Professional Documents
Culture Documents
1 s2.0 S0925231216302673 Main
1 s2.0 S0925231216302673 Main
Neurocomputing
journal homepage: www.elsevier.com/locate/neucom
art ic l e i nf o a b s t r a c t
Article history: In order to save energy for event-driven wireless sensor networks (WSNs) applied to emergency mon-
Received 5 September 2015 itoring, a rule-driven multi-path routing algorithm with dynamic immune clustering (RDICMR) is pro-
Received in revised form posed. The RDICMR algorithm is executed under the driven of condition rules and implementation rules.
12 January 2016
By applying the working mechanism of the biological immune system to the event-driven dynamic
Accepted 21 March 2016
clustering algorithm for WSNs, where event as antigen, the records of clusters and routing paths of past
Communicated by Dr. K. Li
Available online 7 May 2016 events in the node's memory as antibodies, antibodies have the function of collecting and preserving
memories, as such it is convenient to response to antigens that are similar to the previous antigen timely.
Keywords: When similar events happen and satisfy the affinity and energy rules, the sensor nodes can directly call
Wireless sensor network
antibodies in the memory to build clusters of events and transfer data quickly. Besides, we change the
Multi-path routing
cycle of the network dynamically according to the updating cluster cycle rule. The proposed RDICMR
Event-driven
Rule-driven algorithm saves a lot of energy in the process of building clusters and data transmission, increases the
Dynamic immune clustering amount of data transmission and prolongs the lifetime of the network.
& 2016 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.neucom.2016.03.052
0925-2312/& 2016 Elsevier B.V. All rights reserved.
140 Y. Ding et al. / Neurocomputing 203 (2016) 139–149
characteristics of the emergency monitoring system. According to cannot move after being deployed, and the number of sensor
the way of collecting and sending data in WSNs, WSNs can be nodes is decided according to the size of the application sys-
divided into two categories [22]: time-driven WSNs [23,24] and tem. The BS is deployed in a fixed position outside the
event-driven WSNs [25–27]. detection area.
In the typical clustering routing protocols of event-driven 2) The energies of the sensor nodes are set to be equal and un-
WSNs, despite the factors such as the energy of the nodes, the replenishable when the sensor nodes are deployed. The mutual
distance between the nodes are taken into consideration, but the communications can be carried out between a node and the BS.
events' features are not taken into consideration. In [28], some Besides, the wireless transmitting power is limited and adjus-
basic characteristics of events are considered, such as the severity table. The wireless transmitting power of the BS is very large.
of the event, location of the event, and a dynamic clustering 3) A sensor node sends data to the BS only when an unexpected
routing algorithm (DCRR) was put forward. But in the DCRR event happens. While it is not required to periodically send
algorithm, the clusters are set up in advance, there may be some sample data to the BS, the unexpected event is required to be
difference between the built clusters and the actual situation. Ou discovered and responded in the first place.
[29] put forward a dynamic clustering routing algorithm (DCRA). 4) The wireless transceiver module will be in dormancy state for a
In the algorithm, the clusters are built dynamically after the event long time. Only when potential risks occur, sensor nodes will
occurs according to the characteristics of the event. But the nodes be woken up. In the meantime, they transmit the data to
will spend a lot of energy to build clusters when similar events the BS.
happen again. 5) The node zone can be divided into several sub-zones. Each
The main energy consumption of the WSNs is during data sensor node obtains a zone number according to the deployed
transmission. If every time when a similar event occurs, clusters location of itself.
and routing paths are rebuilt and a large amount of similar data is 6) The sensors adopt the time synchronization.
transmitted, as such a lot of energy would be wasted. Comparing
the routing process of the event-driven routing algorithm in the In above features, the first two items have universalities in all
WSNs and the virus invasion process in the biological immune WSNs. While the last few items are more suitable to the char-
system, we are inspired that we can solve the above issue acteristics of the event-driven networks, and the fifth item is
according to the biological immune system. Hence we introduce especially obvious, because it is necessary for the node to obtain
the biological immune mechanism into the algorithm design to its location information, hence the data it collects is meaningful.
realize the energy-saving, quick clustering and routing of the
similar events. We propose a rule-driven multi-path routing 2.2. Energy consumption theory of wireless communication
algorithm with dynamic immune clustering (RDICMR) for event-
driven WSNs. The energy consumption sending k bits data from one node to
In the RDICMR, for a similar event, under rule-driven, we reuse another one, where the distance been them is d, is defined as:
the cluster structures and routing paths built before and reduce
ETx ðk; dÞ ¼ ETx elec k þ εd k
n
ð1Þ
the data transmission according to the implementation rules to
reduce the energy consumption. The energy consumption receiving k bits data is:
The main contributions of this paper are as follows: 1) we
ERx ðkÞ ¼ ERx elec k ð2Þ
develop a dynamic immune clustering method based on the bio-
logical immune mechanism to the event-driven WSNs to reduce In general,
the energy consumption when a similar event happens. 2) We ETx elec ¼ ERx elec ¼ Eelec ð3Þ
propose the RDICMR where condition rules and implementation
rules are used to reduce the energy consumption for event- In which Eelec means energy consumption of 1 bit data doing
code modulation. εd means the amplifier energy consumption to
n
driven WSNs.
The rest of this paper is arranged as follows. In Section 2, we send 1 bit data, which are determined by the communication
introduce the model of the event-driven WSNs and its energy distance and error rate. ε is the propagation loss index. The value
consumption theory. In Section 3, we propose the main innovation of n relates to the transmission environment, which is always in
points by combining rule-driven and the biological immune the range of 2–4. Hence the single hop communication distance
mechanism with the routing algorithm, and show the detailed should be reduced, and the multi-hop with short distance com-
working processes of the RDICMR algorithm. In Section 4, simu- munication method is a better choice.
lation experiments are done to show the effectiveness of the
proposed algorithm. In Section 5, we conclude the whole paper
and provide the further study in the future. 3. A rule-driven multi-path routing algorithm with dynamic
immune clustering
2. Event-driven wireless sensor network model and energy 3.1. Mappings between the biological immune system and the event-
consumption theory driven WSNs
function, after the first invasion of the virus, the system produces Begin
the immune response for the first time, then the antibodies Update record, record
System events
remember the characteristics of the virus. When such or similar
initialization
virus invades again, the system will produce “secondary” response,
learn the structure and characteristics of the virus and destroy the Dormancy
Y
3.2. RDICMR algorithm
Meet the Y Excited nodes Y
To solve the energy waste problem in the routing process of the affinity rule? meet the energy rule?
event-driven WSNs, we propose the RDICMR algorithm based on
N
the DCRA algorithm. In the DCRA algorithm, the clusters are built Execute the cluster N
dynamically after the event occurs according to the characteristics head selection rule
of the event. But the nodes will spend a lot of energy to build
clusters when similar events happen again. The RDICMR algorithm Execute the establishing Copy the cluster structure of the
solves the defect and reduces the energy consumption in the cluster rule event whose affinity is the higest
WSNs. The overall process of the RDICMR is as shown in Fig. 1,
where the biological immune mechanism is used to rebuild the End
clusters and routing paths. Routing under the driven of rules, we
Fig. 2. Sub-processes of building clusters.
choose the cluster heads and update the cluster cycle according to
the implementation rules.
2) We apply the biological immune system to the routing algo-
The amount of data transmitted is reduced according to the
rithm to reduce the energy consumption.
rules, so the energy consumption of the network is reduced. Based
on the DCRA, the following improvements are made:
The RDICMR algorithm mainly includes two stages: building
clusters and data transmission. The building clusters stage
1) In the process of the routing algorithm, we use condition rules
includes two sub-stages: judging whether meets the trigger rule
and implementation rules to drive the algorithm to reduce the
and building clusters, as shown in Fig. 2. The data transmission
energy consumption.
stage includes establishing routing paths, data transmission, and
Table 1
routing paths maintenance, as shown in Fig. 3. The rules men-
Mappings between the biological immune system and the event-driven WSNs. tioned in Figs. 2 and 3 are introduced in details in Section 3.3.
Antigen Event
Rule-driven has been applied in many aspects like Web service
Antibody The record of clusters and routing path of past event
in the node's memory composition, automation test framework research [31], geographic
Affinity The consistency of the area and intensity of the information management and business service composition [32]
event except routing algorithm. In this paper, rule-driven is applied to
B cells Sensor nodes
the event-driven dynamic clustering routing algorithm. It can
T cells Sensor nodes
improve the applicability of the algorithm because the process of
142 Y. Ding et al. / Neurocomputing 203 (2016) 139–149
the algorithm is known clearly by users and the specific rule turn on transceivers and send data to their cluster head.
parameters are defined by users considering the real conditions. Meanwhile, the event saves the monitored data at this time as
Rules can be divided into two cases: condition rules and imple- SV. In this round, when these nodes select the cluster head and
mentation rules. The specific rules and their execution conditions transmit data next time, the follow conditions must be
are as shown in Table 2. satisfied:
3.3.1. Condition rules a) The absolute differential value between SV and currently
Condition rules refer to the execution condition judgment in received data must be larger or equivalent to soft threshold;
the process of the routing algorithm, including the trigger rule, b) the currently received data must be larger or equivalent to
affinity rule, and energy rule. hard threshold.
When the monitored data meet the two conditions at the
1) Trigger rule same time, the sensor nodes in the optimum clustering radius
In the algorithm we use two threshold values of TEEN protocol go into the exciting state, and it satisfies the trigger rule.
[14], one is hard threshold ðH T Þ, and the other is soft threshold
ðST Þ. The two values are broadcasted to all nodes in the initi- 2) Affinity rule
alization stage of the system. These nodes perceive the ambient When the event satisfies the trigger rule, then we check the
environment continuously through sensor. When the mon- affinity between the current event and history events via Eq.
itored value D reaches the hard threshold for the first time, the (4), and find the biggest affinity via Eq. (5).
event sends signals within the scope of optimum clustering
1 1
radius ðRopt Þ in the surrounding. The nodes receiving the signals Affinity ¼ ð4Þ
1 þ ΔD 1 þ S
will compete for being a cluster head. The cluster is built
through the cluster-head selection algorithm. Then the nodes
Affinity_ max ¼ maxðAffinityÞ ð5Þ
Begin
Affinity represents the evaluation index of affinity, the range is
[0,1]. The bigger the value is, the bigger the affinity is.
Meet
the affinity
Excited nodes meet Y ΔD ¼ D D j, D represents the monitored data, D* represents
Y the energy rule? the historical monitored data, S represents the Euclidean
rule?
distance between the events, Affinity_ max represents the
N
N biggest affinity.
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
S ¼ ðX e_new X e_old Þ2 þ ðY e_new Y e_old Þ2
2
Execute the updating cluster cycle ð6Þ
rule, transmit data using the
routing path whose affinity is the where
ðX e_new
; Y e_new Þ is the coordinate of the current event,
highest X e_old ; Y e_old is the coordinate of the old event.
Execute the establishing If the affinity satisfies the evaluation standard, it satisfies the
routing path rule affinity rule, and the rule parameter can be defined by user
according to the real condition.
Execute the data
transmission rule
3) Energy rule
Execute the routing path The energy rule parameter Standard_Energy can also be
maintenance rule
defined by user according to the real condition. If all the
Fig. 3. Sub-processes of data transmission. exciting nodes meet the energy rule, it satisfies the energy rule.
Table 2
Specific rules and their execution conditions.
Implementation rules Cluster heads selection rule The event is triggered but the affinity rule or the energy rule is not satisfied
Updating cluster cycle rule The event is triggered, and the triggered event satisfies the two rules at the same time
Cluster parameters determination The event is triggered but the affinity rule or the energy rule is not satisfied
rule
Establishing cluster rule The event is triggered but the affinity rule or the energy rule is not satisfied.
The cluster head selection rule has been executed
Establishing routing paths rule The event is triggered but the affinity rule or the energy rule is not satisfied.
The cluster head selection rule and the establishing cluster rule have been executed
Data transmission rule The event is triggered but the affinity rule or the energy rule is not satisfied.
The cluster head selection rule, the establishing cluster rule and the establishing routing paths rule have
been executed
Routing paths maintenance rule The event is triggered but the affinity rule or the energy rule is not satisfied.
The cluster head selection rule, the establishing cluster rule, the establishing routing paths rule and data
transmission rule have been executed
Y. Ding et al. / Neurocomputing 203 (2016) 139–149 143
3.3.2. Implementation rules WSNs. When no event happens, all the nodes are dormant, so
Implementation rules refer to the steps how to do in the the energy consumption during the period is low. Besides, we
routing process, including the cluster heads selection rule, calculate ccfw and cczq according to the intensity of the event
updating cluster cycle rule, cluster parameters determination rule, to reduce the energy consumption of communication, and
establishing cluster rule, establishing routing paths rule, data improve the energy efficiency.
transmission rule, and routing paths maintenance rule. 4) Establishing cluster rule
After the election of cluster heads, all the cluster heads will
1) Cluster heads selection rule keep their transceiver open and send messages to the sur-
We improve the cluster heads election formula of LEACH [13], rounding nodes. According to the received signal strength, all
as shown in Eq. (7): the non-cluster-head nodes will decide to belong to which
( p E ðnÞ
cluster. After all these are done, through CSMA MAC [33]
w1 1 pðr mod 1=pÞ
þ w2 En_lef t
þ w3 ð1 LLBSmax Þ; n A G protocol, the cluster head nodes will be informed that who is a
TðnÞ ¼ n_init
ð7Þ
0; others member of this cluster.
5) Establishing routing paths rule
where r represents the current election round number, p
In the proposed algorithm, we use the improved energy multi-
represents the ratio between the number of cluster heads and
path routing rule. Each node needs to know all next-hop nodes
the total number of nodes in the network, G represents the set of
to the destination node. Each node calculates the probability
nodes that have never been the cluster head. w1 ; w2 ; w3 repre-
that the other nodes are taken as the next-hop node to
sents the importance of the three parameters respectively,
transmit data according to the value of the communication
w1 þ w2 þ w3 ¼ 1; En_lef t represents the residual energy of the
cost. Cos tðiÞ is the communication cost of node i to the
node n; En_init represents the initial energy of the node n; LBS ðnÞ
destination node. Because there are lots of paths from each
represents the distance between the node n and the BS; Lmax
node to the destination node, so the value of the cost is the
represents the longest distance between the BS and the nodes.
weighted average of each path. The main rules of establishing
Then in the region where the event happens, the more energy
routing paths are as follows:
for a node that has never been selected as a cluster head
a) The destination node broadcasts the establishing routing
remains, the greater the probability of the node to be selected
paths message to its neighbor nodes to start establishing
as the cluster head is. Also the closer the node from the BS is, the
routing paths. The establishing routing paths message
earlier the node can get the chance to be a cluster head.
includes the field of cost and jump number. The field of cost
2) Updating cluster cycle rule
represents the energy consumption of the path with the node
We calculate the new cluster lifetime according to the affinity
that sends the message, and the initial value is set to 0. The
via Eq. (8), then transmit data.
field of jump number represents the jump number hi of the
cczq_new ¼ ½cczq ð1 Affinity_ maxÞ þ Basic_NUM ð8Þ path from the node that sends the message to the destination
node, the initial value is set to 0, and the total jump number
where cczq_new represents the new cluster lifetime, cczq
of the destination node is 0;
represents the original cluster lifetime, Affinity_ max repre-
b) when a node receives the establishing routing paths message
sents the biggest affinity, Basic_NUM is a parameter that can be
from its neighbor nodes, it compares the distance to the
adjusted by different events. It can be seen from Eq. (8) that,
source node and the destination node, if it is closer to the
the higher the affinity is, the shorter the new clustering period
source node and more far to the destination node, the node
is, the less the data that needs to be transmitted and thus the
sends the message, otherwise it discards the message;
more the energy can be saved.
c) if the node decides to send the establishing routing paths
3) Cluster parameters determination rule
message, it is necessary to calculate the new value of the field
We calculate the range of clusters (ccfw) by Eq. (9) and the
of cost and jump number. When the message is sent from
cycle of clusters (cczq) by Eq. (10). Then we inform all nodes
node i to node j, the communication cost of the path includes
within the scope of ccfw to participate in the election of cluster
the cost of node i and the communication cost between node
heads.
i and node j
Ropt D
ccf w ¼ ð9Þ C j;i ¼ Cos tðiÞ þ Metricði; jÞ ð11Þ
HT
where Ropt represents the optimal radius of clusters, D repre-
sents the monitored data. Among them, C j;i is the cost of the path from node j to the
destination node across the node i. Metricði; jÞ is the com-
SD munication cost from node j to node i
cczq ¼ ð10Þ
HT
β
Metricði; jÞ ¼ eαij Ri ð12Þ
where S represents the conventional lifetime of clusters which
can be set according to the actual situation to be constant
generally, D represents the monitored data. Among them, eαij is the energy consumption of direct com-
From Eq. (9), we can see that under the condition that the hard β
munication between node i and node j. Ri is the residual
threshold and the optimal radius of clusters are not changed, energy of node i. α; β are constant. This way considers the
the bigger the intensity of the event is, the greater the optimal energy consumption and residual energy of nodes at the
radius of clusters will be. From Eq. (10), we can see that under same time.
the condition that the conventional lifetime of clusters and the In addition, the jump number of node j is the jump number of
hard threshold are not changed, the bigger the intensity of the node i plus 1:
event is, the longer the lifetime of the cluster is.
hj ¼ hi þ 1 ð13Þ
In the TEEN algorithm, when no event happens it still elects
cluster heads, builds clusters and dissolves clusters, which
causes the energy waste problem. The proposed algorithm Among them, hj is the jump number of the path from node j
solves the problem by using the advantages of the event-driven to the destination node across the node i.
144 Y. Ding et al. / Neurocomputing 203 (2016) 139–149
d) The node has to give up the paths whose cost is too big, the 6) Data transmission rule
condition that node j adds node i to its local routing table FTj Data transmission includes data transmission between nodes
is inside clusters and data transmission between cluster heads
and the BS. For the nodes inside clusters, we still adopt single
FTj ¼ iC j;i r αðminðC j;k ÞÞ ð14Þ
hop method for the data transmission with the cluster head
according to TEEN protocol. After the cluster head collects the
Among them, α is the system parameter that is more than 1. data sent by the nodes within the cluster, data fusion is
e) The node j calculates the next-hop selecting probability for implemented and then the processed data will be sent to the
each node in the routing table. It is inversely proportional to BS. The data transmission between cluster heads and the BS is
the energy consumption and the jump number. The node j much more complex. Generally speaking, most cluster heads
calculates the probability of selecting node i as the next-hop are far from the BS. In order to reduce energy consumption, we
node using the following formula adopt the multiple hop method to build transmission paths and
1=C j;i 1=h implement data transmission [34]. The processes are shown as
P j;i ¼ α P þβ P i follows:
1=C j;k 1=hk
k A FT j k A FT j the cluster head selects the next-hop cluster head according to
αþβ ¼ 1 ð15Þ the establishing routing paths rule, and sends the data to the
selected cluster head. At the same time, the cluster head
records the path in the memory of the event.
f) The node calculates the cost of itself to the destination node 7) Routing paths maintenance rule
Cos tðjÞ according to the each energy cost in the routing table The way of routing paths maintenance is doing the flood query
and the selecting probability of the next-hop node. It is the
from the destination node to the source node periodically.
average cost of nodes in routing table to the destination node
X
Cos tðjÞ ¼ P j;i C j;k ð16Þ 3.4. The whole process of the RDICMR algorithm
k A FT j
100 Table 7
RDCRA
The performance analysis of DCRA and RDCRA.
DCRA
95 Algorithm
90
improved
100
75 RDCMR
RDICMR
70 95
0 500 1000 1500 2000 2500 3000
time/round
85
1800
80
1600
1400
The amount of data transmission)
75
1200
70
1000 0 500 1000 1500 2000 2500 3000 3500 4000
time/round
800
Fig. 8. Comparison of lifetime between RDCMR and RDICMR.
600
900
400 RDCMR
RDICMR
800
200
RDCRA
DCRA 700
The amount of data transmission
0
0 500 1000 1500 2000 2500 3000
time/round 600
Fig. 6. Comparison of the amount of data transmission between DCRA and RDCRA. 500
400
300
RDCRA
20
RDCRA 200
18 DCRA
100
16
The remaining energy of network
0
0 500 1000 1500 2000 2500 3000 3500 4000
14 time/round
8
routing to transfer data without immune mechanism, we can
6
see from the Figs. 8–10 that the performance of the RDICMR is
4 improved in the network lifetime, the amount of data trans-
mission and the remaining energy of network compared with
2
0 500 1000 1500 2000 2500 3000 the RDCMR.
time/round Due to the nodes are distributed in EA randomly, in order to
Fig. 7. Comparison of the remaining energy of network between DCRA and RDCRA. make the advantages of immune energy multi-path data trans-
mission more persuasive, we executed the RDCMR and RDICMR 20
4.3. Performance analysis of immune energy multi-path data times to count the average performance of them as shown in
transmission Table 8. We can see from Table 8 that the performance of the
RDICMR is improved in the network lifetime, the amount of data
Comparing the network performance between the RDICMR transmission and the remaining energy of network compared with
and the RDCMR which uses the typical energy multi-path the RDCMR.
Y. Ding et al. / Neurocomputing 203 (2016) 139–149 147
20 1800
RDCMR
18 RDICMR 1600
16 1400
14
1200
12
1000
10
800
8
600
6
400
4
RDICMR
200
2 TEEN
DCRA
0
0 0 500 1000 1500 2000 2500 3000
0 500 1000 1500 2000 2500 3000 3500 4000
time/round
time/round
Fig. 12. Comparison of the amount of data transmission between TEEN, DCRA and
Fig. 10. Comparison of the remaining energy of network between RDCMR and
RDICMR.
RDICMR.
20
Table 8 RDICMR
The performance analysis of RDCMR and RDICMR. 18
TEEN
DCRA
Algorithm 16
100 4
RDICMR
TEEN 2
0 500 1000 1500 2000 2500 3000
95 DCRA
time/round
Fig. 13. Comparison of the remaining energy of network between TEEN, DCRA and
90 RDICMR.
Lifetime of network
85
Table 9
The performance analysis of TEEN, DCRA and RDICMR.
80
Algorithm
4.4. Analysis of comprehensive network performance Fig. 12 shows the comparison of the amount of data transmis-
sion between the TEEN, the DCRA and the DICMR, abscissa is time,
We compare TEEN algorithm and DCRA algorithm with our ordinate is the amount of data transmission of the network. We
algorithm. TEEN is the typical event-driven routing algorithm, it is can see from Fig. 12 that during the whole lifetime, the amount of
necessary to provide our algorithm is better than it. DCRA is an
data transmission of the RDICMR is more than that of the other
event-driven routing algorithm considering the feature of the
algorithms, and the utilization efficiency of the RDICMR is higher
events, and it is necessary to provide our algorithm with it.
than that of the other algorithms.
Fig. 11 shows the comparison of lifetime among the TEEN, the
Fig. 13 shows the comparison of the remaining energy of
DCRA and the RDICMR, abscissa is time, ordinate is the number of
live nodes. We can see from Fig. 11 that under the condition of network between the TEEN, the DCRA and the RDICMR,
same events, the lifetime of the RDICMR is longer than that of the abscissa is time, ordinate is the remaining energy of network.
other algorithms. Because when similar events happen, the TEEN We can see from the figure that at the same time, the
and the DCRA will re-establish routing paths and transmit the residual energy of the RDICMR is higher than that of other
same data repeatedly, as such consume more energy. algorithms.
148 Y. Ding et al. / Neurocomputing 203 (2016) 139–149
Due to the nodes are distributed in EA randomly, in order to [15] W. Liu, H. Jiang, X. Wang, Research and improvement of PEGASIS protocol in
make the advantages of RDICMR more persuasive, we executed wireless sensor network, Chin. J. Sens. Actuators 12 (2013) 27–30.
[16] H. Chan, A. Perrig, ACE: An Emergent Algorithm for Highly Uniform Cluster For-
the TEEN, DCRA and RDICMR 20 times to count the average per- mation, Wireless Sensor Networks, Springer, Berlin Heidelberg (2004), p. 154–171.
formance of them as shown in Table 9. We can see from Table 9 [17] O. Younis, S. Fahmy, HEED: a hybird, energy -efficient, distributed clustering
that the performance of the RDICMR is the best in the network approach for ad-hoc sensor networks, IEEE Trans. Mobile Comput. 3 (4) (2004)
366–379.
lifetime, the amount of data transmission and the remaining [18] A.A. Abbasi, M. Younis, A survey on clustering algorithms for wireless sensor
energy of network among them. networks, Comput. Commun. 30 (14) (2007) 2826–2841.
[19] D. Barbucha, Search modes for the cooperative multi-agent system solving the
vehicle routing problem, Neurocomputing 88 (2012) 13–23.
[20] L. Jin, G. Chang, D. Sun, et al., Research on hierarchical routing protocol based
5. Conclusions on optimal clustering head for wireless sensor networks, Int. J. Model. Identif.
Control 15 (4) (2012) 331–337.
[21] M. Yu, K.K. Leung, A. Malvankar, A dynamic clustering and energy efficient
Based on the DCRA, we use the biological immune mechanism routing technique for sensor networks, IEEE Trans. Wirel. Commun. 6 (8)
and rule-driven to the event-driven clustering routing algorithm, (2007) 3069–3079.
[22] P. Rawat, K.D. Singh, H. Chaouchi, et al., Wireless sensor networks: a survey on
and put forward a rule-driven multi-path routing algorithm with recent developments and potential synergies, J. Supercomput. 68 (1) (2014)
dynamic immune clustering (RDICMR) for event-driven WSNs. In 1–48.
the proposed algorithm, if the event satisfies the affinity rule and [23] R.V. Kulkarni, A. Förster, G.K. Venayagamoorthy, Computational intelligence in
wireless sensor networks: a survey, IEEE Communications Surveys Tutorials,
the energy rule at the same time, then we update the cluster vol. 13(1), 2011, pp. 68–96.
lifetime and copy the cluster structure and routing paths of the [24] F. Musumeci, L. Hernandez, L. Zapata., et al., Dynamic routing and resource
historical event according to the implementation rules, which allocation in time-driven-switched optical networks, in: Proceedings of the
IEEE International Conference on High Performance Switching Routing, vol. 23
reduces the energy consumption. The simulation results show (1), 2012, pp. 179–184.
that: 1) the lifetime, the amount of data transmission of the [25] N. Sazak, I. Erturk, E. Koklukaya, M. Cakiroglu, An event-driven WSN MAC
RDICMR is more than those of the TEEN and the DCRA; 2) the protocol design based on active node and dynamic time slot allocation,
Turkish Journal of Electrical Engineering & Computer Sciences 21 (3) (2013)
residual energy of the RDICMR is higher than that of the TEEN and 812–824.
the DCRA at the same moment; 3) the performance of the RDICMR [26] X. Hou, X. Wei, E. Hua, et al., Self-adaptive and energy-efficient MAC protocol
is improved than that of the DCRA in the network lifetime, the based on event-driven, J. Netw. 8 (1) (2013) 174–181.
[27] M. Radi, B. Dezfouli, K.A. Bakar, et al., Interference-aware multipath routing
amount of data transmission and the remaining energy of net- protocol for QoS improvement in event-driven wireless sensor networks,
work; 4) the performance of the RDICMR is improved than that of Tsinghua Sci. Technol. 16 (5) (2011) 475–490.
the RDCMR in the network lifetime, the amount of data trans- [28] B. Guo, Z. Li, A dynamic-clustering reactive routing algorithm for wireless
sensor networks, Wirel. Netw. 15 (4) (2009) 423–430.
mission and the remaining energy of network. [29] W. Ou, A Study on Dynamic-Clustering Routing Algorithm Based on the Event-
In the future, we will study on the application of biological driving Wireless Sensor Network, Hunan University, Changsha, Hunan, China,
immune mechanism and rule-driven in WSNs with multiple 2013.
[30] L. Chatenoud, Biotherapies targeting T and B cells: from immune suppression
mobile sinks. For instance, we can apply them to the research on to immune tolerance, Curr. Opin. Pharmacol. 23 (2015) 92–97.
how to reduce the energy consumption and how to move the [31] F.X. Fan, D.Q. Huang, W. Zhou, Research and realize of automation test fra-
mobile sinks reasonable in the WSNs with multiple mobile sinks. mework based on web, Electron. Des. Eng. (2012).
[32] S. Lee, T.Y. Kim, D. Kang, et al., Composition of executable business process
models by combining business rules and process flows, Expert Syst. Appl. 33
(1) (2007) 221–229.
[33] Y. Cheng, H. Li, P.J. Wan, et al., Wireless mesh network capacity achievable over
References the CSMA/CA MAC, IEEE Trans. Veh. Technol. 61 (7) (2012) 3151–3165.
[34] V. Raghunathan, C. Schurgers, S. Park, et al., Energy-aware wireless micro-
[1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. sensor networks, IEEE Signal Process. Mag. 19 (2) (2002) 40–50.
Netw. 52 (12) (2008) 2292–2330.
[2] W. Yang, H. Shi, Sensor selection schemes for consensus based distributed
estimation over energy constrained wireless sensor networks, Neuro- Dr. Yongsheng Ding (M'00-SM'05) is currently a Pro-
computing 87 (2012) 132–137. fessor at College of Information Science and Technol-
[3] Y.S. Ding, Y.F. Hu, K.R. Hao, et al., MPSICA: an intelligent routing recovery scheme ogy, Donghua University, Shanghai, China. He obtained
for heterogeneous wireless sensor networks, Inf. Sci. 308 (2015) 49–60. the B.S. and Ph.D. degrees in Electrical Engineering
[4] Y.F. Hu, Y.S. Ding, L.H. Ren, et al., An endocrine cooperative particle swarm from Donghua University, Shanghai, China in 1989 and
optimization algorithm for routing recovery problem of wireless sensor net- 1998, respectively. From 1996 to 1998, he was a Visiting
works with multiple mobile sinks, Inf. Sci. 300 (1) (2015) 100–113. Scientist at Biomedical Engineering Center, The Uni-
[5] Y.F. Hu, Y.S. Ding, K.R. Hao, et al., An immune orthogonal learning particle versity of Texas Medical Branch, TX, USA. From Feb-
swarm optimization algorithm for routing recovery of wireless sensor net- ruary 2005 to April 2005, he was a Visiting Professor at
works with mobile sink, Int. J. Syst. Sci. 45 (3) (2014) 337–350. Department of Electrical and Computer Engineering,
[6] I. Dietrich, F. Dressler, On the lifetime of wireless sensor networks, ACM Trans. Wayne State University, MI, USA. From September 2007
Sens. Netw. (TOSN) 5 (1) (2009) 5. to February 2008, he was a Visiting Professor at Har-
[7] S. Chouvardas, K. Slavakis, S. Theodoridis, Adaptive robust distributed learning vard Medical School, Harvard University, MA, USA. He
in diffusion sensor networks, IEEE Trans. Signal Process. 59 (10) (2011) serves as Senior Member of Institute of Electrical and Electronics Engineers (IEEE).
4692–4707. He has published more than 300 technical papers, and seven research monograph/
[8] R.H. Cheng, C.W. Yu, T.K. Wu, et al., A small-world routing protocol and the advanced textbooks. His scientific interests include computational intelligence,
effect of pass-over for wireless sensor networks, Wirel. Pers. Commun. 68 (4) network intelligence, nature-inspired technologies, intelligent robots, Internet of
(2013) 1493–1523. things, and digitized textile technology.
[9] J. Xie, J. Wang, B. Li, Directed extension SPIN routing approach based on energy
efficiency information service, J. North Univ. China (Nat. Sci. Ed.) 3 (2013) 024.
Rui Chen is currently a master student at College of
[10] V.K. Verma, S. Singh, N.P. Pathak, Comprehensive event based estimation of
Information Science and Technology, Donghua Uni-
sensor node distribution strategies using classical flooding routing protocol in
versity, Shanghai, China. She obtained the B.S. degree in
wireless sensor networks, Wirel. Netw. 20 (8) (2014) 2349–2357.
Automation from Donghua University, Shanghai, China
[11] G.A. Shah, F. Alagoz, E.A. Fadel, O.B. Akan, A spectrum-aware clustering for
in 2013. Her scientific interests include intelligent
efficient multimedia routing in cognitive radio sensor networks, IEEE Trans-
control, and Internet of Things.
actions on Vehicular Technology 63 (7) (2014) 3369–3380.
[12] P.C. Pop, O. Matei, C.P. Sitar, An improved hybrid algorithm for solving the
generalized vehicle routing problem, Neurocomputing 109 (2013) 76–83.
[13] H.Y. Kong, Energy efficient cooperative LEACH protocol for wireless sensor
networks, IEEE Commun. Netw. 12 (4) (2010) 358–365.
[14] S. Lee, Y. Noh, K. Kim, Key schemes for security enhanced TEEN routing pro-
tocol in wireless sensor networks, Int. J. Distrib. Sens. Netw. 11 (2013) 73–77.
Y. Ding et al. / Neurocomputing 203 (2016) 139–149 149