Professional Documents
Culture Documents
Smart Agriculture Wireless Sensor Routing Protocol and Node Location Algorithm Based On Internet of Things Technology
Smart Agriculture Wireless Sensor Routing Protocol and Node Location Algorithm Based On Internet of Things Technology
1558-1748 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
24968 IEEE SENSORS JOURNAL, VOL. 21, NO. 22, NOVEMBER 15, 2021
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
XUE AND HUANG: SMART AGRICULTURE WIRELESS SENSOR ROUTING PROTOCOL AND NODE LOCATION ALGORITHM 24969
flexibility and extensibility of the network can be improved. network is E, and the average remaining energy of the network
By letting a few nodes assume more functions, such as data is E a , as shown in Equation (3):
collection and forwarding, data fusion, the remaining nodes
E ∗ (1 − r/rmax )
are assigned data collection tasks in turn. It can go to sleep Ea = (3)
during idle periods, which can make propoer use of energy and n
network bandwidth, effectively allocate resources [16], [17]. The probability that each sensor node becomes the CHN
Hierarchical routing generally uses clustering to divide the is also different. Let the residual energy of the i-th node be
network. Each cluster selects one or more cluster heads to E cur and become the CHN probability is P , as shown in
assume the main communication role. The functions of the Equation (4).
CHN are mainly to collect data of members in the cluster, allo-
P ∗ n ∗ E cur
cate members and resources in the cluster, route calculation, P = (4)
and data fusion. The more classic clustered routing protocols E ∗ Ea
include the LEACH protocol, and the PEGASIS protocol. The Conducive to extending the life of the network. Set the
TEEN protocol, and the APTEEN is developed based on them. distance Ri between the sensor node i and the base station,
c) Geo-location routing protocol: In the practical application as in Equation (5):
of WSNs, it is often necessary to know the location informa-
tion of the nodes, because the data with location information Ri = (x i − X)2 + (yi − Y )2 (5)
is more of the reference value, and many applications need to
know where and what data is generated [18], [19]. In addi- where (x i , yi ) is the node coordinates and (X, Y) is the base
tion, when managing the network, if you know the location station coordinates.
information, you can plan the network structure well. Let the initial value of the node be E o , and the average
2) Design of Routing Algorithm: The LEACH algorithm can distance between the node and the base station be D ava . The
balance the energy consumption of the WSN to each node, new Ti (n) is as follows (6):
which is beneficial to reducing the energy consumption gen- ⎧
⎪ P E cur 2 Davar 0.2
erated during the entire network operation and improving its ⎪
⎨ 1 − P × (r mod (1/P )) ∗ ( E ) ∗ ( R )
o
survival time [20], [21]. Ti (n) =
⎪
⎪ i∈N
It is assumed that the number of nodes in the monitoring ⎩
area is n, the number of clusters in the network is m, i.e., m 0 other wi se
CHNs, and the number of nodes contained in each cluster is (6)
n / m. In the r-th round, let node i be the cluster head. The
value of node is Ti (n). When selecting the CHN, each node New thresholds show that the greater the remaining energy
in the network randomly generates a random number ranging of a sensor node, the greater the probability of being selected
from 0 to 1. If the random number is less than Ti (n), then this as the CHN; the smaller the remaining energy of the sensor
sensor node is elected as the CHN. node, the less the probability of being selected as the CHN.
In each round, each node is elected as the CHN the same The greater the distance between a node and the base station,
number of times. The formula for the threshold Ti (n) of node the new threshold will become smaller, making it less likely
i being elected: to become a CHN, otherwise, the probability will become
⎧ larger.
⎨ m
i∈N
Ti (n) = n − m × (r mod (n/m)) (1)
⎩0 other wi se D. Node Localization Algorithm
1) Classification of Positioning Technology: Range-based
Let P = m / n. Equation (1) becomes Equation (2):
positioning technology is divided into three stages: ranging,
⎧
⎨ P positioning and correction. Ranging is the most important
i∈N
Ti (n) = 1 − P × (r mod (1/P)) (2) stage, which has a great impact on the accuracy of positioning.
⎩
0 other wi se With the distance, the position of the node can be deter-
mined according to the three-sided or multilateral positioning
In formulas (1) and (2), N represents a set of nodes that method [23]. Here are some important ranging methods based
have not been elected as the CHN in the recent 1 / P round. on ranging:
After n / m rounds, the set N is cleared, and the network starts a) Signal strength (RSSI): RSSI method determines the
to establish a new cluster. All nodes compete to become the distance by using the relationship between signal attenuation
CHN, and complete the establishment of the cluster. and distance during signal propagation. The receiver estimates
When applying the LEACH algorithm, each sensor node the distance from the receiver to the transmitter based on the
in a WSN has the same configuration and has the same received signal strength [24], [25]. The mathematical model
initial energy [22]. The improved algorithm is described in of the relationship between signal attenuation and distance is
detail as follows: When the sink node receives information, as follows:
it estimates the information of the sensor nodes. Assume that
the maximum number of rounds performed by the network is d
P L(d) = P L(d0 ) − 10n lg( ) − Xσ (7)
rmax . In the r-th round, the total energy of the nodes in the d0
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
24970 IEEE SENSORS JOURNAL, VOL. 21, NO. 22, NOVEMBER 15, 2021
b) Signal propagation time / time difference round trip time of anchor nodes i and j; h i j is the number of hops between
(TOA/TDOA/RFOF): This method requires strict time synchro- two anchor nodes.
nization between the transmitter and receiver, otherwise, it will The centroid positioning algorithm means that the anchor
bring great errors. Calculated as follows: node periodically broadcasts its own position information, and
the position information includes the anchor node’s own ID
d = (T1 − T0 ) × V (8) number and coordinate information. The centroid formula is
where T1 is the time when the transmitter sends the signal; T0 as follows:
is the time when the receiver receives the signal. x 1 +x 2 + ... + x k y1 + y2 + ... + yk
RTOF. The distance calculation formula is: (X est , Yest ) = ( , ) (14)
k k
[(T3 − T2 ) + (T1 − T0 )] × V
d = where (x 1 , y1 ), (x 2 , y2 ), . . . , (x k , yk ) is the coordinates of the
2 k polygon vertices; (X est , Yest ) is the coordinates of the
[(T3 − T0 ) + (T2 − T1 )] × V
= (9) polygon centroid.
2 2) Improvement of DV-HOP Positioning Algorithm:
TDOA method uses two signals with different propagation a) Pros and cons of DV-HOP positioning algorithm: Advan-
speeds, such as ultrasound and radio frequency signals. The tages of the DV-HOP algorithm: First, the DV-HOP algorithm
transmitter sends radio frequency signals at T0 , the receiver uses connectivity to run positioning calculations, and does not
receives at T1 , the transmitter sends ultrasonic signals at T2 , have high requirements for the network hardware equipment.
and the receiver receives at T3 . The calculation formula of Second, the DV-HOP algorithm is a relatively simple position-
TDOA is: ing algorithm. If there is no great need for positioning accuracy
Vr f − Vus in the application, and the error caused by the measurement
d = [(T3 − T1 ) + (T2 − T0 )] × (10)
Vr f Vus distance can meet the positioning requirements, this algorithm
can be applied. Third, the DV-HOP algorithm can improve
c) Received Signal Phase Difference (PDOA): The received
the positioning accuracy of the algorithm under the premise
signal phase difference PDOA (phase difference of arrival)
that the anchor nodes are relatively evenly distributed in some
method is to obtain the round-trip propagation time of a signal
special scenarios.
by measuring the phase difference of the signal.
Disadvantage of DV-HOP algorithm: if the minimum hop
ψ c ψ ψ value cannot be obtained, it will affect the size of the posi-
d =c = =λ (11)
2π f c f c 2π 2π tioning error. The path between each node in the network is
where f c is the frequency of the signal; λ is the wavelength of mostly a broken line segment, but the hop distance obtained
the signal; ψ is the phase difference between the transmitted by this algorithm replaces the actual distance, it adds one to
signal and the received signal; and the range of d is [0, λ]. the hop value, and the hop between nodes The more you will
If the distance between the transmitter and the receiver is n count. When the minimum jump value is not obtained, an error
times the λ, the following formula is used: will occur in the calculated correction value, and the error will
continue to accumulate.
ψ
d=λ + nλ (12) b) Modify DV-HOP algorithm: The calculation of the anchor
2π node’s correction value uses other anchor nodes except itself,
Using this method requires knowing the range of d to which can not truly reflect the density distribution around
determine the value of n, and finally to determine the value itself. When the sensor nodes in the network communicate,
of d. there may be some unknown nodes in the shortest path
d) Positioning technology without ranging: The typical between the anchor nodes, which makes the unknown nodes
ranging-free positioning algorithms are DV-hop positioning become intermediate nodes between the beacon nodes.. How-
algorithm, centroid positioning algorithm, etc. The following ever,most sensor nodes are on a polyline. The existence of
describes their working principles. this method results in the phenomenon that some paths overlap
The DV-hop positioning algorithm is divided into three between nodes. The anchor nodes first calculate the correction
steps: value, and then calculate the hop distance of each anchor node,
When an anchor node receives the hop count and position Equation (15):
information of all other anchor nodes, it can estimate the
average distance of each hop. The average distance per hop (x i − x j )2 + (yi − y j )2
formula is as follows: D= (15)
hi j
(X i − X j )2 + (Yi − Y j )2
j =i where i and j are different beacon nodes, the coordinates of
di = (13) (x i , yi ), (x j , y j ) are the coordinates of nodes i and j, and h i j
hi j
j =i is the hop value between beacon nodes i and j. The anchor
node correction value is modified to an average of the original
In the formula, di is the estimated average distance per correction value calculated by the formula (13) and the jump
hop of anchor node i; (X i , Yi ), (X j , Y j ) is the coordinates distance calculated by the formula (15). The average value Z
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
XUE AND HUANG: SMART AGRICULTURE WIRELESS SENSOR ROUTING PROTOCOL AND NODE LOCATION ALGORITHM 24971
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
24972 IEEE SENSORS JOURNAL, VOL. 21, NO. 22, NOVEMBER 15, 2021
TABLE I
C OMPARATIVE A NALYSIS OF R ESIDUAL E NERGY T EST R ESULTS
TABLE III
C OMPARATIVE A NALYSIS OF P OSITIONING E RRORS
B ETWEENTWO A LGORITHMS
TABLE II
C OMPARATIVE A NALYSIS OF P OSITIONING
E RRORS OF U NKNOWN N ODES
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.
XUE AND HUANG: SMART AGRICULTURE WIRELESS SENSOR ROUTING PROTOCOL AND NODE LOCATION ALGORITHM 24973
of modified hop distances, specifically the source of the [14] S. Chelbi, M. Abdouli, and M. Kaddes, “An unequal cluster-based
error of the average distance of anchor nodes. Based on this routing protocol based on data controlling for WSN,” Int. J. Elect.
Comput. Eng., vol. 6, no. 5, pp. 2403–2414, 2016.
modification, the average hop distance of the entire network [15] R. Kumar and D. Kumar, “Multi-objective fractional artificial bee colony
is obtained, which is closer to the actual average hop distance algorithm to energy aware routing protocol in wireless sensor network,”
between nodes. The error of the average hop distance of the Wireless Netw., vol. 22, no. 5, pp. 1461–1474, Jul. 2016.
[16] A. Pannu and D. Kumar, “Clustering and general self-organized tree-
whole network is obtain.. According to the above information based energy-balance routing protocol for wireless sensor network
and using the new formula, the new correction value of the (CGSTEB),” Int. J. Comput. Appl., vol. 118, no. 19, pp. 45–49,
anchor node is obtained. May 2015.
[17] N. Chandra, A. Kumar, and R. Yadav, “A survey: Wireless sensor
(2) Present work proposes improvements for the short- network and its routing protocol,” Int. J. Comput. Appl., vol. 130, no. 11,
comings of typical LEACH routing protocols. Specifically, pp. 41–45, Nov. 2015.
it optimizes its cluster head selection mechanism during its [18] J. Wu, X. Feng, H. Zhang, and W. Lv, “Design and analysis of clus-
tering routing protocol in wireless sensor network of frozen food,” Int.
cluster establishment stage, and it takes into account the node’s J. Online Eng., vol. 13, no. 12, p. 37, Dec. 2017.
energy and its radius.It avoids sensor nodes with too low [19] L. Kong, J.-S. Pan, V. Snáel, P.-W. Tsai, and T.-W. Sung, “An energy-
energy from acting as CHNs to disable and making CHNs aware routing protocol for wireless sensor network based on genetic
algorithm,” Telecommun. Syst., vol. 67, no. 3, pp. 451–463, Mar. 2018.
to not focus on one area. It also affect the life of the network, [20] B. Patel and J. Munjani, “Chain based routing protocol for wireless
extend the life cycle, and finally use MATLAB software to sensor network,” Int. J. Comput. Appl., vol. 134, no. 4, pp. 21–24,
make simulations and analyze the results. Jan. 2016.
[21] Y. Chen, S. Lu, and J. Chen, “Node localization algorithm of wireless
(3) There are still some shortcomings in the proposed study, sensor networks with mobile beacon node,” Peer Peer Netw. Appl.,
and further research can be conducted on these issues: the vol. 10, no. 3, pp. 1–13, 2016.
research content of the chapter is only for the basic knowledge [22] L. Yun-Ting, Z. Si-Ying, and J. Yuan-Wei, “Non-line of sight node
localization algorithm based on particle swarm optimization for wireless
of the entire WSN. There are still other related technologies sensor networks,” Control Decis., vol. 30, no. 6, pp. 1106–1110, 2015.
that need to be studied in subsequent work. When analyzing [23] S. Jia and C. Yang, “Received signal strength indicator node localization
the LEACH routing protocol, lack of energy and location of algorithm based on constraint particle swarm optimization,” Telkomnika,
vol. 13, no. 1, p. 221, Mar. 2015.
the nodes in the selection of cluster heads are considered. [24] X. Wu, “A range-free node localization algorithm based on potential
finally, it studies how to provide energy and how to arrange space self-definition and local neighbor selection in WSN,” J. Inf.
the nodes to increase the coverage.. Comput. Sci., vol. 12, no. 3, pp. 1113–1123, Feb. 2015.
[25] S. K. Rout, A. K. Rath, and C. Bhagabati, “Energy efficient dynamic
node localization technique in wireless sensor networks,” Indian J. Sci.
R EFERENCES Technol., vol. 10, no. 15, pp. 1–8, 2017.
[1] L. Lin, P. Yu, and Z. Li, “Using clustering algorithm to visualize spatial-
temporal Internet of Things data in process of agricultural product
circulation,” Nongye Gongcheng Xuebao/Trans. Chin. Soc. Agricult.
Eng., vol. 31, no. 3, pp. 228–235, 2015.
[2] M. B. Ahmed, S. Gonnade, and D. Xaxa, “Energy-efficient protocols
for WSNs,” Int. J. Comput. Appl., vol. 44, no. 3, pp. 9–11, 2016.
[3] A. Ahmed, K. Bakar, and M. Channa, “TERP: A trust and energy aware
routing protocol for wireless sensor network,” IEEE Sensors J., vol. 15,
no. 12, pp. 6962–6972, Dec. 2015.
[4] Y. Chen, S. Zhao, and Y. Zhou, “Research on intelligent agricultural Dingzhu Xue was born in Nongan, Jilin, China,
planting system based on Internet of Things technology,” J. Comput. in 1981. He received the master’s degree from
Commun., vol. 06, no. 06, pp. 54–60, 2018. Jilin University, China. Now, he works at the
[5] Z. Hongbo and G. Wei, “Seasonal agricultural products distribution and College of Information and Technology, Jilin Agri-
traceability system based on the RFID Internet of Things,” Int. J. Smart cultural University. His research interests include
Home, vol. 10, no. 11, pp. 1–14, Nov. 2016. computational intelligence and intelligent image
[6] J. Li, “Design and realization of greenhouse sensor intelligent manage- processing.
ment system based on Internet of Things,” Int. J. Online Eng., vol. 13,
no. 05, p. 80, May 2017.
[7] C. Chen and X. Xu, “Design and application of traceability and
supervision platform for broiler based on Internet of Things,” Trans.
Chin. Soc. Agricult. Eng., vol. 33, no. 5, pp. 224–231, 2017.
[8] R. U. Onyeneke, C. O. Igberi, C. O. Uwadoka, and J. O. Aligbe, “Status
of climate-smart agriculture in Southeast Nigeria,” GeoJournal, vol. 83,
no. 2, pp. 333–346, Apr. 2018.
[9] I. Cardei and M. Cardei, “Energy-efficient connected-coverage in
WSNs,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8449–8462,
Jan. 2016.
[10] Z.-T. Li, Q. Chen, and G. M. Zhu, “A low latency, energy efficient
MAC protocol for WSNs,” Int. J. Distrib. Sensor Netw., vol. 2015, no. 6, Wei Huang was born in Yunmeng, Hubei, China,
pp. 1–9, 2015 in 1990. She received the master’s degree from
[11] S. Bebortta, D. Senapati, and N. Rajput, “Evidence of power-law Guangxi University, China. Now, she works at the
behavior in cognitive IoT applications,” Neural Comput. Appl., vol. 32, College of Agriculture, Yulin Normal University,
pp. 16043–16055, May 2020. as an Associate Research Fellow. Her research
[12] Z. Chen, A. Liu, and Z. Li, “Distributed duty cycle control for delay interests include function agriculture and intelli-
improvement in WSNs,” Peer Peer Netw. Appl., vol. 10, no. 3, pp. 1–20, gent agriculture.
2016.
[13] Z. Xu, C. Cheng, and V. Sugumaran, “Big data analytics of crime pre-
vention and control based on image processing upon cloud computing,”
J. Surveill. Secur. Saf., vol. 1, pp. 16–33, May 2020.
Authorized licensed use limited to: SRM Institute of Science and Technology. Downloaded on August 28,2023 at 05:58:08 UTC from IEEE Xplore. Restrictions apply.