sink. Second, it reduces nodes (RNs), and the calculated density as the input variables
overall energy consumption [23]–[25]. Third, it increases of fuzzy logic. It means that these variables are considered to
network throughput. Finally, under distributed or separate measure the competitive radius of each experimental CH node.
sensor networks, connectivity can be guaranteed. Although It has also created and proposed a way to select the mobile
introducing sink mobility has many benefits, it presents some sink path intelligently. This method increases the lifespan of
problems and challenges. The mobile sink location must be the network. Still, optimizing the mobile sink movement path
repeatedly broadcast or predicted by the nodes, which may and using multiple mobile sinks are some of the weaknesses
increase the network load. The sink mobility pattern must also of this method.
use an optimized design to work well for data transfer [26]. In Gharaei et al. [30] have presented the collaborative mobile
this work, a method for location prediction and cluster rout- sink sojourn time optimization (CMS2TO) scheme to optimize
ing is proposed to help multiple mobile sinks reduce energy the duration of MS stay in each cluster to balance the lifespan
consumption, increase reliability, and network lifetime. of CH nodes in different network layers. Many mobility-
Briefly, the contributions of the presented method are based schemes use unpredictable mobility patterns, which
summarized as follows. increase energy consumption. The CMS2TO uses a collabora-
1) Presenting a method for solving a routing problem of tive scheme in which all CH nodes work together to calculate
MIoT using clustering and location prediction routing the mobile sink residence time in each cluster, which gives
method based on multiple mobile sinks (CLRP-MMSs). the CH nodes balanced longevity. CMS2TO increases network
2) Modeling the location prediction, clustering network, lifespan, the number of live nodes, and the amount of residual
and highlighting their features. energy. However, it does not support node mobility and is not
3) Offering a routing method for the optimization of life- suitable for large-scale networks.
time and energy consumption. Furthermore, Kim and Chung [16] have presented
4) Evaluating the performance of clustered routing and a mobile-based protocol for WSN that supports moving
location prediction with multiple mobiles sinks. nodes for a typical “hot zone” environment. The introduced
The remainder of this article is as follows. Section II reviews protocol goes beyond LEACH by reducing data packet loss
the previous related work. Section III contains CLRP-MMS for moving nodes. It sends a message that transmits the
with details. Section IV provides performance evaluation. data transfer request to the mobile sensor node from the
Finally, the conclusion and future work are discussed in cluster within a specified time interval in the time division
Section V. multiple access (TDMA) schedule. Because the moving
node and the CH node confirm that the moving node is
in a particular cluster and in the same time slot in the
TDMA, it has better network quality and data transfer than
II. L ITERATURE R EVIEW LEACH. However, compared to LEACH, the energy lost is
Wang et al. [27] have described energy-efficient increased.
dynamic routing with mobile sinks based on clustering Vahabi et al. [31] have described the integration of geo-
for WSN. Depending on the residual energy, the CH nodes graphic and hierarchical routing (IoGHR) with mobile sinks
are selected. The lifespan of the WSN is extended by optimal to save energy in the WSN. The network model used in IoGHR
routes and the limitation of sending update messages to a cer- consists of the main section with many virtual parts, each
tain number of CH nodes. The CH node changing mechanism containing a CH node. The direction of the movement of
reduces the hotspot problem. The lack of support of unequal the mobile sink is predetermined and is moving back and
clusters and node mobility are the main disadvantages of this forth inside the virtual parts of the central section. This algo-
method. rithm increases the lifetime of the network by increasing the
Sasirekha and Swamynathan [28] have introduced a routing amount of remaining energy. IoGHR has less latency and
algorithm called cluster chain mobile agent routing cluster- higher delivery ratio than existing algorithms, but it does not
ing (CCMAR) that deploys WSN in several clusters that run consider a variety of topics, such as optimal route and multiple
in two steps. In the first step, nodes in the cluster are performed mobile sinks.
chain formation to aggregate the data into the CH nodes. In In addition, Zhu et al. [32] have proposed a high-available
the second step, a mobile agent (MA) from the sink node is and location-predictive data gathering scheme using mobile
sent to collect data from all the CH nodes. CCMAR is better sinks (HALPDGSMSSs). In this strategy, time sync helps
than LEACH and PEGASIS in terms of power consumption, nodes find sink locations, thereby reducing nodes’ power con-
transmission latency, and network lifetime. Data collection sumption to update sink locations; also, data collection will
by different routing methods seems to be greatly affected by generally continue if some sinks are unable to work. One can
the underlying network topology. The MA is computationally also balance the energy consumption of the nodes near sta-
superior, but effective dissemination of information on this tionary points by adjusting the direction of a mobile sink’s

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10654 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

TABLE I
S IDE - BY-S IDE C OMPARISON OF D ISCUSSING THE C LUSTERING M ECHANISM

movement. However, when the nodes are mobile, and there is for selecting the CH nodes in this method is the amount
an obstacle in the place of residence, the data upload to the of distance. This scheme reduces the power consumption of
mobile sink is significantly affected. nodes and AUVs as well as delays in data collection. It
Huang et al. [33] have explained a low-cost baseline also increases network lifetime. Select optimized secondary
data-based verifiable trust evaluation (BD-VTE) security CHs to optimize network performance further. Lack of sup-
scheme that includes effective trust assessment, ratio- port for multiple MAs for data collection and the nonoptimal
nal incentives, and route adjustment. This method uses selection of CH nodes are the most critical weaknesses of
unmanned aerial vehicles (UAVs) to assess the reliability this article.
of mobile vehicles (MVs). The BD-VTE design increases Finally, Wang et al. [36] have suggested the energy effi-
accuracy and improves data collection. The cost of collect- cient routing algorithm with mobile sink support (EERAMSS)
ing information is more logical, and security is also ensured as effective ways to improve WSN performance. This method
more effectively. High overload, lack of support for clus- first divides all the different nodes into several segments of
tering, and high complexity are the disadvantages of this the same size and selects a CH node for each segment accord-
method. ing to its member weight. CM nodes calculate the path with
In addition, Li et al. [34] have described trust data collec- optimal energy consumption for data transfer in single-hop and
tions in the smart IoT (T-SIoTs). To optimize security, the multihop to relevant CH nodes. Subsequently, the CH nodes
data center (DC) selects trusted vehicles as mobile collectors adopt a greedy method to form chains for cluster communica-
through analysis and then builds several static data collection tion. The authors investigated the effect of various parameters
stations to ensure coverage of all data areas. DC uses UAVs on network performance and improved it. A disadvantage of
to collect data from trusted vehicles and static stations. In this this method is the lack of support for the nodes’ mobility,
scheme, the first short path for UAVs is designed to reduce which disrupts the network’s communication.
UAV energy consumption. Improving security in T-SIoTs is A side-by-side comparison of the methods examined in clus-
another advantage of this method. Unfortunately, the cost of tering with their main advantages and disadvantages is shown
this method is high, and it has a high overload. in Table I. The main problem with the studied methods in
Huang et al. [35] have presented a low-latency, energy- this section is high energy consumption, lack of support for
efficient, and reliable marine data collection scheme using node mobility, and incompatibility with mobile sinks. In the
AUV. In this article, clustering has been investigated using proposed method, the mentioned cases are solved using mobile
K-means, AUV path optimization through a greedy algorithm, sinks and selecting the CH node and the sink information
and data collection based on matrix completion. The criterion exchange point.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10655

III. P ROPOSED M ETHOD


This section introduces a new method called CLRP-MMS to
overcome the various problems of previous mechanisms. This
method is more efficient in the number of live nodes, the total
energy consumption, and packets received by the sink. The
main advantages of the proposed method and its differences
from the existing methods include the following.
1) Node mobility supporting.
2) Simultaneous implementation of clustering and location
prediction.
3) On-demand reclustering.
4) Using multiple mobile sinks.
The following sections describe the CLRP-MMS method in
detail. The first section discussed the system model; next, the
problem statement is expressed; finally, the proposed routing
method has been provided. Fig. 1. Network model (the colored circles are the nodes and the arrows
indicate their direction of movement).

A. System Model
Assuming N and S are the numbers of nodes and sinks, coefficient of transfer amplification in open space. The ampli-
in which the path of mobile sinks is circular and predictable, fication coefficient is shown by εmp when sending multipath.
these paths are ring shaped. Uneven clusters are formed based  threshold for nodes is set to d0 and is usually
The transfer
on these paths in different segments. Mobile sinks have unlim- equal to (εfs /εmp ) [40]. For the l bits in the receiver, the
ited battery power, high storage capacity, and ample computing amount of energy consumed by the receiver is the ERX value
power. IoT devices continuously monitor the environment and specified by the following [38]:
send the collected data to the mobile sinks through their CH
nodes [37]. The intracluster transition is planned in TDMA. ERX (l) = l × Eelec . (2)
CH nodes receive data from CM nodes and transmit the Environmental monitoring programs require proper
compressed data to the mobile sinks through single-hop com- data routing to utilize network energy. In this article, the
munications. Transferring single-hop data to mobile sinks number of segments is determined by their angle, then the
is a very effective way to extend the lifetime of wireless clusters are formed, and the CH node is selected based on
networks. Since the nodes are mobile and, in many cases, it is the appropriate function. Finally, by moving the sinks in the
not possible to replace their batteries and also the power con- specified paths, the data are collected from the CH nodes.
sumption has the most critical priority, the proposed method
uses a one-hop connection between CM nodes to CH nodes as
B. Problem Statements
well from CH nodes to the sink, but this data transfer model
may cause network latency. In recent years, WSN is evolving rapidly and is used to collect
It is necessary to consider the following logical assumptions environmental information. In the past, only static nodes were
in the system model. Fig. 1 shows an overview of the network used to collect environmental information, but today, with the
model. advancement of technology, mobile nodes are being used to
1) Homogeneous nodes are randomly distributed. gather information [8]. Nodes in an IoT network produce data at
2) The initial energy of the nodes is the same. fast speeds and send it to the sink for specific purposes [41].
3) All nodes are aware of their speed and location. In this work, a cluster-based method with multiple mobile
4) The mobile sinks have unlimited battery power and high sinks is used. The mobile sink, which is usually mounted
storage capacity. on a high-powered MV, begins its periodic movement from
5) Data transmission and reception are the most important a certain point and finally returns. The data of CH nodes
energy consumption activities. are collected during the move. After planning the route, the
6) All links have sufficient data transfer capacity mobile sink can move near the CH nodes and collects the
In this method, the power consumption ETX per node is data. Therefore, it consumes less energy. Although it is more
related to the distance to the destination node and the size of challenging to implement hierarchical routing when nodes are
data sent and is obtained by the following [38], [39]: moving, the combination of location prediction and clustering
techniques in IoT networks works successfully.

l × Eelec + l × εfs × d2 , if d < d0 In this method, the sinks are mobile and move very close to
ETX (l, d) = (1)
l × Eelec + l × εmp × d4 , if d ≥ d0 . the CH node to receive the collected data. Therefore, the path
loss between the CH node and the sink is negligible. Besides,
l and d represent the number of data bits sent and the dis- due to the proximity of the sink to the CH node at the time
tance to the receiving node, respectively. The energy consumed of data collection, the probability of error is minimal, and no
per bit is given by Eelec when transmitting data εfs represent the data retransfer is required.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10656 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

Fig. 2. Different phases of the method.

Fig. 4. Segmentation of the whole network.

collect data. Because when only one sink is used, in some


cases, an inappropriate and considerable distance between the
CH node and the sink increases energy consumption. Also,
a lot of data are sent to the sink, which causes a lot of traffic
and overload. In this article, the number of clusters should be
even due to two mobile sinks. The ANG, which represents
each cluster’s angle in the network, is determined by

ANG = K
(3)
2
where K represents the number of clusters used in this work.
In Fig. 4, an example of a network segmentation based on the
angle calculated from (3) can be observed.
Fig. 3. Stages of the setup phase. Fig. 5 shows an example of a network with unequal clusters
containing 12 clusters C1 , C2 , . . . , C12 .
The number of nodes in each segment and each cluster is
C. Proposed Routing Method calculated from the following equations.
The WSN operation uses a round-based approach that ANG
ni = n ∗ (4)
involves two main phases. Setup is the first phase and 2π
includes network deployment, cluster creation, CH selec- (2i − 1)
nci = ni ∗ (i = 1 to 2) (5)
tion, and reclustering. The second one is the communication 4
phase that defines the intracluster and intercluster relationship where ni specifies the number of nodes in each segment and
between nodes, CH, and sink. The number of rounds depends nci represents the number of nodes in each cluster (each cluster
on network usage and lifetime. The phases of the research are has nci − 1 CM nodes and only one CH node).
generally significant in Fig. 2. 2) CH Selection: Choosing the CH node is a complicated
Setup Phase: This phase is about cluster creation, electing task because several factors must be considered to select the
CH, and reclustering. In the CLRP-MMS method, all nodes cluster’s best node. New surveys conducted on the LEACH
are eligible to become CH nodes and are selected through algorithm indicate that most CH selections are based on
a new function. There are three subphases in this phase, cluster node distance from the sink or the residual energy [42]–[45].
creation, CH selection, and reclustering. The steps of the setup Still, mobility can cause a node to leave a cluster, disrupting
phase, with its general description, are shown in Fig. 3. data transfer and destroying a cluster’s stability. Therefore,
1) Cluster Creation: This new method uses multiple mobile besides the above-mentioned factors, paying attention to
sinks instead of a fixed sink, where each sink is responsible slower nodes as desirable candidates is very important. In this
for a certain number of clusters that can prevent data conflict article, for the first round, the closest node to the cluster’s cen-
from being sent to the mobile sink. In this subphase first, tral area (Fig. 6) becomes CH since all nodes have the same
the entire nodes are divided into several segments, and the energy [46].
number of mobile sinks determines the number of clusters. After the first round, when the CH node needs to be selected,
The number of sinks was used to determine the angles of nodes calculate its CH choosing function (CHCF) using (6)
the segments. The proposed method uses two mobile sinks to based on the sum of distances between nodes, mobility speed,

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10657

Fig. 7. CH selection scheme.

Fig. 5. Example of cluster creation. TABLE II


E XAMPLE OF C HCF VALUES

In CHCF, Eres specifies the remaining energy of a node, d


specifies the total amount of node distance from other nodes,
Vn the velocity of each node, and ED shows the Euclidean dis-
tance (ED) between nodes. W1 , W2 , and W3 are the coefficients
of the importance degree of each mentioned factor and the sum
of their values is equal to 1 [48]

 d

ED(q, p) =  (qi − pi )2 (8)
i=1
Fig. 6. Node closest to the center of the cluster (pink oval) is selected as
 i −1
the CH.
i−1
 nc 
di = ED CMi , CHj + ED CHi , CHj
j=1 j=i+1
+ ED(CHi , CHi ). (9)
and the remaining energy in the node and sends the value to
the current CH node [47]. Factors affecting the CHCF are not The ED between nodes p and q indicates the linear length
of equal value, so a coefficient is considered for each due to its between them and is expressed by (8). To obtain the sum of
importance. The node with the highest CHCF value is selected the distances in a cluster, we use the ED function, given that
as the new CH node for the next round by the CH node in the there are nc nodes in each cluster, and it is assumed that the
same cluster. It broadcasts the location of the new CH node node i is a CH node. In the first two parts of (9) [49], each
to the CM nodes. Nodes with the highest remaining energy node’s total distance from the CM nodes is determined. Also,
and the lowest spatial distance are more likely to be CH node. in the third part of (9), the distance from the CH node is added
Besides, nodes with lower speeds are less likely to leave the to the previous two values.
cluster range, so they are a better option to be chosen as CH Fig. 7 shows a sample of clusters with six nodes in which
nodes. Compared to the centralized clustering algorithm, the the value of the distance between two nodes is visible on edge.
CH node’s reselection is a distributed method in which the The amount of remaining energy and velocity of the nodes is
sink does not interfere, so it requires less power consumption also presented next to each node. Table II is an example of
for the control packet transfer a CHCF calculation, according to (6). The values of W1 , W2 ,
and W3 are 0.5, 0.35, and 0.15, respectively. As it is clear from
W1 Eres the values, D is selected as the CH node.
CHCF = (6) 3) Reclustering: The reclustering plays a vital role in the
(W2 d) ∗ W3 Vn

3 routing because the loads applied to CH nodes are much heav-
Wi = 1. (7) ier than those applied to normal nodes that cause the energy
i=1 of CH nodes to decrease rapidly. If a CH node does not work

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10658 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

Fig. 8. Steps of the communication phase.

correctly, all data in this cluster will be lost. Therefore, to


prevent CH node failure [39], [50], [51], the reclustering pro-
cess must be done periodically [23]. Selecting the right value
for the reclustering interval is very complicated. If the value Fig. 9. Path of mobile sinks MS1 and MS2 with start points 1SP1 and 2SP1.
is too small (clustering is performed for each data-gathering
cycle [19]), there will be a lot of network overload. Besides, the list when it does not send any data in two consecutive
during clustering, the network cannot perform any other activ- frames [16], and related nodes are notified of the updated
ity. However, when a very large value is selected, due to a high TDMA schedule. Cumulative ack is used to manage mobility,
probability that a CH node’s energy will be discharged during which is distributed by CH node after each frame. CH node
data collection [52], the packet loss is significantly increased. confirms receiving information from its nodes. If a node does
In the alternative method, reclustering is only allowed when not receive a confirmation message from its CH node, it is
the CH node energy is lower than a certain value [19], [53]. orphaned because of its mobility. The orphan node requests
It can prevent packet loss due to CH node failure. Because of and cooperates with the new CH node by sending a join
the above, the following is suggested based on the analysis. request (JReq). When a new node joins a cluster, the CH node
1) A new CH node is selected from the existing nodes updates its list and updates its TDMA schedule and then shares
when the current CH node’s residual energy is lower it with all the CMs. In this network, the nodes in one clus-
than a predetermined energy threshold T. In this study, ter are not allowed to communicate with other cluster nodes.
T is set to 30% of the initial energy. When a node can communicate with another node of neigh-
2) Reclustering is performed instead of the entire network boring clusters, it avoids this connection, saving more energy
in each cluster as needed. This type of local reclustering in the node [54].
avoids imposing additional overhead on the network. After the data transfer of all the CM nodes in the cluster is
Communication Phase: This phase is related to the completed, the CH node starts data processing. The CH node
CM nodes’ communication to the CH node and then the aggregates data to eliminate any redundancy and compresses
CH node to the mobile sink. The CLRP-MMS method data as far as possible for fair use of bandwidth [10], [56].
uses a single-hop design during intercluster and intracluster CH nodes are then ready to transfer the data to the sink by
communications [26]. Intracluster and intercluster communi- single-hop communications.
cations are two parts of this phase. The steps of the com- 5) Intercluster Communication: There are different types of
munication phase, with its general description, are shown in motion for a mobile sink. In this study, the predictive mobility
Fig. 8. of the sink was used. When the mobile sink path is constantly
The membership message is sent to the neighboring nodes changing, and there is a need for frequent updates of the sink
by the node selected as the CH. If a node receives this mes- position, the total energy consumption in the network will
sage from two or more CHs, the CH node with the highest increase, and many collisions will occur. Besides, the proposed
received signal strength (RSS) is selected. Hence, this process method supports several mobile sinks in the network, which
avoids cluster overlap, which, in turn, extends the network will cause less energy consumption in the network. According
lifetime [54]. The CH node provides the TDMA schedule for to the sink’s schedule and position, CH nodes transmit data to
cluster management and optimal energy consumption of the the sink at the appropriate time based on the periodic motion.
CM nodes, which determines each node’s sleep and wake As shown in Fig. 9, the mobile sink’s motion model is circular
status. Data transfer is performed according to the time slot with constant angular velocity.
assigned to each CM node. Idle nodes are always switched off 1SP1 and 2SP1 are assumed to be the starting points for
except CH nodes. After the data are delivered from the CM mobile sinks, and after a time interval t, the mobile sinks
nodes, the data are aggregated by the CH node and sent to the move to the new stop points 1SP2 and 2SP2 , as shown in
sink [8], [55]. This process is then continued to drain all the Fig. 10 [57]. The predetermined paths are at a good dis-
energy of the nodes. tance from each other and are designed in the network’s
4) Intracluster Communication: The list of nodes for each right position, which minimizes energy consumption. In other
cluster exists in the CH node. Each node is omitted from words, energy consumption is distributed among the nodes.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10659

follows [32]:
tr = SP(ts + tm ). (12)
Tc is the length of time a mobile sink passes in RDL, which
can be calculated by the following [32]:


t
tc = t − (tr + ta ) (13)
tr + ta


tc
p= . (14)
ts + tm
Parameters p and t represent the number of passed stop
points and the time elapsed, respectively.
The CH node that needs data transfer calculates the mobile
sink’s current position using (15)–(23) equations
(tc − ts p)Vsi
θ= . (15)
Fig. 10. Positions of mobile sinks after t. 2π Rsi
IF
πr
Therefore, the nodes of one part of the network will not be 0 < (tc − ts p)Vsi < . (16)
2
destroyed sooner than the other parts, and the network will Then
have a longer lifetime. The predictions of mobile sinks depend
on the CH node’s clock’s sync and the calibration of the Location(t) = (cos θ Rsi , sin θ Rsi ). (17)
location information.
IF
The mobile sink has its clock as well as every node in the πr
network. The loose time sync is the first step during a receive < (tc − ts p)Vsi < π r. (18)
2
data period (RDP). When a mobile sink enters the network,
it broadcasts a motion preparation (MP) message to the entire Then
π π
network. The MP message contains information of the start Location(t) = −sin θ − Rsi , cos θ − Rsi . (19)
point of the mobile sink S(x, y), current time t, mobile sink 2 2
speed Vsi , the number of stop points on the route, the resi- IF
dence time at each stop point, and the radius of the circular 3π r
π r < (tc − ts p)Vsi < . (20)
route r. Moving mobile sinks to the starting points is done 2
after broadcasting the MP messages and the time sync [57]. Then
As shown in Fig. 9, the coupled sinks MS1 and MS1 reach the
starting points 1SP1 and 2SP1 , respectively. Location(t) = (−cos(θ − π )Rsi , −sin(θ − π )Rsi ). (21)
After finishing broadcasting MP messages, each mobile sink IF
starts moving along a predetermined route and resides at stop 3π r
points for data collection, then returns to the starting point, < (tc − ts p)Vsi < 2π. (22)
waits for a fixed time ta (the period can be used to set the 2
route) and repeat the previous process. This iteration process Then
     
is called a receive data loop (RDL). The sink radio receiver 3π 3π
Location(t) = sin θ − Rsi , cos θ − Rsi . (23)
is on at stop points only, and receiving data from CH nodes 2 2
only occurs at stop points. The stop time in stop points is ts In the wireless propagation energy model, the power trans-
and the interval of movement between the two stopping points mission level is related to the distance’s square. So, more
is denoted by tm . SP represents the number of multiple stop distance means higher energy consumption. To reduce the
points, and they are evenly distributed along the sink path. energy consumption in the CH nodes, selecting the nearest
It is assumed that all mobile sinks have the same ts and tm , connection point is proposed. The CH nodes select one of the
concerning the above, the tm is obtained by (11) to facilitate two stop points for data exchange according to the calculation
the prediction of CH nodes for mobile sinks for all moving of speed and time to have more energy storage.
sinks to have the same RDL length This method uses location prediction, and each cluster can
K use two stop points for data transfer. So, considering the CH
SP = (10) node movement and time’s velocity and direction, the stop
2
2π Rsi points where the exchange of information between the CH
tm = (11) node and the mobile sink occurs is selected. It will reduce
SP ∗ Vsi
energy consumption. In Fig. 11, you can see that CH6 selects
where Rsi represents the radius of the movement of each one of the two points 2SP2 or 2SP3 for the data transfer, as
mobile sink. Tr is the time of each RDL calculated in as mentioned above. The following equations determine the angle

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10660 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

Fig. 11. Example of choosing 2SP2 or 2SP3 by CH6 according to the speed
and direction of movement in C6.

at which each CH node is located. Also, concerning this angle


and the time factor, they determine which stop point is best
suited for data transmission


⎪ if x > 0, y > 0 → β = tan−1 xy

if x < 0, y > 0 → β = π − tan−1 xy Fig. 12. Flowchart of the proposed method.
(24)

⎪ if x < 0, y < 0 → β = π + tan−1 xy

if x > 0, y < 0 → β = 2π − tan−1 xy
 
β simultaneously for optimal energy management and through-
m= . (25) put improvement. Also, the reclustering policy contributes to
ANG
the superiority of this method. The following sections are
m specifies which network segment each CH node belongs planned for testing variables and their values.
to.
In each cluster, the CH node distance with SPm−1 at interval
t + (m − 1)ts + (m − 1)tm is compared to CH node distance A. Simulation Tool
with SPm at interval t + mts + mtm and lower value, chosen as NS-2 version 2.35 is used to evaluate the performance of
the data transfer point to reduce energy consumption. many variables in the WSN environment, and the MATLAB
The general trend of this method is shown as a flowchart R2017a simulation environment is used to show and plot the
in Fig. 12. After the nodes are established and the system is result of the proposed method. NS-2 is used in many articles
configured, clusters are formed. The most important part of for WSN simulation because it has the following advantages
the setup phase is the CH node selection [58]. This stage is over other simulators or languages [60].
done in the first round only based on the node distance from 1) Flexibility and modular nature.
the cluster center. Still, in other rounds, the factors in CHCF 2) It includes countless models of the new standard wireless
are used, which include speed, distance, and residual energy. protocols.
In the communication phase, the CM nodes send their data to 3) Also, due to the nature of its opensource, NS-2 has
CH nodes, and the CH nodes transfer the received data to the different levels of configuration.
mobile sinks at appropriate times [58], [59]. 4) Able to modify several parameters in separate layers
and have the ability to create custom applications and
IV. P ERFORMANCE E VALUATION protocols.
In this section, CLRP-MMS’s performance is com-
pared to EERAMSS [36] and HALPDGSMS [32], specifi-
cally designed for the routing problem. This method’s B. Simulation Parameters
advantages are the energy consumption, the network life (the The simulation parameters must be adjusted to simulate the
number of live nodes in a given period during the simu- proposed method better and obtain more reliable results. The
lation), and throughput. The novelty of this method is that same network model is assumed for different methods to eval-
all mobile nodes are clustered, and instead of using a fixed uate the performance fairly. Table III shows the parameters for
sink, the moving type is used. Two mobile sinks are used simulating the network model in NS-2.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10661

TABLE III
S IMULATION PARAMETERS

Fig. 14. Data delivery latency.

2) Delay: In Fig. 14, the delay or data delivery latency of


the HALPDGSMS, EERAMSS, and this work is compared.
In these two methods, location prediction is not performed to
find the nearest sink and CH node stop points, and data trans-
fer is possible at each stop point. Therefore, HALPDGSMS
and EERAMSS have a less delivery delay. Another reason for
further delay in this method is the use of single-hop communi-
cation, where the CH nodes can communicate with the mobile
sinks only at the stop points specified for each cluster.
3) Throughput: Reduced power consumption of nodes
increases network lifetime by increasing the number of live
nodes. This increment over the network’s lifetime increases
the performance of data collection and transmission over the
Fig. 13. Percentage of alive nodes.
network. The throughput shows the ratio between packets sent
and received successfully at the destination. There will be a
better performance when this ratio is larger. Fig. 15 shows
C. Results and Analysis the throughput diagram of the three methods. The proposed
These sections show the simulation results by comparing method is 32.12% better than the HALPDGSMS’s method
the performance of the methods to obtain the sum of energy, and shows a 26.74% improvement compared to EERAMSS’s
lifetime, delay, throughput, and the number of dead nodes. method. The CH nodes in this method are only reselected if
1) Lifetime: Network lifetime depends on the number needed. It results in energy balancing between the nodes in the
of live nodes in a network. If nodes continue to live cluster and improving the whole network’s throughput whereas
longer, the data collection will take longer, thereby pro- compared to the other two methods. The EERAMSS does not
longing network performance and increasing data delivery use the optimal method to reselect the CH nodes, and the
to the sink. The number of live nodes (dependent on the HALPDGSMS does not support clustering. Another influen-
number of rounds) is visible in Fig. 13. It represents a com- tial factor is the CLRP-MMS method that selects the optimal
parison of the number of alive nodes of CLRP-MMS, stopping point for transferring data to the mobile sinks under
EERAMSS, and HALPDGSMS. It is clear that for the first a predefined pattern. This pattern protects energy and improves
153 rounds, the number of live nodes for EERAMSS is the throughput. Although HALPDGSMS and EERAMSS use
same as HALPDGSMS and CLRP-MMS. After round 153, a mobile sink with a predictable path, in some cases, the
CLRP-MMS is better than other methods. This method’s nonoptimal stopping point is selected, and energy consumption
advantage is the simultaneous use of node residual energy, increases.
node speed, and node distances in CH node selection. Another 4) Sum of Energy: The sum of energy consumption as the
important factor is in CLRP-MMS, CH nodes find the clos- main parameter of the operating nodes is required to per-
est stop point to sinks and direct their data to reduce energy form various tasks. Fig. 16 compares the energy consumption
consumption and increase lifetime. However, in the other two across all methods. As shown in the diagram, the CLRP-MMS
methods, the nodes cannot send their information to the closest method performs better and consumes 34.61% and 28.12%
stop points and use the multihop transfer. less energy than the EERAMSS and HALPDGSMS methods,

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10662 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

Fig. 17. Energy consumption with different node sensing radius.

Fig. 15. Total percent of the successfully transmitted packet.

Fig. 18. Number of dead nodes.

increases the network’s lifetime. The first HALPDGSMS


node dies at 750 rounds, and the first EERAMSS node
Fig. 16. Comparison of total energy consumption.
dies at 770 rounds. In contrast, it happens for this work at
1120 rounds. The power consumption of the control pack-
ets during the selection of the new CH node affects the
respectively. The reason for this better performance is the
network’s lifetime. In the CLRP-MMS method, reclustering is
simultaneous use of the following.
done locally and only when needed, resulting in the exchange
1) Selecting the CH nodes using an optimized function.
of fewer control packets between CM nodes and CH node.
2) Reclustering only when necessary.
Therefore, adjusting the appropriate threshold value for reclus-
3) Location prediction and stop point selection with the
tering is very important. In this method, 30% of the remaining
least distance to move data.
energy was considered and implemented. This threshold value
In Fig. 17, the energy consumption is evaluated when the
result is better than others, which greatly improves the lifespan
node sensing radius varies from 5 to 30 m. It has been
of the network and reduces the number of dead nodes.
observed that as the sensing radius and the energy consumption
increases as the node accuracy decreases. In CLRP-MMS, the
distance between the CH node and mobile sinks is reduced V. C ONCLUSION
due to selecting the appropriate stop point for data trans- Considering the importance of energy and lifespan in
fer. However, the HALPDGSMS method does not use the designing routing methods, a great deal of research is being
clustering method, and in EERAMSS, the optimal stop-point done to achieve optimal energy consumption and extend the
selection is not performed. The above explanations related to lifespan. Clustering is one of the most effective ways in this
location prediction and clustering in the CLRP-MMS method regard. In this article, first, all the nodes were divided into
make the proposed method superior in all ranges. several clusters of unequal sizes and then select CH nodes
5) Dead Node: Fig. 18 shows that this new method can according to CHCF. The CH node rotates locally as neces-
save more energy on nodes and networks, which significantly sary for balanced energy consumption between the nodes in

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
SADRISHOJAEI et al.: NEW PREVENTIVE ROUTING METHOD BASED ON CLUSTERING AND LOCATION PREDICTION 10663

the same cluster, and a location prediction plan with multiple [20] G. Wang, J. Cao, H. Wang, and M. Guo, “Polynomial regression for
mobile sinks was also suggested. The CH nodes do the cal- data gathering in environmental monitoring applications,” in Proc. IEEE
Global Telecommun. Conf. (IEEE GLOBECOM), 2007, pp. 1307–1311.
culation of the location of the moving sinks according to the [21] G. Han, X. Yang, L. Liu, and W. Zhang, “A joint energy replenishment
time sync. The simulation results showed that this proposed and data collection algorithm in wireless rechargeable sensor networks,”
method improves energy consumption, increases network life- IEEE Internet Things J., vol. 5, no. 4, pp. 2596–2604, Aug. 2018.
[22] J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim, “An intelligent
time and throughput, and reduces node mobility’s destructive data gathering schema with data fusion supported for mobile sink in
effects. wireless sensor networks,” Int. J. Distrib. Sens. Netw., vol. 15, no. 3,
In the future, we can try to optimize the CLRP-MMS with 2019, Art. no. 15501477198.
the obstacle scenario and look for the optimal path of different [23] C. Chen, J. Ma, and K. Yu, “Designing energy-efficient wireless sensor
networks with mobile sinks,” in Proc. ACM Int. Workshop (WSNA),
mobile sinks. It is also possible to test real scenarios to show 2006.
the abilities of the proposed method. [24] E. Ekici, Y. Gu, and D. Bozdag, “Mobility-based communication
in wireless sensor networks,” IEEE Commun. Mag., vol. 44, no. 7,
pp. 56–62, Sep. 2006.
[25] G. Han, L. Liu, S. Chan, R. Yu, and Y. Yang, “HySense: A hybrid
R EFERENCES mobile crowdsensing framework for sensing opportunities compensa-
[1] L. Atzori, A. Iera, and G. Morabito, “Understanding the Internet of tion under dynamic coverage constraint,” IEEE Commun. Mag., vol. 55,
Things: Definition, potentials, and societal role of a fast evolving no. 3, pp. 93–99, Mar. 2017.
paradigm,” Ad Hoc Netw., vol. 56, pp. 122–140, Mar. 2017. [26] J. Wang, Y. Gao, C. Zhou, R. S. Sherratt, and L. Wang, “Optimal
[2] M. Hamzei and N. J. Navimipour, “Toward efficient service composition coverage multi-path scheduling scheme with multiple mobile sinks for
techniques in the Internet of Things,” IEEE Internet Things J., vol. 5, WSNs,” Comput. Mater. Continua, vol. 62, no. 2, pp. 695–711, 2020.
no. 5, pp. 3774–3787, Oct. 2018. [27] J. Wang, J. Cao, S. Ji, and J. H. Park, “Energy-efficient cluster-based
[3] J. Chase, The Evolution of the Internet of Things, vol. 1. Dallas, TX, dynamic routes adjustment approach for wireless sensor networks with
USA: Texas Instrum., 2013. mobile sinks,” J. Supercomput., vol. 73, no. 7, pp. 3277–3290, 2017.
[4] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and [28] S. Sasirekha and S. Swamynathan, “Cluster-chain mobile agent routing
challenges in technology and standardization,” Wireless Pers. Commun., algorithm for efficient data aggregation in wireless sensor network,” J.
vol. 58, no. 1, pp. 49–69, 2011. Commun. Netw., vol. 19, no. 4, pp. 392–401, Aug. 2017.
[5] L. Tan and N. Wang. “Future Internet: The Internet of Things,” in Proc. [29] K. Koosheshi and S. Ebadi, “Optimization energy consumption with
3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), pp. 376–380, 2010. multiple mobile sinks using fuzzy logic in wireless sensor networks,”
[6] Z. Ghanbari, N. J. Navimipour, M. Hosseinzadeh, and A. Darwesh, Wireless Netw., vol. 25, no. 3, pp. 1215–1234, 2019.
“Resource allocation mechanisms and approaches on the Internet of [30] N. Gharaei, K. A. Bakar, S. Z. M. Hashim, A. H. Pourasl, and S. A. Butt,
Things,” Clust. Comput., vol. 22, no. 4, pp. 1253–1282, 2019. “Collaborative mobile sink sojourn time optimization scheme for cluster-
[7] X. Liu, T. Qiu, B. Dai, L. Yang, A. Liu, and J. Wang, “Swarm based wireless sensor networks,” IEEE Sensors J., vol. 18, no. 16,
intelligence-based rendezvous selection via edge computing for mobile pp. 6669–6676, Aug. 2018.
sensor networks,” IEEE Internet Things J., vol. 7, no. 10, pp. 9471–9480, [31] S. Vahabi, M. Eslaminejad, and S. E. Dashti, “Integration of geo-
Oct. 2020. graphic and hierarchical routing protocols for energy saving in wireless
[8] M. Narendran and P. Prakasam, “An energy aware competition based sensor networks with mobile sink,” Wireless Netw., vol. 25, no. 5,
clustering for cluster head selection in wireless sensor network with pp. 2953–2961, 2019.
mobility,” Clust. Comput., vol. 22, no. 5, pp. 11019–11028, 2019. [32] C. Zhu, K. Quan, G. Han, and J. J. P. C. Rodrigues, “A high-available and
[9] B. Pourghebleh and N. J. Navimipour, “Towards efficient data collection location predictive data gathering scheme with mobile sinks for wireless
mechanisms in the vehicular ad hoc networks,” Int. J. Commun. Syst., sensor networks,” Comput. Netw., vol. 145, pp. 156–164, Nov. 2018.
vol. 32, no. 5, 2019, Art. no. e3893. [33] S. Huang, A. Liu, S. Zhang, T. Wang, and N. Xiong, “BD-VTE: A novel
[10] A. Pushpalatha and G. Kousalya, “A prolonged network life time and baseline data based verifiable trust evaluation scheme for smart network
reliable data transmission aware optimal sink relocation mechanism,” systems,” IEEE Trans. Netw. Sci. Eng., early access, Aug. 7, 2020,
Clust. Comput., vol. 22, no. 5, pp. 12049–12058, 2019. doi: 10.1109/TNSE.2020.3014455.
[11] M. M. Afsar and M.-H. Tayarani-N, “Clustering in sensor networks: [34] T. Li, W. Liu, T. Wang, Z. Ming, X. Li, and M. Ma, “Trust data col-
A literature survey,” J. Netw. Comput. Appl., vol. 46, pp. 198–226, lections via vehicles joint with unmanned aerial vehicles in the smart
Nov. 2014. Internet of Things,” Trans. Emerg. Telecommun. Technol., Art. no. e3956,
[12] N. Choudhury, R. Matam, M. Mukherjee, J. Lloret, and E. Kalaimannan, 2020.
“NCHR: A nonthreshold-based cluster-head rotation scheme for IEEE [35] M. Huang, K. Zhang, Z. Zeng, T. Wang, and Y. Liu, “An AUV-assisted
802.15.4 cluster-tree networks,” IEEE Internet Things J., vol. 8, no. 1, data gathering scheme based on clustering and matrix completion for
pp. 168–178, Jan. 2021. smart ocean,” IEEE Internet Things J., vol. 7, no. 10, pp. 9904–9918,
[13] D. Wei, Y. Jin, S. Vural, K. Moessner, and R. Tafazolli, “An energy- Oct. 2020.
efficient clustering solution for wireless sensor networks,” IEEE Trans. [36] J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim, “Energy
Wireless Commun., vol. 10, no. 11, pp. 3973–3983, Nov. 2011. efficient routing algorithm with mobile sink support for wireless sensor
[14] H. Li, Y. Liu, W. Chen, W. Jia, B. Li, and J. Xiong, “COCA: networks,” Sensors, vol. 19, no. 7, p. 1494, 2019.
Constructing optimal clustering architecture to maximize sensor network [37] B. Pourghebleh, K. Wakil, and N. J. Navimipour, “A comprehensive
lifetime,” Comput. Commun., vol. 36, no. 3, pp. 256–268, 2013. study on the trust management techniques in the Internet of Things,”
[15] G. S. Kumar, M. V. V. Paul, G. Athithan, and K. P. Jacob, “Routing IEEE Internet Things J., vol. 6, no. 6, pp. 9326–9337, Dec. 2019.
protocol enhancement for handling node mobility in wireless sensor [38] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-
networks,” in Proc. IEEE Region 10 Conf., 2008, pp. 1–6. efficient communication protocol for wireless microsensor networks,”
[16] D.-S. Kim and Y.-J. Chung, “Self-organization routing protocol sup- in Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., 2000, pp. 1–10.
porting mobile nodes for wireless sensor network,” in Proc. 1st Int. [39] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An
Multi-Symp. Comput. Comput. Sci. (IMSCCS), 2006, pp. 622–626. application-specific protocol architecture for wireless microsensor
[17] A. Nayebi and H. Sarbazi-Azad, “Performance modeling of the LEACH networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,
protocol for mobile wireless sensor networks,” J. Parallel Distrib. Oct. 2002.
Comput., vol. 71, no. 6, pp. 812–821, 2011. [40] V. Srividhya and T. Shankar, “Energy proficient clustering technique
[18] S. Ali, S. A. Madani, A. ur Rehman Khan, and I. A. Khan, “Routing pro- for lifetime enhancement of cognitive radio–based heterogeneous wire-
tocols for mobile sensor networks: A comparative study,” 2014. [Online]. less sensor network,” Int. J. Distrib. Sens. Netw., vol. 14, no. 3, 2018,
Available: arXiv:1403.3162. Art. no. 1550147718767598.
[19] W. K. Lai, C. S. Fan, and L. Y. Lin, “Arranging cluster sizes and trans- [41] P. Azad, N. J. Navimipour, A. M. Rahmani, and A. Sharifi , “The role of
mission ranges for wireless sensor networks,” Inf. Sci., vol. 183, no. 1, structured and unstructured data managing mechanisms in the Internet
pp. 117–131, 2012. of Things,” Clust. Comput., vol. 23, no. 2, pp. 1185–1198, 2020.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.
10664 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 13, JULY 1, 2021

[42] K. Ramesh and D. K. Somasundaram, “A comparative study of cluster- Nima Jafari Navimipour received the B.S. degree
head selection algorithms in wireless sensor networks,” 2012. [Online]. in computer engineering and software engineering
Available: arXiv:1205.1673. from Tabriz Branch, Islamic Azad University, Tabriz,
[43] A. Al-Baz and A. El-Sayed, “Energy-aware enhancement of LEACH Iran, in 2007, the M.Sc. degree in computer engi-
protocol in wireless sensor network,” in Proc. 5th Int. Conf. Comput. neering, computer architecture, from Tabriz Branch,
Theory Appl. (ICCTA), pp. 144–149, 2015. Islamic Azad University in 2009, and the Ph.D.
[44] S. Soro and W. B. Heinzelman, “Cluster head election techniques for degree in computer engineering, computer architec-
coverage preservation in wireless sensor networks,” Ad Hoc Netw., vol. 7, ture, from Science and Research Branch, Islamic
no. 5, pp. 955–972, 2009. Azad University, Tehran, Iran, in 2014.
[45] M. B. Yassein, Y. Khamayseh, and W. Mardini, “Improvement on He has published many papers in various journals
LEACH protocol of wireless sensor network (VLEACH),” Int. J. Digit. and conference proceedings. His research interests
Content Technol. Appl., vol. 3, no. 2, p. 13, 2009. include cloud computing, IoT, traffic control, computational intelligence,
[46] R. ELkamel and A. Cherif, “Energy-efficient routing protocol to improve evolutionary computing, and wireless networks.
energy consumption in wireless sensors networks,” Int. J. Commun.
Syst., vol. 30, no. 17, 2017, Art. no. e3360.
[47] R. Tarighi, K. Farajzadeh, and H. Hematkhah, “Prolong network life-
time and improve efficiency in WSN-UAV systems using new clustering
parameters and CSMA modification,” Int. J. Commun. Syst., vol. 33,
no. 7, 2020, Art. no. e4324.
[48] J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H.-J. Kim, “An empower
hamilton loop based data collection algorithm with mobile agent for
WSNs,” Human-centric Comput. Inf. Sci., vol. 9, no. 1, p. 18, 2019.
[49] M. F. Khan, F. Aadil, M. Maqsood, S. H. R. Bukhari, and M. Hussain,
“Moth flame clustering algorithm for Internet of Vehicle (MFCA-IoV),”
IEEE Access, vol. 7, pp. 11613–11629, 2018.
[50] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed
clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile
Comput., vol. 3, no. 4, pp. 366–379, Oct.–Dec. 2004.
[51] L. Yu, N. Wang, W. Zhang, and C. Zheng, “GROUP: A grid-clustering
routing protocol for wireless sensor networks,” in Proc. Int. Conf.
Wireless Commun. Netw. Mobile Comput., pp. 1–5, 2006.
[52] H. Lin, L. Wang, and R. Kong, “Energy efficient clustering protocol Midia Reshadi received B.Sc. degree in computer
for large-scale sensor networks,” IEEE Sensors J., vol. 15, no. 12, engineering from Arak Branch of Islamic Azad
pp. 7150–7160, Dec. 2015. University, Arak, Iran, in 2003. He also received the
[53] J. Wang, Y. Gao, W. Liu, W. Wu, and S.-J. Lim, “An asynchronous M.Sc. and Ph.D. degrees in computer architecture
clustering and mobile data gathering schema based on timer mechanism from the Science and Research Branch of Islamic
in wireless sensor networks,” Comput. Mater. Continua, vol. 58, no. 3, Azad University, Tehran, Iran, in 2005 and 2010,
pp. 711–725, 2019. respectively.
[54] A. Mehmood, S. Khan, B. Shams, and J. Lloret, “Energy-efficient He is currently an Assistant Professor with the
multi-level and distance-aware clustering mechanism for WSNs,” Int. Department of Computer Engineering, Science and
J. Commun. Syst., vol. 28, no. 5, pp. 972–989, 2015. Research Branch of Azad University since 2010. His
[55] A. Al-Baz and A. El-Sayed, “A new algorithm for cluster head selection research interests are Network-on-chip, including
in LEACH protocol for wireless sensor networks,” Int. J. Commun. Syst., performance and cost improvement in topology, routing and application-
vol. 31, no. 1, 2018, Art. no. e3407. mapping design levels of various types of NoCs, such as 3D, photonic, and
[56] B. Pourghebleh and N. J. Navimipour, “Data aggregation mechanisms wireless. Recently, he has started carrying out research in NoC based deep
in the Internet of Things: A systematic review of the literature and neural network accelerators and Silicon interposer based NoC with his team
recommendations for future research,” J. Netw. Comput. Appl., vol. 97, consists of M.Sc. and Ph.D. students.
pp. 23–34, Nov. 2017.
[57] J. Wang, Y. Gao, X. Yin, F. Li, and H.-J. Kim, “An enhanced
PEGASIS algorithm with mobile sink support for wireless sensor
networks,” Wireless Commun. Mobile Comput., vol. 2018, Jan. 2018,
Art. no. 9472075.
[58] J. Wang, Y. Gao, K. Wang, A. K. Sangaiah, and S.-J. Lim, “An affinity
propagation-based self-adaptive clustering method for wireless sensor
networks,” Sensors, vol. 19, no. 11, p. 2579, 2019.
[59] A. Jain, M. Khari, E. Verdú, S. Omatsu, and R. G. Crespo, “A route
selection approach for variable data transmission in wireless sensor
networks,” Clust. Comput., vol. 23, pp. 1697–1709, Apr. 2020.
[60] O. Ibrihich, S.-D. Krit, J. Laassiri, and S. El Hajji “Study and simula-
tion of protocols of WSN using NS2,” in Transactions on Engineering
Technologies. Dordrecht, The Netherlands, Springer, 2015, pp. 467–480.

Mehdi Hosseinzadeh received the B.Sc. degree in


computer hardware engineering, from Islamic Azad
Mahyar Sadrishojaei received the B.S. degree
University, Dezfol, Iran in 2003. He also received
in computer engineering and hardware engineering
the M.Sc. and Ph.D. degrees in computer system
from the University of Isfahan, Isfahan, Iran, in
architecture from the Science and Research Branch,
2010, the M.Sc. degree in computer engineering and
Islamic Azad University, Tehran, Iran in 2005 and
computer architecture, from Science and Research
2008, respectively.
Branch, Islamic Azad University, Tehran, Iran, in
He is the author/co-author of more than 120
2012, where he currently pursuing the Ph.D. degree
publications in technical journals and conferences.
with the Department of Computer Engineering.
His research interests include SDN, Information
His research interests include computer networks,
Technology, Data Mining, Big data analytics,
WSN, RFID, and IoT.
E-Commerce, E-Marketing, and Social Networks.

Authorized licensed use limited to: K.L. University(F.K.A. Koneru Lakshmaiah College of Engineering). Downloaded on January 20,2022 at 10:14:45 UTC from IEEE Xplore. Restrictions apply.

You might also like