Professional Documents
Culture Documents
Trust-Based Energy-Efficient Routing Protocol For Internet of Things-Based Sensor Networks
Trust-Based Energy-Efficient Routing Protocol For Internet of Things-Based Sensor Networks
sensor networks
Abstract
Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols
were developed and still in progress with full swing. Internet of things enabling physically existing things to see, hear,
think and perform a notable task by allowing them to talk to each other and share useful information while making deci-
sion and caring-on/out their important tasks. Internet of things is greatly promoted by wireless sensor network as it
becomes a perpetual layer for it. Wireless sensor network works as a base-stone for most of the Internet of things appli-
cations. There are severe general and specific threats and technical challenges to Internet of things–based sensor net-
works which must overcome to ensure adaptation and diffusion of it. Most of the limitations of wireless sensor
networks are due to its resource constraint objects nature. The specified open research challenges in Internet of things–
based sensor network are power consumption, network lifespan, network throughput, routing and network security. To
overcome aforementioned problems, this work aimed to prolong network lifetime, improve throughput, decrease
packet latency/packet loss and further improvise in encountering malicious nodes. To further tune the network lifetime
in terms of energy, wireless harvesting energy is suggested in proposed three-layer cluster-based wireless sensor net-
work routing protocol. The proposed mechanism is a three-tier clustering technique with implanted security mechanism
to encounter malicious activities of sensor nodes and to slant them into blacklist. It is a centred-based clustering proto-
col, where selection of cluster head and grid head is carried out by sink node based on the value of its cost function.
Moreover, hardware-based link quality estimators are used to check link effectiveness and to further improve routing
efficiency. At the end, excessive experiments have been carried out to check efficacy of the proposed protocol. It out-
performs most of its counterpart protocols such as fuzzy logic–based unequal clustering and ant colony optimization–
based routing hybrid, Artificial Bee Colony-SD, enhanced three-layer hybrid clustering mechanism and energy aware
multi-hop routing in terms of network lifetime, network throughput, average energy consumption and packet latency.
Keywords
Clustering, energy efficiency, Internet of things, wireless harvesting energy, link quality, network lifespan, three tier, wire-
less sensor network
1
Date received: 25 May 2020; accepted: 14 September 2020 Center of Excellence in IT, Institute of Management Sciences, Peshawar,
Pakistan
2
Department of Computer Science, COMSAT University Islamabad,
Handling Editor: Muhammad Ilyas Lahore Campus, Lahore, Pakistan
3
Department of Information Technology, Government College
University, Faisalabad, Pakistan
Introduction
The Internet of things (IoT) has gained its ground rap- Corresponding author:
Zahid Ullah, Center of Excellence in IT, Institute of Management Sciences,
idly in last couple of years offering unlimited applica- Peshawar 25000, Pakistan.
tions in many areas comprises intelligent transport Email: zahid.ullah@imsciences.edu.pk
Creative Commons CC BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work
without further permission provided the original work is attributed as specified on the SAGE and Open Access pages
(https://us.sagepub.com/en-us/nam/open-access-at-sage).
2 International Journal of Distributed Sensor Networks
system, agriculture, healthcare, smart cites, smart influences the whole performance of network.27 The
buildings, smart grids, environment monitoring, educa- lifetime of the WSNs depends upon energy level (EL)
tion, industry, entertainment and so on.1–7 The IoT is and considered as one of the main factors in perfor-
considered as next generation of Internet or expansion mance evaluation of WSN routing protocol.11,28 In
of Internet and World Wide Web, where huge number WSN routing, the energy consumption, residual energy
of things will be connected and would allow direct and total energy are always important metrics and
machine to machine (M2M) communication.8–10 parameters while computing cost function (CF).29,30
Almost every factor either hardware or software of IoT Routing has been always an important factor in any
is important but the most indispensable element in IoT type of communication network. It is always been a
is the sensors, which are the ears and eyes of IoT11 and challenging job for researchers to route packets to des-
become base for wireless sensor networks (WSNs). tination efficiently, safely and with minimum overhead.
WSN becomes significant research topic due to its Due to sensors’ resource constraint, such as limited
increasing role in new cutting-edge applications and energy, limited processing and short communication
state-of-the-art technologies. range, the routing algorithm implementation is a cliff-
WSN is a foundational technology for IoT. Whole hanger task for the researchers. Countless efforts have
IoT system relies on it.12 WSN plays a strategic role in been made and still extraordinary efforts are needed in
promotion and growth of IoT, permitting low end this subject to come up with best solutions.
devices with limited resources and offering life-changing Clustering in WSN is a process in which the network
services. It uses tens to thousands of sensors connecting is divided into hierarchy to do load balancing and to
each other via wireless technology.13,14 Advancement in achieve other objectives such as scalability, lifetime
sensors’ technology makes it possible to build low cost maximization and energy minimization. It is very effec-
and tiny-sized IoT-enabled wireless sensors to bring tive and efficient way to prolong lifespan of WSNs31,32
smartness in small- to large-scale appliances.15 A typical and influence the overall performance of network.
WSN composed of numerous numbers of sensors nodes Hierarchal-based or cluster-based routing protocols are
with sensing, communication and processing capabil- divided into cluster heads (CLHs) and member nodes
ities.16,17 WSN can serve as a platform for many other (MNs), where CLH selection is based on important
domains such as measurement of important environ- parameters such as residual energy and distance to sink
mental parameters (humidity, temperature, light, pres- node (SN). CLH role is rotating based on the rank of
sure and so on) in smart agriculture, secure and reliable the nodes. The ranks of the nodes are defined by the
communication, military applications and monitoring, increase or decrease in important parameters. Cluster
medicine and healthcare, different types of industries, head act as a leader or coordinator that take data from
traffic surveillance and so on.17–26 cluster members (CMs), aggregate it and forward it to
There are severe threats and technical challenges to base station (BS) or SN.33–40 Also, cluster-based rout-
WSNs that must be overcome to ensure adaptation ing protocols are divided into three broad classes such
and diffusion of it. Most of the limitations of WSNs as block cluster based, grid cluster based and chain clus-
are due to its resource constraint objects nature. The ter based. Furthermore, cluster-based WSN is divided
sensors of open area WSN is always vulnerable to into two-tier (two layers) and three-tier (three layers)
harsh or hostile environment challenges in terms of hierarchies, as shown in Figure 1.
high temperature, humidity, pressure, dust, rain, snow Another important aspect in WSN is security against
and so on, which are affecting the operation of WSN, malicious nodes. Illegal intrusions in WSNs highly dis-
making it essential to have robust and resilience sensor turb and degrade lifetime, throughput, authenticity,
nodes. Furthermore, other general problems and future confidentiality, integrity, availability, bandwidth, qual-
challenges to WSNs are comprises limited constrained ity of service (QoS) and so on. Routing protocols of
resources, limited communication capability, stability, WSNs are suffered from various attacks such as Sybil
fault tolerance, bandwidth, mobility, result precision, attack, selective forwarding attack, wormhole attack,
availability, trust, accountability, heterogeneity, inte- black hole attack, sinkhole attack and hello flooding
gration, uncontrollable environment, technology and attack.17,41–44 To encounter aforementioned attacks,
denial of service attack (DoS). Along with aforemen- reliable, effective and resilient routing protocols are
tioned general challenges, WSNs has specific issues that needed for WSNs.
got much of the researchers’ attention. These specified Inspired by above-mentioned consideration, this
open research challenges of WSN are power consump- work aimed to prolong network lifespan, improve
tion, network lifespan, network throughput, wireless throughput, increase number of alive nodes, decrease
routing protocols and network security. packet latency and packet loss and reduce energy con-
Energy consumption is highly prominent topic in sumption and further improvise encountering malicious
WSN communication. The energy efficiency is a key nodes. To further tune the network lifetime in terms of
factor, plays a vital role for the longevity of WSN and energy, wireless harvesting energy (WHE) is suggested
Ilyas et al. 3
in proposed three-layer cluster-based and IoT-based snapshots and section ‘Conclusion’ concludes this
WSN routing protocol. The proposed solution, trust- study.
based energy-efficient routing protocol (TBEERP), is a
three-tier clustering routing protocol with embedded
check-up node (CN) to encounter malicious activities Related literature
of nodes and to slant them into blacklist. Moreover,
Tiered and layered data transmission is considered one
link quality (LQ) is also checked in order to further
of the robust and preferred schemes in WSNs. After
improve routing efficiency. Only hardware-based link
passing through numerous experiments, this approach
quality estimators (LQEs) are considered in this pro-
is now assumed very efficient routing techniques to
posed research work, which does not overhead or delay
route data packets to destination, for example, BS. In
the overall process. The contribution of this research
this type of structure, all sensor nodes are distributed
work can be summarized as follows:
into different layers with different roles such as CMs,
cluster heads (CLHs) and cluster gateways (CLGs).
Harvesting energy is added in three-layer WSN There are many literatures and research works writ-
clustering techniques to prolong lifespan of net- ten and tested35 in WSN routing protocols. Some of
work and to improve network throughput. Due them are robust, while some are average. The cluster-
to this extra supplementary energy, the responsi- based algorithms or protocols have been undertaken
ble roles (CLHs + CLGs) further extend their for this proposed work as a base study. Main role in
assigned duty. cluster is the role of cluster head (CH), that is, leader
CNs are introduced in each cluster to mirror and its role changed based on important parameters
malicious attacks. such as current EL. In this regard, low-energy adaptive
Most of the processing is done by SN, which clustering hierarchy (LEACH)45 is the forerunner
does not have any resource constraints. work, which is considered as based literature for most
In proposed solution, CF plays pivotal role that of the clustering algorithms. In LEACH protocol,
spit out CLH and CLG role. selection of CHs is carried out in every round. LEACH
Hardware-based LQEs are used to check link was first priority for cluster-based routing for a long
efficiency. time because it distributes equally the energy consump-
tion in nodes. But it leads to additional routing over-
The rest of the article is organized as follows: related head that result in plenty use of energy of CHs. Along
research and literature are briefly reviewed in section with it, this protocol only accommodates single-hop
‘Related literature’. The proposed system model is communication from node to BS.
explained in section ‘Proposed system model’. Section An enhanced three-layer hybrid clustering mechan-
‘Performance evaluation of proposed solution’ elabo- ism (ETLHCM)11 by Ullah et al. further tried to limit
rates simulation, results and analysis with required control traffic after every round, especially for the
4 International Journal of Distributed Sensor Networks
selection of CH. In proposed mechanism, the energy of This protocol consists of three phases such as CH selec-
the nodes is divided into ELs, based on which it is tion phase, inter-cluster routing phase and cluster main-
decided when cluster nodes need to select new cluster tenance phase. The cluster construction is divided into
head by lower layer. The EL is also used for balancing two steps such as CH selection and cluster formation.
energy consumption between sensor nodes. The role is The BS runs fuzzy logic for the formation of balanced
reverted to normal node from CH role, if its residual clusters, which is achieved by the equal distribution of
energy dropped by 1 EL. The ETLHCM greatly CHs in entire network. For the selection of CHs, the
reduced the burden of wasteful control traffic exchange. fuzzy logic uses five important parameters named resi-
It is claimed after simulation that ETLHCM showed dual energy, distance to BS, distance to its neighbours,
18% improvement in terms of network lifetime and half node degree and node certainty. The results outclass
of the nodes alive (HNA) compared to hybrid hierarch- the other counterpart (LEACH, threshold-sensitive
ical clustering approach (HHCA). It outperforms energy-efficient sensor network (TEEN), distributed
LEACH, three-layer LEACH (TL-LEACH) and energy-efficient clustering (DEEC) and fuzzy energy-
HHCA in terms of network lifetime. However, this aware unequal clustering algorithm (EAUCF)) pro-
algorithm is lacking clear procedure for the selection of tocols in terms of network lifetime, balance energy
grid head (GH). consumption and elimination of hot spot problem.
To encounter malicious attacks, such as wormhole, Ari et al.,39 proposed a protocol named Artificial
black hole and Sybil, an attempt has been made by Ai Bee Colony-SD (ABC-SD), which is inspired by fast
et al.46 New protocol has been proposed to guarantee and efficient searching of artificial bee colony (ABC) to
reliable routing and data exchange. This is a smart col- build lightweight clusters. This protocol is an extension
laborative routing protocol, which is named as geo- of original ABC protocol. A versatile multi-objective
graphic energy aware routing and inspecting node function is aspired using linear programming (LP) for-
(GIN). It incorporates directed diffusion routing, geo- mulation. The routing problems are targeted with a
graphic and energy aware routing (GEAR) and inspect- cost-based function, which uses energy and number of
ing node procedure. GIN is a completely novel hops as parameters. The quality of communication is
approach to tackle these problems. In this proposed also taken in consideration. Through a centralized con-
method, GIN is cohesive with GEAR protocol. trol algorithm, the clustering process is accomplished
Furthermore, it is experimented on NS3 and claimed and this whole process is carried out in BS. This solu-
that it surpasses the other three counterparts such as tion is good; however, LP makes it a bit fuzzy.
flooding, GEAR and greedy perimeter stateless routing A novel routing algorithm has been proposed in
(GPSR) in many aspects. It is novel concept but the Wang et al.40 The energy depletion problem has been
combination of GIN with GEAR making it complex. targeted in this study with a protocol named energy-
Many issues of WSN have been addressed in the lit- efficient compressive sensing-based clustering routing
erature by Hosen and Cho.37 They have proposed a (EECSR). This paper worked on the combination of
routing protocol by the name of energy-centric cluster- the merits of clustering techniques and comprehensive
based routing (ECCR) for WSNs. Static clusters con- sensing–based (CSbased) system. First, the lemma of
cepts were introduced, which decreases the overhead of the relationship between two linked layers, optimal
control packets during the formation of clusters. The number of CH in each layer and optimum distribution
caretaker concept has been taken, inspired from of CH is presented. Second, an attempt has been car-
Malathi et al.,44 for the election of cluster head, where ried out to eliminate hot spot problem in WSN and to
ranks’ information are allied with local data. The for- minimize energy consumption. Third, the role of back
mer cluster head is responsible to handover its role to cluster head (BCH) and its rotation with CH is pro-
forthcoming cluster head, which is elected in current posed. The authors claimed of much better results in
round. This process highly reduces laden of control terms of energy efficiency and WSN lifetime extension.
traffic regarding the selection of cluster head. This A hybrid approach is considered by Younis and
leads to further prolong and improve WSN lifetime. Fahmy47 to achieve energy-efficient distributive cluster-
This scheme, however, fails in dynamic clustering dis- ing by the name of hybrid energy-efficient distribution
tribution, which is demand of cutting-edge WSNs. (HEED) clustering. A novel protocol, which selects CH
Another very serious attempt has been carried out based on residual energy and other parameters such as
by Arjunan and Sujatha38 to exclude hot spot problem node degree. HEED is fairly uniform cluster head dis-
and to maximize network lifespan of WSN. The pro- tribution protocol across the network with very low
posed model is a hybrid (proactive and reactive) messages overhead. The main objectives of the HEED
unequal clustering protocol, which transmit data both are extending network lifespan, finishing clustering pro-
in proactive and reactive fashion. This WSN protocol is cess in fixed number of iteration, reducing control over-
fuzzy logic–based unequal clustering and ant colony head and creating sound distributed CHs. This
optimization (ACO)-based routing hybrid (FUCARH). literature used two unique terminologies such as source
Ilyas et al. 5
and server. The source is used for normal nodes and Wang et al.51 presented solution by the name of
the server is used for cluster head. hybrid multi-hop partition-based clustering routing
An attempt has been made by Cengiz and Dag.48 The protocol (HMPBC), which tackled multiple problems
proposed scheme is comprises two phases such as setup of WSN to be solved. The CH selection depends upon
phase and steady-state phase. The setup phase made once the level of residual energy. The observed area is
in network lifetime in which CHs, CMs and other distribu- divided into zones and a single-chain structure is used
ter are assigned their roles. In steady-state phase, transmis- in cluster to maximize network lifetime. Minimum
sion of the collected data occurred along with selection of spanning tree algorithm is adopted for communication
new CHs and redistribution of CMs. The proposed solu- among CHs. The proposed solution is simulated in
tion is an energy aware multi-hop routing (EAMR), which MATLAB and outclasses low-energy adaptive cluster-
achieves the objective by minimizing the surplus overhead ing hierarchy multi-level opportunistic routing
in LEACH45 and in its successors by implementing fixed (LEACH-MLOR) and energy efficient hybrid multi-
clusters and reducing CH changes. Due to less number of hop clustering scheme (EEHMCS) in many areas.
CH change and fixed size of clusters, the network life- Minimum spanning tree is making additional overhead
time increased and network overhead decreased. in this algorithm.
Compared with other counterparts (LEACH, LEACH Summary of state-of-the-art protocols in subject area
fixed clustering (LEACH-F), modified LEACH (Mod- is given in Table 1
LEACH), DEEC, stable election protocol (SEP) and
low energy fixed clustering algorithm (LEFCA)), the Proposed system model
EAMR showed significant improvements in terms
Main tasks of sensor nodes in smart environment, such
data transmission, energy consumption and network
as smart cities, smart homes, smart health, smart agri-
lifetime. Because of fixed size of clusters, this scheme
culture, and smart grids, are to monitor physical and
is not candidate for large-sized WSN.
chemical changes and then pass it to the central loca-
A new cluster-based protocol hierarchal distributed
tion (SN) for further processing. Sensor nodes have dif-
management clustering (HDMC) is proposed by
ferent sensing capability and EL constraint. There are
Shahraki et al.49 The proposed technique uses many
several challenges to IoT-based technology and WSN,
parameters such as action history of each node and
in which the most burning and important is the energy
local and general status of each node in order to select
consumption and maintenance during communication
and determine best node for CH role. It further extend
as mentioned in Li et al.52 Therefore, this research
network lifetime, consume network resources fairly and
highly focuses on reducing the number of control Pkts
improve network coverage further. Moreover, HDMC
during network communication.
will be a good choice for WSNs routing because of its
To prolong network lifetime and to keep load balan-
simple setup and low overhead (only one broadcast
cing, the proposed model is cluster and hierarchal
Pkts + one Pkts for being an MN and two Pkts for CH
layered based. It is latency full and energy consuming
selection). However, it assumed too much parameter
task to send the field data by the sensor nodes directly
for the selection of CH which leads to massive
to SN. Hence, it is supposed in this research that sense
computation.
data will be forwarded to CLH by the CM, CLH for-
Yi and Yang50 presented a clustering-based routing
ward it to CLG, where these aggregated data are fur-
protocol named Hamilton energy-efficient routing
ther forwarded to SN.
(HEER) for WSNs. It took help from the concept of
To keep security check and balance and to avoid
Hamiltonian path in graph theory to carry-on and
malicious attacks such as Sybil, Sinkhole, and
carry-out its duty. Hamilton path is a path that tra-
Wormhole, this proposed model comes up with CN
verses a graph and accesses each node only once.
that carry-out security-related tasks. Furthermore, to
Advantages of Hamilton path is that HEER visits every
make it result oriented and to equip it with upcoming
node once in each round so to avoid duplicate messages
IoT application challenges, this work has been rooted
from nodes to CHs. HEER collects data, aggregates it
with WHE. Figure 2 depicts and sets out simple sketch
and then forwards it through Hamiltonian path to BS.
of our proposed approach and Figure 3 (flowchart)
HEER is implemented in MATLAB comparing it with
shows the comprehensive illustration of it. Further
low-energy adaptive clustering hierarchy cluster head
details are given in the next sub-sections.
technique (LEACH-CHT), LEACH and power-
efficient gathering in sensor information systems
(PEGASIS). It outperforms all others in term of net-
Network framework
work lifetime and transmission delay. This routing pro- The proposed model is implemented into two rounds:
tocol uses Hamilton path for sending packets to BS. Round 1, all sensors nodes, which are of heterogeneous
The disadvantages of Hamilton path may not be nature, are deployed randomly in field. They are fixed
ignored. and do not move after deployment. In addition, after
6
Table 1. Detailed description of some state-of-the-art protocols.
Protocol Parameters
Clustering Parameters Algorithm Control Output Energy Harvesting Malicious Link Scalability Node type Latency Network
considered message efficiency energy nodes quality support lifetime
overhead usage detection measurement
ETLHCM11 Dynamic Residual energy Distributive Low CH selection High No No No No Homogeneous Medium High
Distance to BS GH selection
IN selection
LEACH45 Dynamic Residual energy Distributive High CH selection Low No No Distance No Homogeneous High Low
GIN46 Dynamic Residual energy Distributive Low CH selection High No Yes RSS Yes Homogeneous Low High
Distance to BS
Game theory
ECCR37 Static Residual energy Distributive Low CH selection High No No No Yes Homogeneous Medium High
Distance from
member nodes
FUCARH38 Dynamic Residual energy Distributive Low CH selection High No No RSSI No Homogeneous Low High
Distance to BS Cluster size
Distance to
neighbour
Node degree
Node centrality
ABC-SD39 Dynamic No. of hops Centralized Low CH selection High No No Signal Yes Homogeneous Medium High
strength
40
EECSR Dynamic Residual energy Distributive Medium CH selection High No No No Yes Homogeneous Medium High
BCH selection
HEED47 Dynamic Residual energy Distributive Low CH selection Medium No No No Yes Homogeneous Medium High
EAMR48 Dynamic Residual energy Distributed Low CH selection High No No No Yes Homogeneous Medium High
HDMC49 Dynamic Node activity history Distributed Low CH selection High No No No Yes Homogeneous Medium High
Available resources
Distance to BS
HEER50 Dynamic Residual energy Distributed Low CH selection High No No RSSI No Homogeneous Medium High
Distance to BS
HMPBC51 Dynamic Residual energy Distributive Medium CH selection Medium No No RSSI No Homogeneous Medium High
Proposed Dynamic Energy Centralized Very Low CLH selection Very high Yes Yes RSSI Yes Heterogeneous Very Low Extremely
Distance to/ CLG selection LQI high
from sink node CN nomination SNR
Link quality
Game theory
ETLHCM: enhanced three-layer hybrid clustering mechanism; BS: base station; CH: cluster head; GH: grid head; LEACH: low-energy adaptive clustering hierarchy; GIN: geographic energy aware routing and
inspecting node; RSS: received signal strength; ECCR: energy-centric cluster-based routing; FUCARH: fuzzy logic–based unequal clustering and ant colony optimization–based routing hybrid; RSSI: received
signal strength indicator; EECSR: energy-efficient compressive sensing-based clustering routing; BCH: back cluster head; HEED: hybrid energy-efficient distribution clustering; EAMR: energy aware multi-hop
routing; HDMC: hierarchal distributed management clustering; HEER: Hamilton energy-efficient routing; HMPBC: hybrid multi-hop partition-based clustering routing protocol; CLH: cluster head; CLG: cluster
gateway; CN: check-up node; LQI: link quality indicator; SNR: signal-to-noise ratio; ABC-SD: Artificial Bee Colony-SD.
International Journal of Distributed Sensor Networks
Ilyas et al. 7
Deployment of sensors
deployment of sensor nodes, they send their distance
To sense field data, 200 tiny microelectronic sensors are
from CM to SN. Received signal strength (RSS) is used
deployed over a targeted area in two dimensions (2D)
as a metre parameter for measuring this distance.
at initial stage. Figure 4 shows this scenario. These
Along with it, all sensors send their residual energy
nodes are of heterogeneous nature, having different
(R:E) in same control Pkt , while sending its distance to capacity, size and competency power. The deployments
SN. Moreover, in same round, SN computes cost func- of sensors are fixed, terrestrial and random. From these
tion (C:F) of each deployed node. deployed 200 nodes, decision will be made of CLG,
Based on the value of CF, it enters into Round 2. In CLH and CN. To prolong network lifetime and to
Round 2, formations of clusters have been carried out. reduce computational overhead (as, when EL become
Based on calculation and work out of CF, the decision low from specified threshold, then role of CLH, CLG
has been made of CLH, CLG and CN. or CN shift to other MN that is done through some
Following assumptions have been assumed in pro- computation to recalculate CF), each sensor node is
posed work: equipped with WHE unit.
response with reply packet (ReplyPkt ) taking carrier- Moreover, for distance calculation to SN, Euclidean
sense multiple access with collision avoidance (CSMA/ equation53,54 will be used
CA) mechanism in account. After receiving ReplyPkt qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
from nodes, SN responses with acknowledged packet dtance ðn, SN Þ = ðXn XSN Þ2 + ðYn YSN Þ2 ð1Þ
(AckPkt ), which give surety that the message has been
received successfully. This AckPkt from SN to field where dtance ðn, SN Þ is the distance of node n to the sink
nodes gives information about SN such as sink node node SN and Xn and Yn are the node coordinates,
identity (SNid). It is a centralized control mechanism respectively.
to start and initialize WSN and to set the nodes into
multiple clusters. Energy model
Furthermore, in this stage, SN gets important infor-
mation about field nodes such as To improve reliability of a WSN, efficient utilization of
energy is needed. In WSNs, energy consuming is the
most alarming and burning issue. IoT and cluster-based
Node identity (Nid)
routing is revolving around energy-constrained sensors.
Residual energy (R:E)
Currently, three-layer cluster hieratical technique is
Link quality (LQ)
considered conducive remedy for efficient energy con-
Distance (dtance ) from/to SN
sumption as compared to other existing techniques.55
In this proposed model, nodes with high R:E or T :E get
SN saves this information for future use. Also, based supplementary cost and become more favourable for
on these received Pkts , SN judges LQ of each node. CLG, CLH and CN role.
Ilyas et al. 9
PSignal
SNR = ð18Þ Hardware-based triangle metrics
NSignal
Hardware-based LQEs are extensively used metrics for
SNR is expressed in decibels (dB) and may also be com- checking of link efficiency. One of the main reasons
puted using equation (19) behind it is low overhead as compared to software-
based LQEs. These LQEs are built-in hardware chip
Ps (CC1101 and CC2420) and can be directly obtained
SNR = 10log10 ð19Þ
Ns from radio transceiver.63,67 In this research to predict
12 International Journal of Distributed Sensor Networks
CF
The most important part of this proposed model is the
computation and interpretation of C:F, which is a bit
massive task and is carried out by SN, which does not
have any memory or computational/processing con-
straints. C:F is an aggregated value of LQ, total energy Figure 6. Cost function flow diagram.
(T :E), and nodes’ distance from/to SN. C:F output is a
numeric value that predicts and judges the significance
of each node in communication. The higher the C:F where a and b are the weighting factors (a + b = 1)
value, the more appropriate and preceded candidate used to tune the weight of energy and LQ. The assigned
for becoming CLG, CLH and CN. Figure 6 illustrates priority to each weighting factor in proposed scheme is
this phenomenon. Furthermore, nodes which are given in the following equation:
selected as CLH, CLG and CN broadcast their
assigned new role and stop Pkt sensing role. Cost func-
a = 0:7
tion (C:F) of each deployed nodes is computed using
b = 0:3
following parameters:
(FCM), which are beyond the scope of this article. Either node may select only one strategy and will get
Each cluster in proposed scheme comprises CMs, clus- a specific payoff, as process of this game can be labelled
ter head, CLG and CN. Each of it plays their specific as a cost and payment model. Each node selects the
role that is described in the next section. strategy very carefully and tries to use less energy and
capitalizes on their payoff. After taking assigning role
of CN , it feel more responsibilities. Utility function is
Selection of CN defined in the following equation
CN is concerned to the security of proposed network 8
model. It keeps CLH and CLG under inspection. These < 0 when Si = CM, 8i 2 N
1
nodes use Pkt monitoring strategy to prevent deliberate U ð Si Þ = when Si = CM ð30Þ
: C1cm
and malicious attacks such as Sybil, Wormhole and Ccn when Si = CN
Sinkhole. If CLH and CLG do not forward more than
a fixed number of Pkts , then CN broadcasts message in where Ccn and Ccm are the cost of being either CM or
cluster to stop responding to it and places the con- CN . Consider two players joining the game and their
cerned CLH or CLG into blacklist. Algorithm 2 shows payoff are shown in Table 2. Based on their payoff,
step-wise procedure of initialization, CLH, CLG selec- consider that one player selects strategy CN , and then
tion and cluster formation. the other player will surly select CM strategy. The strat-
Selection of CLG and CLH is based on the value of egy combination (CN ,CM) take more payoff for the
C:F but selection of CN is totally based on non- second player, that is
cooperative and recurring game theory.67,68 CN and
CLH further enhance network lifespan and energy effi- 1 1
. ð31Þ
cacy. Only CMs of CLH start campaign for becoming Ccm Ccn
CN. This game is stated in the following equation
The second player selects CN strategy, because the
G = fN , S, U g ð28Þ (CM,CN ) strategy pair obtains more payoff for the sec-
ond player, that is
where N represents the players, S represents the same
strategy space and U represents the utility given to them. 1
.0 ð32Þ
Set of strategy can be represented by equation (29) Ccn
Table 5. Residual energy versus rounds. Table 6. Average energy consumption versus rounds.
Rounds FUCARH ABC-SD ETLHCM EAMR Proposed Energy level FUCARH ABC-SD ETLHCM EAMR Proposed
0 250 250 250 250 250 0.05 500 500 500 500 500
1000 200 218 224 230 237 0.3 700 800 850 890 1000
2000 150 190 195 210 215 0.55 900 1000 900 1100 1500
3000 120 100 170 180 190 0.8 1000 1100 1000 1300 1600
4000 20 10 110 140 160 1.05 1150 1100 1190 1450 1650
5000 5 4 70 90 120 1.3 1290 1300 1270 1600 1690
6000 0 0 5 40 50 1.55 1400 1440 1350 1720 1890
7000 – – 0 0 25 1.8 1570 1580 1490 1830 2140
2.0 1680 1750 1580 2050 2290
FUCARH: fuzzy logic–based unequal clustering and ant colony
optimization–based routing hybrid; ETLHCM: enhanced three-layer FUCARH: fuzzy logic–based unequal clustering and ant colony
hybrid clustering mechanism; EAMR: energy aware multi-hop routing; optimization–based routing hybrid; ETLHCM: enhanced three-layer
ABC-SD: Artificial Bee Colony-SD. hybrid clustering mechanism; EAMR: energy aware multi-hop routing;
ABC-SD: Artificial Bee Colony-SD.
Rounds FUCARH ABC-SD ETLHCM EAMR Proposed Rounds FUCARH ABC-SD ETLHCM EAMR Proposed
FUCARH: fuzzy logic–based unequal clustering and ant colony FUCARH: fuzzy logic–based unequal clustering and ant colony
optimization–based routing hybrid; ETLHCM: enhanced three-layer optimization–based routing hybrid; ETLHCM: enhanced three-layer
hybrid clustering mechanism; EAMR: energy aware multi-hop routing; hybrid clustering mechanism; EAMR: energy aware multi-hop routing;
ABC-SD: Artificial Bee Colony-SD. ABC-SD: Artificial Bee Colony-SD.
End-to-end delay
End-to-end delay means the time taken by a packet to
travel from the source node to destination node (SN).
In this research, it is highly emphasized to minimize
end-to-end delay time and the results of Figure 13 and
the data listed in Table 9 show the success ratio in this
department. As compared to other peers, TBEERP
showed minimum end-to-end delay time. The initial
Figure 12. Analysis of throughput. stage results of proposed protocol are same as other
counterparts because of selection CLH, CLG and other
P computation such as election of CN. When selection is
Received Pkts by sink node done, then the latency is minimized prominently,
PL = 1 P ð35Þ
Sent Pkts to sink node depicted at time 10,000 s.
One of the reasons for minimized end-to-end delay
where PL represents the packet loss. is due to harvesting energy unit in CLH and CLG.
Because of this supplementary energy, they continue
their job for a long time without interruption with full
Network stability momentum towards SN.
It may be defined as the duration till all sensor nodes
stay alive in network or the duration before the death
of first node in a network. This parameter is also
Conclusion
referred as first node dies (FND) in some literatures. In The IoT is considered as next generation of Internet or
WSN-based networks, it is one of the main judging cri- expansion of Internet and World Wide Web, where
teria to check network efficiency. The values of net- huge number of things will be connected and would
work stability forecast network’s future. It is directly allow direct M2M communication. The upcoming tech-
proportional to network lifespan. Network stability nology will be stuck around IoT paradigm and it will
period result of proposed scheme is shown in Figure 8 drive and automate whole system without the interven-
(network lifetime figures FND). Also, these results are tion of human being. In this research, the main focus
18 International Journal of Distributed Sensor Networks
5. Asplund M and Nadjm-Tehrani S. Attitudes and percep- 23. Khalid M, Ullah Z, Ahmad N, et al. Comparison of loca-
tions of IoT security in critical societal services. IEEE lization free routing protocols in underwater wireless sen-
Access 2016; 4: 2130–2138. sor networks. Int J Adv Comput Sci Appl (IJACSA)
6. Arshad M, Ullah Z, Khalid M, et al. Beacon trust man- 2017; 8(3): 080356.
agement system and fake data detection in vehicular ad- 24. Khalid M, Ullah Z, Ahmad N, et al. A survey of routing
hoc networks. IET Intell Trans Syst 2018; 13: 780–788. issues and associated protocols in underwater wireless
7. Sheng Z, Mahapatra C, Zhu C, et al. Recent advances in sensor networks. J Sens 2017; 2017: 7539751.
industrial wireless sensor networks toward efficient man- 25. Amin R, Islam SH, Biswas GP, et al. A robust and anon-
agement in IoT. IEEE Access 2015; 3: 622–637. ymous patient monitoring system using wireless medical sen-
8. Whitmore A, Agarwal A and Da Xu L. The internet of sor networks. Future Gener Comput Syst 2018; 80: 483–495.
things – a survey of topics and trends. Inform Syst Front 26. Zhu J, Zou Y and Zheng B. Physical-layer security and
2015; 17(2): 261–274. reliability challenges for industrial wireless sensor net-
9. Niaz F, Khalid M, Ullah Z, et al. A bonded channel in works. IEEE Access 2017; 5: 5313–5320.
cognitive wireless body area network based on IEEE 27. Reddy GK and Devi LN. A review on clustering proto-
802.15.6 and internet of things. Comput Commun 2019; cols with energy heterogeneity in wireless sensor net-
150: 131–143 works. In: Proceedings of the 2018 international
10. Al-Fuqaha A, Guizani M, Mohammadi M, et al. Internet conference on communication, computing and internet of
of things: a survey on enabling technologies, protocols, things (IC3IoT), Chennai, India, 15–17 February 2018,
and applications. IEEE Commun Surv Tutor 2015; 17(4): pp. 243–246. New York: IEEE.
2347–2376. 28. Biswas S, Das R and Chatterjee P. Energy-efficient con-
11. Faizan UM, Imtiaz J and Maqbool KQ. Enhanced three nected target coverage in multi-hop wireless sensor net-
layer hybrid clustering mechanism for energy efficient works. In: Bhattacharyya S, Sen S, Dutta M, et al. (eds)
routing in IoT. Sensors 2019; 19(4): 829. Industry interactive innovations in science, engineering and
12. Kuo YW, Li CL, Jhang JH, et al. Design of a wireless technology, Vol 11, Singapore: Springer, 2018, pp. 411–
sensor network-based IoT platform for wide area and 421.
heterogeneous applications. IEEE Sens J 2018; 18(12): 29. Anwar M, Abdullah AH, Altameem A, et al. Green com-
5187–5197. munication for wireless body area networks: energy
13. Sethi P and Sarangi SR. Internet of things: architectures, aware link efficient routing approach. Sensors 2018;
protocols, and applications. J Electr Comput Eng 2017; 18(10): 3237.
2017: 1–25 30. Ullah Z, Ahmed I, Khan FK, et al. Energy-efficient
14. Kocakulak M and Butun I. An overview of wireless sen- harvested-aware clustering and cooperating routing pro-
sor networks towards internet of things. In: Proceedings tocol for WBAN (E-HARP). IEEE Access 2019; 7:
of the 2017 IEEE 7th annual computing and communica- 100036–100050.
tion workshop and conference (CCWC), Las Vegas, NV, 31. Moon SH, Park S and Han SJ. Energy efficient data col-
9–11 January 2017, pp. 1–6. New York: IEEE. lection in sink-centric wireless sensor networks: a cluster-
15. Javaid N, Cheema S, Akbar M, et al. Balanced energy ring approach. Comput Commun 2017; 101: 12–25.
consumption based adaptive routing for IoT enabling 32. Khan FA, Shaheen S, Asif M, et al. Towards reliable and
underwater WSNs. IEEE Access 2017; 5: 10040–10051. trustful personal health record systems: a case of cloud-
16. Mittal N, Singh U and Sohi BS. A stable energy efficient dew architecture based provenance framework. J Amb
clustering protocol for wireless sensor networks. Wirel Intell Human Comput 2019; 10(10): 3795–3808.
Netw 2017; 23(6): 1809–1821. 33. Ur Rehman H, Asif M and Ahmad M. Future applica-
17. Krishna S, Kovi P, Jangam S, et al. Wireless sensor net- tions and research challenges of IOT. In: Proceedings of
works and applications. Researchgate. Epub ahead of the 2017 international conference on information and com-
print June 2017. DOI: 10.13140/RG.2.2.23192.19207. munication technologies (ICICT), Karachi, Pakistan, 30–
18. Ullah Z, Ahmed I, Razzaq K, et al. DSCB: dual sink 31 December 2017, pp. 68–74. New York: IEEE.
approach using clustering in body area network. Peer 34. Afsar MM and Tayarani NMH. Clustering in sensor net-
Peer Netw Appli 2017; 12: 357–370. works: a literature survey. J Netw Comput Appl 2014; 46:
19. Khalid W, Ullah Z, Ahmed N, et al. A taxonomy on mis- 198–226.
behaving nodes in delay tolerant networks. Comput Secur 35. Lee JS and Cheng WL. Fuzzy-logic-based clustering
2018; 77: 442–471. approach for wireless sensor networks using energy pre-
20. Faheem M and Gungor VC. Energy efficient and QoS- dication. IEEE Sens J 2014; 12(9): 2891–2897.
aware routing protocol for wireless sensor network-based 36. Pal Singha S and Sharmab SC. A survey on cluster based
smart grid applications in the context of industry 4.0. routing protocols in wireless sensor networks. Procedia
Appl Soft Comput 2018; 68: 910–922 Comput Sci 2015; 45: 687–695.
21. Ullah Z, Jabbar S, Alvi MH, et al. Analytical study on 37. Hosen ASM and Cho GH. An energy centric cluster-
performance, challenges and future considerations of based routing protocol for wireless sensor networks. Sen-
Google file system. Int J Comput Commun Eng 2014; sors 2018; 18(5): 1520.
3(4): 279–284. 38. Arjunan S and Sujatha P. Lifetime maximization of wire-
22. Gul S, Asif M, Ahmad S, et al. A survey on role of inter- less sensor network using fuzzy based unequal clustering
net of things in education. Int J Comput Sci Netw Secur and ACO based routing hybrid protocol. Appl Intell
2017; 17(5): 159–165. 2018; 48(8): 2229–22467.
20 International Journal of Distributed Sensor Networks
39. Ari AAA, Yenke BO, Labraoui N, et al. A power effi- 56. Liu Y, Zhang Y, Yu R, et al. Integrated energy and spec-
cient cluster-based routing algorithm for wireless sensor trum harvesting for 5G wireless communications. IEEE
networks: honeybees swarm intelligence based approach. Netw 2015; 29(3): 75–81.
J Netw Comput Appl 2016; 69: 77–97. 57. Gao H, Ejaz W and Jo M. Cooperative wireless energy
40. Wang Q, Lin D, Yang P, et al. An energy-efficient com- harvesting and spectrum sharing in 5G networks. IEEE
pressive sensing-based clustering routing protocol for Access 2016; 4: 3647–3658.
WSNs. IEEE Sens J 2019; 19(10): 3950–3960. 58. Xu J, Liu W, Lang F, et al. Distance measurement model
41. Arshad M, Ullah Z, Ahmad N, et al. A survey of local/ based on RSSI in WSN. Wirel Sens Netw 2010; 2(8): 606.
cooperative based malicious information detection tech- 59. Kirubasri G and Maheswari NU. A study on hardware
niques in VANETs. EURASIP J Wirel Commun Netw and software link quality metrics for wireless multimedia
(EURASIP JWCN) 2018; 62(2018): 1064. sensor networks. Int J Adv Netw Appl 2016; 8(3): 3103.
42. Tomić I and McCann JA. A survey of potential security 60. Gutierrez JA. Wireless medium access control (MAC)
issues in existing wireless sensor network protocols. IEEE and physical layer (PHY) specifications for low-rate wire-
Inter Things J 2017; 4(6): 1910–1923. less personal area networks (LR-WPANs). IEEE Stand
43. Osanaiye OA, Alfa AS and Hancke GP. Denial of service Info Technol 2003; 802(4). http://profsite.um.ac.ir/;
defence for resource availability in wireless sensor net- hyaghmae/ACN/WSNMAC1.pdf
works. IEEE Access 2018; 6: 6975–7004. 61. Gomez C, Boix A and Paradells J. Impact of LQI-
44. Malathi L, Gnanamurthy RK and Chandrasekaran K. based routing metrics on the performance of a one-to-
Energy efficient data collection through hybrid unequal one routing protocol for IEEE 802.15. 4 multihop net-
clustering for wireless sensor networks. Comput Elect Eng works. EURASIP J Wirel Commun Netw 2010; 2010(1):
2015; 48: 358–370. 205407.
45. Ullah F, Wang J, Farhan M, et al. LSA based smart 62. Baccour N, Koubâa A, Mottola L, et al. Radio link qual-
assessment methodology for SDN infrastructure in IoT ity estimation in wireless sensor networks: a survey. ACM
environment. Int J Parallel Prog 2020; 48: 162–177. Trans Sens Netw (TOSN) 2012; 8(4): 1–33.
46. Ai ZY, Zhou YT and Song F. A smart collaborative rout- 63. Khan FA, Khan M, Asif MA, et al. Hybrid and multi-
ing protocol for reliable data diffusion in IoT scenarios. hop advanced zonal-stable election protocol for wireless
Sensors 2018; 18(6): 1926. sensor networks. IEEE Access 2019; 7: 25334–25346.
47. Younis O and Fahmy S. HEED: a hybrid, energy-effi- 64. Ali I and Asif M. Applying security patterns for authori-
cient, distributed clustering approach for ad hoc sensor zation of users in IoT based applications. In: Proceedings
networks. IEEE T Mobile Comput 2004; 3(4): 366–379. of the 2018 international conference on engineering and
48. Cengiz K and Dag T. Energy aware multi-hop routing emerging technologies (ICEET), Lahore, Pakistan, 22–23
protocol for WSNs. IEEE Access 2017; 6: 2622–2633. February 2018, pp. 1–5. New York: IEEE.
49. Shahraki A, Rafsanjani MK and Saeid AB. Hierarchical 65. Karasekreter N, Basxxciftcxi F and Fidan U. RSSI based
distributed management clustering protocol for wireless clustering algorithm for wireless sensor networks. Online
sensor networks. Telecommun Syst 2017; 65(1): 193–214. J Sci Technol-January 2017; 7(1). https://pdfs.seman-
50. Yi D and Yang H. HEER – a delay-aware and energy- ticscholar.org/abf5/37d53209403fdb8313c1d7858f3e5f5e
efficient routing protocol for wireless sensor networks. e176.pdf?_ga=2.189758571.1156083251.1601011549-
Comput Netw 2016; 104: 155–173. 518534726.1585231317
51. Wang C, Zhang Y, Wang X, et al. Hybrid multihop 66. Smeds K, Wolters F and Rung M. Estimation of signal-
partition-based clustering routing protocol for WSNs. to-noise ratios in realistic sound scenarios. J Am Acad
IEEE Sens Lett 2018; 2(1): 1–4. Audiol 2015; 26(2): 183–196.
52. Li J, Silva BN, Diyan M, et al. A clustering based routing 67. Attiah A, Chatterjee M and Zou CC. A game theoretic
algorithm in IoT aware wireless mesh networks. Susta approach for energy-efficient clustering in wireless sensor
Cities Soci 2018; 40: 657–666. networks. In: Proceedings of the 2017 IEEE wireless com-
53. Ullah Z, Ahmed I, Ali T, et al. Robust and efficient energy munications and networking conference (WCNC), San
harvested-aware routing protocol with clustering approach Francisco, CA, 19–22 March 2017, pp. 1–6. New York:
in body area networks. IEEE Access 2019; 7:33906 -33921. IEEE.
54. Machado K, Rosário D, Cerqueira E, et al. A routing 68. Mishra M, Panigrahi CR, Sarkar JL, et al. GECSA: a
protocol based on energy and link quality for internet of game theory based energy efficient cluster-head selection
things applications. Sensors 2013; 13(2): 1942–1964. approach in wireless sensor networks. In: Proceedings of
55. Lee JS and Kao TY. An improved three-layer low-energy the 2015 international conference on man and machine
adaptive clustering hierarchy for wireless sensor net- interfacing (MAMI), Bhubaneswar, India, 17–19 Decem-
works. IEEE Intern Things J 2016; 3(6): 951–958. ber 2015, pp. 1–5. New York: IEEE.