9 - Ari
9 - Ari
9 - Ari
art ic l e i nf o a b s t r a c t
Article history: The design of low-power scalable wireless sensor networks remains a key challenge of the research.
Received 30 November 2015 Clustering and routing have been widely studied for extending the lifetime of a network, which is a
Received in revised form critical issue in sensor networks. Routing involves non-negligible operations, which considerably affect
29 March 2016
the network lifetime and the throughput. The clustering technique with data aggregation on cluster
Accepted 26 April 2016
Available online 27 April 2016
heads has an influence on the overall performance of the network since it is favoring a maximum net-
work lifetime. This paper presents a novel cluster-based routing protocol called ABC-SD. The proposed
Keywords: protocol exploits the biologically inspired fast and efficient searching features of the Artificial Bee Colony
Clustering metaheuristic to build low-power clusters. For the choice of cluster heads, a multi-objective fitness
Routing
function is designed by using a Linear Programming formulation. The routing problem is addressed by a
Wireless Sensor Networks
cost-based function that makes a trade-off between the energy efficiency and the number of hops of the
Swarm Intelligence
ABC path. The clustering process is achieved at the Base Station with a centralized control algorithm, which
ABC-SD exploits energy levels and the neighborhood information of location-unaware sensors. As for the routing
Honeybees of gathered data, it is realized in a distributed manner. Furthermore, unlike the existing protocols in the
Bio-inspired literature, a realistic energy model is adopted in the considered network model. The proposed protocol is
intensively experimented with a number of topologies in various network scenarios and the results are
compared with the well-known cluster-based routing protocols that include the swarm intelligence
based protocols. The obtained results demonstrate the effectiveness of the proposed protocol in terms of
network lifetime, network coverage and the amount of packets delivered to the Base Station.
& 2016 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.jnca.2016.04.020
1084-8045/& 2016 Elsevier Ltd. All rights reserved.
78 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
(Labraoui et al., 2013), and efficient routing techniques (Moussaoui the routing information towards the BS. However, given a network
et al., 2006; Saleem et al., 2011; Liu, 2012). Many designs of sensor topology, there is no deterministic polynomial algorithm that can
networks allow sensors to transmit their gathered data to a mobile partition the network into clusters (Avril et al., 2014). Moreover,
or static Base Station (BS) in multi-hop routing (Zungeru et al., since a sensor network can be seen as an undirected graph or a
2012; Elhabyan and Yagoub, 2014). However a robust and low- tree, there is at least one path (usually a number of paths) to reach
power mechanism of collecting and routing data towards the BS in a given destination, such as the CH location. So, the path estab-
an efficient way remains a challenge. Clustering is the most widely lishment process of the routing algorithm has to produce a set of
used technique for efficiently managing network energy con- selected low-cost paths among a number of possibilities. This has
sumption and scalability in order to increase network lifespan. to be done both for the intra-cluster and the inter-cluster com-
In WSNs, clustering techniques consist of partitioning the munications. Unfortunately, it is not evident to use a deterministic
network into a varied number of sensor groups called clusters. In polynomial algorithm for routes establishment (Yang et al., 2010).
each cluster, a leader called Cluster Head (CH) is elected either in a Swarm intelligence, which is the study of the collective beha-
distributed manner by sensors themselves (Zungeru et al., 2012; vior of social individuals' communities, provides efficient meta-
Cai et al., 2015) or by a centralized control algorithm (Latiff et al., heuristic tools and algorithms that deal with a lot of desirable and
2007; Karaboga et al., 2012). However, in the work proposed in interesting properties applied in WSNs as surveyed in Saleem et al.
Heinzelman et al. (2000), a sensor can take itself the CH position (2011), Zungeru et al. (2012). In other words, swarm intelligence
according to a random process and certain probability value. In can be seen as analogies between computing methods and bio-
each cluster, sensors gather data and send it to their corresponding logical behaviors of swarms in which collective intelligence can
CHs. The first kind of communication is known as the intra-cluster emerge. The considered swarms are colonies of social insects, bird
communication. The CH aggregates all received data and transmits flocking and fish schooling. Each kind of swarm is constituted of
it to the BS. The second type of communication is called inter- simple and autonomous individuals, which cooperate with each
cluster communication. Otherwise, in the design proposed in other to achieve some tasks necessary for the survival of the col-
Zungeru et al. (2012), the gathered data are transferred to the BS ony. In the context of WSNs, these simple and robust behaviors
by a flat routing approach. Unlike this way of designing, the have been successfully applied by identifying and modelling some
cluster-based routing algorithms allow only CHs to transfer col- analogies between the two systems. Clustering and routing in
lected data to the BS. This approach helps to reduce the rate of WSNs are well known optimization problems which are well in-
communication towards the BS and also permits to avoid collisions vestigated for developing many swarm intelligence based algo-
among communications generated by clusters. rithms (Kuila and Jana, 2014). For instance, the Ant Colony Opti-
Furthermore, as it is necessary that the intra-cluster commu- mization (ACO) metaheuristic (Dorigo et al., 2006) has been ap-
nications be carried out in a multi-hop manner within the cluster, plied for multipath cluster-based routing in Yang et al. (2010), the
it is also important and efficient that CHs' communications, i.e., the Particle Swarm Optimization (PSO) algorithm (Kennedy, 2010) has
inter-cluster communication, be performed in a multi-hop manner been used in Elhabyan and Yagoub (2014), Singh and Lobiyal
(Saleem et al., 2011). Note that, the intra-cluster communication is (2012) to optimize clustering, and the Artificial Bee Colony (ABC)
not always carried out by the multi-hop approach. In detail, the metaheuristic (Karaboga, 2010) has been successfully used for
protocol proposed in Heinzelman et al. (2000) exclusively allows clustering and routing in Karaboga et al. (2012). For more than a
sensors to directly transmit their gathered data to their respective decade, the ABC metaheuristic progressively draws the attention
CHs even if the communication range between them is very large. of researchers because of its efficiency in the solving of a number
Similar to the way in that protocol, CHs also directly communicate of optimization problems in wide domains. In this paper, we use
the aggregated information to the BS in a single hop approach. the ABC metaheuristic to build clusters and a cost function based
However, in real cases, the BS as well as CHs may be located far mechanism for the routing phase.
away from certain nodes in the sensing environment or even, the
BS may be positioned far away from the sensing environment (Ari 1.2. Authors' contributions
et al., 2015; Saleem et al., 2011). In these cases, the BS may not be
reachable by CHs in a single-hop communication. In addition, ac- In this paper, we address the problems of clustering and rout-
cording to the widely used energy model proposed in Heinzelman ing in WSNs. We formulated the clustering as a Linear Program-
et al. (2002), large distances affect the signal propagation and al- ming (LP) problem and the routing problem is solved by proposing
low a lot of power wastage. So, in order to avoid direct commu- a Cost-based Function (CF). The clustering algorithm allows the
nication between a CH and the BS, authors in Zungeru et al. (2012) efficient building of clusters by making a tradeoff between the
as well as those in Cai et al. (2015) allow intermediate sensors to energy consumption and the quality of the communication link
participate in the forwarding of data towards the BS. Un- within clusters. An initial population of bees is generated in order
fortunately, in homogeneous networks, the power supply as well to find the best CH according to the ABC metaheuristic. We de-
as the communication range of sensors is limited. These facts signed a multi-objective fitness function that uses the weighted
weaken their proposals. Authors in Kuila and Jana (2014) proposed sum approach, in the assignment of sensors to a cluster.
the use of special sensors provisioned with extra energy called Moreover, we adopt a routing strategy in which routes are pre-
gateways, which act as relay nodes in the inter-cluster commu- established at each round of the network. The routes establish-
nication. However, it seems not realistic for large-scale randomly ment is brought back to a problem of choosing the low-cost one
deployed sensor networks. Therefore, it seems beneficial to route among possible paths to reach a destination. We proposed a cost
packets by using an efficient and low-power multi-hop commu- function that allows to choose energy efficient paths. The clus-
nication model, both for intra-cluster and inter-cluster tering is achieved in a centralized control approach at the BS while
communication. the routing is achieved in a distributed manner. We perform in-
Clustering sensors provides many advantages for an efficiency tensive simulation on the proposed protocol under a realistic en-
management of WSNs. It allows power saving in sensors since CHs ergy consumption model that is based on the characteristics of the
are capable of eliminating redundant and false positive data by a Chipcon CC2420 radio transceiver. We compare our proposed
given aggregation process (Labraoui et al., 2013). By this way, the protocol with four existing well known protocols. The comparison
communication bandwidth is preserved. It also allows a good is conducted by using several performance metrics including en-
management of the inter-cluster routing since only CHs maintain ergy consumption, energy efficiency, amount of data packets
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 79
delivered to the BS and so on. In short, our main contributions can largely affects the lifetime. Otherwise, the CH status dynamically
be summarized as follows: rotates between sensors in each round according to a given
probability. Unfortunately, since the selection of CHs is randomly
LP formulation of the clustering problem. done, the distance between a given sensor and its corresponding
Routing problem addressed by a CF. CH may be too long. This causes a weak distribution of CHs over
ABC-based clustering algorithm with a tradeoff between the the sensing area and hence a lot of power wastage.
energy consumption and the quality of the communication link. Unlike the LEACH that is a completely distributed protocol, the
Pre-established routing mechanism in which routing paths are LEACH-C (Heinzelman et al., 2002), which is an amelioration of the
less costly in terms of power consumption. LEACH, uses a centralized control algorithm for the formation of
Integration of a realistic energy model and realistic network clusters. At the start of each network round, when receiving sen-
settings. sors’ locations and their energy levels during the network in-
Simulation of the proposed protocol to demonstrate its perfor- itialization step, the BS launches the clustering process. The clus-
mance compared to some existing protocols. tering algorithm in the LEACH-C uses the simulated annealing
approach with sensors' locations and their available power in-
1.3. Organization of the paper formation to build a predetermined number of CHs and so, a fixed
number of clusters, each with a certain number of members. This
The rest of the paper is organized as follows: Section 2 presents approach produces a better positioning of CHs on the sensing area,
a brief review of some cluster-based routing protocols for WSNs it slightly reduces the power consumption and data loss compared
and the most challenging issues; In Section 3, we first give an to LEACH. But the adopted single-hop routing mechanism remains
overview of the foraging behaviors of honeybees swarm in- a limitation. However, the LEACH-C protocol improves the LEACH
telligence and then, we present an algorithm simulating these in terms of data delivery at the BS and power consumption.
behaviors; the network model is presented in Section 4; in Section In the number of existing clustering algorithms for WSNs, there
5, the design goals as well as the proposed clustering and routing is an increasing interest in bio-inspired clustering approaches. The
algorithms are described; this is followed by the performance ABC algorithm (Karaboga, 2010), which is inspired by foraging
evaluation and discussion in Section 6; and the conclusion and behaviors of honeybee swarms has been successfully used to de-
directions for future work are presented in Section 7. sign clustering algorithms (Ari et al., 2016; Karaboga et al., 2012).
The clustering and routing strategy is performed at the initializa-
tion phase, as a centralized control mechanism at the BS and in-
2. Cluster-based routing in WSNs formation messages about the configuration and cluster organi-
zation are broadcast over the network. Similar to the LEACH ap-
Clustering sensors is usually adopted in large scale networks. proach in Heinzelman et al. (2000), the ABC-based clustering and
Like reported by Liu (2012), it is proved that the cluster-based routing protocol presented in Karaboga et al. (2012) performs the
networks, also known under the names of hierarchical or multi- election of the CH periodically. This choice introduces overhead
tier networks, are more scalable, provide more reliability, better communication in the network. However, because in their pro-
coverage, good fault tolerance and energy efficient. Moreover, posed semi-distributed approach, the CH election step is achieved
Moussaoui et al. (2006) argue that the clustering can be seen as a in a centralized manner by the BS, the energy cost of the CH
graph partitioning problem with some added constraints since the election process is minimized on sensors. Another semi-dis-
size and the geometric form of the obtained graphs (clusters) is tributed clustering strategy based on a non linear and linear pro-
not known in advance. Thus, because of these constraints, the gramming formulation of the clustering and routing problem is
clustering is known to be a NP-Hard optimization problem (Latiff proposed by Kuila and Jana (2014). The clustering problem is
et al., 2007). Nevertheless, the hierarchical routing issue for WSNs solved by using a PSO algorithm with an efficient particle encoding
has been investigated a lot and many protocols have been devel- scheme. The proposed fitness function enables a good balancing of
oped. These protocols include heuristic and meta-heuristic based consumed energy by CHs. Like the approach presented in Kar-
approaches. In this section, we give a brief and comprehensive aboga et al. (2012), the cluster formation is done in a centralized
review of the most relevant cluster-based routing protocols. We manner.
use some of them principally for the comparison purpose in Sec- Latiff et al. (2007) used the PSO algorithm (Kennedy, 2010),
tion 6.3. We draw the readers' attention on bio-inspired (meta- which is based on social behaviors of birds flocking or fish
heuristic) based approaches for cluster-based routing in WSNs. schooling to design the PSO-C protocol. The proposed protocol
Interested readers may refer to Ari et al. (2015), Liu (2012) for implements a centralized clustering algorithm at the BS. It is
extended reviews of cluster-based routing for sensor networks. In supposed that each sensor knows its location. In order to assign
particular, references (Zungeru et al., 2012; Nanda and Panda, sensors to a cluster, the BS, i.e., the clustering algorithm, considers
2014) provide a comprehensive global view of nature-inspired the energy level and the euclidean distance between a sensor and
approaches. selected CHs. A defined cost function that aims at minimizing the
Heinzelman et al. (2000) proposed a low energy adaptive intra-cluster distance while optimizing the power consumption of
clustering hierarchy called LEACH, which is the most popular and sensors is adopted. This allows the selection of the best set of CHs
widely referenced cluster-based routing protocol for WSNs. The that can maximize the cost function. In addition, the PSO-C algo-
adopted clustering mechanism allows the random creation of CHs rithm ensures that only sensors with sufficient remaining energy
in each round of the network. The selected CHs have the respon- are selected to a CH position. Authors compared the PSO-C pro-
sibility of the aggregation of data gathered by sensors. However, tocol with the above described LEACH and LEACH-C protocols. The
the LEACH algorithm allows the selection of a sensor to a CH po- results show that PSO-C outperforms the compared protocols in
sition even if its remaining energy is too low. This is a great limit terms of network lifetime and throughput. In their performance
because a sensor may die right away after it is selected as a CH. It comparison, authors found that the PSO-C protocol outperforms
will cause data loss since the next CH selection will occur in the the Genetic Algorithm (GA) and K-means based clustering proto-
next round. Furthermore, the data routing is performed in a sin- cols in terms of the convergence of the defined cost function, the
gle-tier, i.e., in a single-hop manner. This is not realistic for large data delivery and the network lifetime. In spite of the promising
scale WSNs. It causes the quick death of sensors and therefore, it performance outputted by this swarm intelligence based
80 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
Table 1
Summary of the relevant cluster-based routing protocols in the literature compared to the proposed approach.
LEACH (Heinzelman et al., 2000) First order Distance Unaware Distributed Random Load balancing
LEACH-C (Heinzelman et al., 2002) First order Distance Aware Centralized SA Energy efficiency
PSO-C (Latiff et al., 2007) First order Distance Aware Centralized PSO Energy efficiency
Bee-C (Fathian et al., 2007) First order Distance Aware Centralized Bee Energy efficiency
ABC-C (Karaboga et al., 2012) First order Distance Unaware Centralized ABC Energy efficiency – Throughput
Bee-Sensor-C (Cai et al., 2015) First order Signal strength Unaware Distributed Bee Energy efficiency – Scalability
PSO-HC (Elhabyan and Yagoub, 2014) cc2420 Signal strength Unaware Centralized PSO Energy efficiency – Link quality – Scalability
ABC-SD cc2420 Signal strength Unaware Centralized ABC Energy efficiency – Link quality – Scalability –
Throughput
algorithm, the PSO-C protocol assumes that sensors know their Elhabyan and Yagoub (2014) proposed a centralized PSO based
location. This fact seems not realistic for randomly deployed sen- protocol for hierarchical clustering (PSO-HC) in WSNs, which uses
sors and thus, non-scalable. a realistic energy model. The clustering algorithm of the PSO-HC
Fathian et al. (2007) introduced the Bee-C that is a multi-tier protocol is implemented at the BS. Authors adopted a clustering
cluster-based routing protocol for sensor networks. These authors mechanism that takes into consideration the sensor's received
proposed a metaheuristic algorithm inspired by the Honey Bee signal strength and their energy level. The received signal strength
Mating Optimization (HBMO), which is based on the reproduction helps in the evaluation of the communication link quality between
behaviors of honeybees. Like LEACH and LEACH-C protocols, the two sensors. To improve the scalability, a two-tier cluster is
main idea in the Bee-C design is the energy saving. To achieve this adopted in such a way that the coverage is maximized. Like PSO-C,
goal, authors designed a network with a continuous data dis- LEACH-C and LEACH protocols, the network operating time is
semination (principally for the energy saving purpose). Un- splitted into rounds in which CHs are selected. The PSO meta-
fortunately, while increasing the number of sensors, the Bee-C heuristic is exploited in the selection of a minimal number of ac-
protocol delivers poor results, it simply means that the protocol is tive CHs. In fact, since the whole coverage of the network is not
not scalable. well guaranteed in the case of a fixed number of CHs, authors
In the same order of ideas, Cai et al. (2015) proposed an ame- consider a predetermined percentage of CHs according to the
lioration of Bee-C called Bee-Sensor-C. Principally designed for network density. The performance analysis shows that PSO-HC
event driven sensor networks, the Bee-Sensor-C protocol uses a outperforms PSO-C, LEACH-C and LEACH protocols in terms of the
dynamic clustering scheme in order to reduce the routing over- average consumed energy and the throughput.
head and improves the scalability. Authors adopted an on-demand In Table 1, the main characteristics of the above reviewed
multipath cluster-based routing mechanism inspired by some protocols are summarized and the main differences with the
foraging behaviors of a bee swarm. Indeed, the Bee-Sensor-C proposed protocol are highlighted. To complete that Ari et al.
builds a cluster structure and selects the CH when an event occurs. (2015) gave another classification of some routing protocols for
Concretely, when an event occurs in a place of the sensing en- WSNs found in the literature.
vironment, all sensors close to that event may need to gather and
transfer the data. So, the first sensor that declares the event be-
comes the CH and other sensors have to follow him and by this 3. Overview of honeybees swarm intelligence
way, a cluster is constructed. However, the adopted on-demand
cluster construction will introduce a great overhead in a case of Honeybees are fascinating and highly organized insects capable
high event-driven and large-scale networks. Nevertheless, com- of individual cognitive abilities and self-organization. These in-
pared to Bee-C, Bee-Sensor-C improves the whole network sects grouped in a colony and living within a hive, show im-
performance. pressive auto-solving problem capabilities by exhibiting a combi-
The aforementioned protocols and many others in the litera- nation of individual traits and social cooperation that is un-
ture adopted the first order energy model initially proposed by paralleled in the animal kingdom (Winston, 1991). These in-
Heinzelman et al. (2002) for the LEACH-C protocol. Of course, it is dividual capabilities lead to unanimous intelligent decisions in a
the first stable theoretical modelling of energy consumption for collective self-organized manner and a decentralized control me-
radio sensors, but this model is unrealistic. Indeed, in this energy chanism. In a honeybee colony, individuals are organized to per-
model, authors have not taken into account the energy of listening form various tasks that are necessary to the survival of the colony.
that is known to be non-negligible in power discharging of a Indeed, they are engaged in several activities: foraging, mating,
wireless sensor battery (Barberis et al., 2007). Moreover, similar to waggle dance, polarization, defending the hive and swarming. In
the previous PSO-C protocol, most of the existing clustering and this work we use the honeybees swarm intelligence, which is fo-
routing protocols suppose that sensors know their locations. This cused on the collective behaviors that result from local and simple
implicitly implies that sensors are equipped with localization interactions of individuals of a honeybee Apis mellifera colony with
hardware. It is not realistic for large scale networks and also it their environment. Particularly, we are interested in their foraging
leads to the use of costly sensors. Furthermore, this energy model behaviors.
is essentially based on the distance between the sender and the
receiver for evaluating the link quality. Yet, a number of research 3.1. Foraging behaviors in honeybees
demonstrated that the distance is not a valid criteria for the eva-
luation of the quality of a link in a WSN. The most convincing work The foraging behaviors of honeybees Apis mellifera consists of a
that justifies this assertion is the empirical study of low-power remarkable set of simple and organized tasks in which individuals
wireless achieved by Srinivasan et al. (2010). The use of a realistic each with a role, are engaged. Indeed, in a honeybee colony, each
energy model is therefore necessary in designing realistic WSNs. individual has a defined role and some qualifications. There are
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 81
three types of individuals: the queen, the workers and the drones. ABC algorithm is based on a minimal modelling of the intelligent
The queen bee is a mated female bee and there is only one queen foraging behaviors of honeybees (Karaboga, 2010). The proposed
per hive, i.e., per colony. The queen has the main role since of model consists of three essential components that are previously
reproduction and cohesion, necessary to perpetuate the colony. described in Section 3.1, and of two leading modes. The compo-
Drones are male bees that have the main role of mating with the nents are three groups: employed foragers, unemployed foragers
queen for the reproduction of the colony. Workers that are female and food sources. The first are associated with particular food
bees as to them, are responsible for the foraging. They perform the sources and the second are in two types: onlookers and scouts.
most important task of the hive by making trips in order to supply Every time, onlookers and scouts are in the search of a rich food
water, pollen, nectar and other substances from blooming plants, source to exploit. In fact, the first half of the colony consists of
within 3–4 km around the hive (Tchuenguem Fohouo et al., 2014). employed bees and the second half consists of onlooker bees.
Workers make the link between the colony and the ambient Onlookers bees are foragers who watch the waggle dance of em-
environment. ployed foragers within the hive, for a decision of choosing a food
The swarm intelligence of honeybees Apis mellifera foraging source. That decision is taken according to the quality of the food
behavior has been studied by Karaboga (2010). The author pre- source. The scout bees as for them, have a job of searching new
sents three essential components on which he has built a minimal food sources.
model of foraging behaviors that leads to the emergence of a The self-organization and the collective intelligence in ABC are
collective intelligence. These components are given hereinafter: achieved by the leading modes. Thereof consists of the recruit-
ment of foragers to rich food sources and abandoning poor food
1. The food sources: The profitability of a food source depends on sources. According to the previously described four characteristics
many factors including its closeness to the hive, its richness or on which self-organization of honeybees relies (see Section 3.1),
the concentration of the energy within, and the facility of ex- the first is assimilated to a positive feedback and the second causes
tracting this energy. In order to simplify its model, Karaboga a negative feedback. Concretely, the proximity and richness of a
takes goodness to qualify these qualities. food source represents a good solution of a given optimization
2. The employed foragers: These worker bees are associated with a problem and the goodness of a food source is the fitness of the
particular food source, which is currently being exploited until associated solution. For a global optimization problem, the ABC
its exhaustion. They carry information about that particular algorithm consists of looking the best food source, i.e., the best
food source, i.e., the direction toward the food source, its dis- solution. The ABC scheme given in Algorithm 1 consists of four
tance from the hive and the profitability of the food source. So, phases: employed bees phase, onlooker bees phase, scout bees
these foragers share these information with other foragers who phase and the memorization of the best solution achieved so far
remained in the hive. (Karaboga, 2010).
3. The unemployed foragers: They are continually looking out for a
food source to exploit. Unemployed foragers are in two types: Algorithm 1. Algorithm simulating the ABC.
scouts that are engaged in the search of new food sources
Begin
around the hive, and onlookers, which wait in the hive and
1. nInitialization Phasen
establishing a food source through the information shared by
2. Generate initial population Xi , i = 1, … , SN
employed foragers.
3. Repeat
4. nEmployed Bees Phasen
In these components, we can see that the exchange of in-
5. For each employed bee
formation among bees on explored food sources is important for
6. Produce new solutions vi according to Eq. (1)
maintaining a collective knowledge. These information are ex-
7. Calculate the fitness according to Eq. (2)
changed by performing a special dance of bees called waggle
8. Apply the greedy selection process
dance. Indeed, an onlooker bee will decide by itself to employ the
9. nOnlooker Bees Phasen
most profitable food source according to a certain probability,
10. For each onlooker bee
simply by watching the dances and then choosing the best dancer
11. Choose a solution xi depending on pi
source (Karaboga, 2010). The self-organization that emerge from
12. Produce new solutions vi according to Eq. (1)
the foraging activity of honeybees relies on four characteristics:
13. Calculate the fitness according to Eq. (2)
14. Apply the greedy selection process
1. Positive feedback: it occurs for instance when the amount of
15. nScout Bees Phasen
nectar in a source increases or the number of onlookers visiting
16. When solutions cannot be improved (reach a limit para-
of a food source increases proportionally.
meter), then replace it with a new solution produced by a
2. Negative feedback: the exploitation process of exhausted food
formula given by Eq. (3)
sources is stopped by bees.
17. nMemorize the best solution so farn
3. Fluctuations: the scouts perform a random search process for
18. Until Maximum Cycle Number
discovering new food sources.
End
4. Multiple interactions: Employed bees share their knowledge
about food sources with onlookers waiting in the hive.
The aforementioned bio-inspired characteristics of honeybees Firstly, scout bees have the job of searching the positions of all
are used in solving optimization problems. The well known algo- food sources. In the ABC algorithm, initial positions of food sources
rithm in honeybees meta-heuristic is the Artificial Bee Colony al- are randomly generated. Each employed bee is associated to one
gorithm introduced by Karaboga (2010). randomly generated food source. For simplicity reasons, the
number of employed bees is equal to the number of food sources
3.2. Algorithm simulating artificial bee colony (SN). During employed bees phase, each employed bee determines
a new food source with a good amount of nectar, within the
The Artificial Bee Colony algorithm is a swarm based meta- neighborhood food source according to Eq. (1). Then, each em-
heuristic algorithm developed for numerical optimization. The ployed bee calculates the fitness, i.e., the goodness of the food
82 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
Table 2 radio transceiver of which the data sheet is given in Texas In-
Energy consumption of the different struments (2014). The Chipcon CC2420 is a low-cost highly in-
states.
tegrated 2.4 GHz IEEE 802.15.4 compliant and ZigBee™ radio
State Consumption (μA) transceiver designed for low power WSNs' applications. The
CC2420 features include a hardware support for packet handling,
idle 426 data buffering, multiple transmissions, clear channel assessment,
sleep 20
link quality indication and packets synchronization.
receive (rx) 19, 7 × 103
transmit (tx) 17, 4 × 103
In consonance with the IEEE 802.11 implementation of the
Received Signal Strength Indicator (RSSI) that is a measurement of
the power present in a received radio signal, in a wireless en-
source. If the current employed bee finds that the obtained fitness vironment, the received signal strength is assumed to be a realistic
value according to the formula given in Eq. (2) is higher than the approach for quantifying power consumption in WSN environ-
previous one, it moves to the new food source and abandons the ments (Li et al., 2014). To exploit that in our energy quantification,
old one, otherwise it remains on its old food source: it is assumed that a sensor battery has linear charge and discharge
characteristics. So, the energy Ei consumed by sensor si is
vij = xij + ψij × (xij − xkj ) (1)
equivalent to the accumulation resulting from that of its compo-
Where: nents (Barberis et al., 2007). The energy consumption of compo-
nents contains energy of event execution and the energy spent in
ψij = rand ( − 1; 1); the transition between states. The energy ES spent by a sensor
xk is a neighbor solution; within states is given in Eq. (4):
j ∈ {1, 2, …, D} is a randomly chosen parameter index, D is the
dimension of the solution vector.
ES = ∑ (pj × t j )
j (4)
Table 3
4. Network model and vocabulary Notations.
In this section, we present the used realistic energy model Notation Description
based on the signal strength indicator. Moreover, we describe the CH Cluster Head
used vocabulary and the adopted assumptions. BS Base Station
RSSI Received Signal Strength Indicator
4.1. Energy model TDMA Time Division Multiple Access
MAC Medium Access Control
B-MAC Berkeley Media Access Control
Like done by Elhabyan and Yagoub (2014), our energy model UML Unified Modeling Language
uses sensors that include the realistic features of Chipcon CC2420
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 83
f (c j ) . Centralized
The cluster member is represented by Clm . clustering algorithm
The number of Clm in the cluster represented by cj, j ∈ [1, m] ∩
is denoted by N (( j ), j ∈ [1, m] ∩ .
The xth x ∈ [1, N (( j )] ∩ cluster member of the cluster re- Fig. 1. Design scheme.
presented by the head cj, j ∈ [1, m] ∩ is represented by Clmj (x ).
The RSSI value received by sensor si from sensor sj , cluster-based routing in which the clustering algorithm uses some
i, j ∈ [1, N ] ∩ : i ≠ j , is represented by R(i, j ). foraging behaviors of honeybees.
The remaining energy of sensor si , i ∈ [1, N ] ∩ is represented Since the main goals are the achievement of a good scalability
by Er (si ). and the extension of the network lifetime, our proposed protocol
The neighbor table of sensor si , i ∈ [1, N ] ∩ is represented by design aims at providing a good load balancing within clusters by
5 (si ). using a multi-hop communication among sensors and their cor-
responding CHs. Indeed, the proposed approach schematized in
4.3. Assumptions Fig. 1 is designed in such a way that the clustering algorithm is
performed in a centralized manner at the BS while the routing is
Let us consider a network with N stationary randomly deployed performed in a distributed manner inside clusters and among CHs.
sensors on a two-dimensional square field. We assume that the BS So, the protocol acts in a semi-distributed manner.
is stationary and located at the coordinate (0, 0). Each sensor in the In fact, when receiving sensor's information at the start of each
network has a unique identifier i ∈ [1, N ] ∩ . Let us consider that round, the BS will build clusters by paying attention to the choice
all sensors are homogeneous and the computation and power of the CH, which is well achieved by the position update of the ABC
capabilities of all of them are the same. Each sensor can commu- algorithm and by doing so, the energy expenditure is reduced as
nicate with another sensor if that sensor is within its commu- we can see in the results of simulation (see Section 6.3). When
nication range. It is assumed that communication links are bidir- clusters are built, the BS sends a message to each sensor in order to
ectional. Sensors' batteries cannot be recharged and each sensor is inform it about the cluster in which it belongs and the id of its
equipped with a power control device that has capabilities to vary corresponding CH. Then, the distributed part of the proposed al-
their transmit/receive power. We assume that sensors are loca- gorithm, i.e., the routing mechanism, starts within each cluster by
tions unaware. However, the location of the BS is known by each paths discovery followed by data gathering and transferring op-
sensor. We assume that all sensors maintain a synchronization erations. These operations of transferring data to CHs follow a
protocol, which allows a consistent time synchronization among convergecast tree, i.e., many-to-one within the cluster. Transferring
the sensors in the network. aggregated data to the BS follows also the same process in which
many represent CH sensors and one represents the BS. Since a lot
of traffic is generated, particularly during the network initializa-
5. Algorithms design tion and the route discovery, our design implements a mechanism
that filters out redundant data. The whole steps performed in the
In this section, we first present the design goals of the proposed execution of the ABC-SD protocol is highlighted in Fig. 2.
ABC-SD approach and then, we describe specifications and the
used mechanisms in the proposed clustering and the routing 5.2. ABC-SD clustering mechanism
algorithms.
The clustering process is preceded by the setup of the network
5.1. Design goals that consists of bootstrapping and neighbor discovery.
The requirements of sensor-based applications require that 5.2.1. Bootstrapping and setup
sensor networks become smarter. Since sensors are designed with When the sensors deployment is carried out, each sensor
limited resources, networking these sensors remains a very ap- si , i ∈ [1, N ] ∩ and also the BS broadcasts a H _MSG packet that is
pealing and important issue of WSNs research. Thus, in this paper, received by each node positioned in the communication range of
we are positioned in WSNs’ applications that require the use of the hello sender. Each node maintains two informations about its
energy efficient routing strategies that aim at prolonging the neighbors in its neighbor table: the id of the neighbor and the
network lifetime while taking into account the delivery of a good value R(i, j ) of the RSSI received. Whenever a given sensor receives
network QoS, especially in terms of throughput and data delivery. a H _MSG packet, it adds an entry in its neighbor's table. At the end
Hence, given the requirements in terms of the applications' needs, of the neighbor discovery time, each sensor si , i ∈ [1, N ] ∩ sends
designing an energy efficient protocol for routing the gathered its triplet (id, Er (si ) , 5 (si )) to the BS by using a controlled flooding
data remains actual, given the resource limitations exhibited by mechanism that forces a sensor not to forward a packet if it al-
sensor's design. To achieve this goal, we designed a bio-inspired ready forwarded it. The flooding operation is executed during a
84 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
Then, after the bootstrapping and setup phase, the BS has to Besides that, since the number of clusters in this approach
compute the set ℶ(ch) of CHs and construct the clusters. The follows the Poisson distribution, and as demonstrated in Johnson
process starts by the construction of the set SCHc of candidates to a et al. (2005), at the end of followers assignment, the number of
CH position according to Eq. (9). Having sufficient energy is the sensors within each cluster will follow a geometric distribution,
main condition to be eligible as a CHc. In other words, only the particularly in the case of data packets retransmission (see Section
sensor that has energy level above the threshold value εt, can be 6.1.2). That combination of the Poisson and the geometric dis-
taken as candidate: tributions is known as the geometric Poisson distribution that is
SCHc = {si , i ∈ [1, N ] ∩ : Er (si ) ≥ εt } (9) usually used in the description of clusters and their members.
At the end of the network configuration, the BS informs each
Next, the ABC algorithm presented in Section 3.2 is used in the sensor, the cluster in which it belongs, i.e., the id of its
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 85
By assuming that, each sensor has to send its gathered data number of distinct CHs in the position vector of the ABC algorithm.
each u unit of time (a defined number of minutes or hours) and Like adopted by Heinzelman et al. (2000), the optimal number of
there is a small additional time ϵ in μs for data acknowledgement CHs should be approximately set to 5% of all nodes. Since in our
messages, each sensor will switch off its radio at time w (see Eq. proposed approach the fitness is used only for a comparison pur-
(12)): pose, without loss of generality, we assume that p ¼1.
The TDMA based multi-hop approach adopted for the intra-
w = u + St + ϵ (12)
cluster communication could slightly prolong the cluster sche-
This way of dividing the time periods for cluster scheduling duling time for a cluster with more Clm than others. This might
(TDMA) will allow that a sensor goes to sleep when it sends its introduce a supplementary delay. So, especially for the commu-
packet to its parent node (next hop) and when it receives and nication link quality, the QoS is considered as the second criterion,
forwards packets of its child nodes. The same mechanism, which which aims at maximizing the packet delivery to the BS while
also allows CHs to sleep in order to save their energy is im- reducing the delay. Thereby, in order to maximize the cluster
plemented for inter-cluster communication. In fact, since each CH communication link quality, let us define a quality parameter in-
knows its next hop towards the BS, which is either another CH or dicator QP Clmj (x ) , j ∈ [1, m] ∩ , x ∈ [1, N (( j )] ∩ of a member of
the BS itself, we implemented also simplified TDMA mechanism for the cluster with the head cj ∈ ℶ(ch) in Eq. (16). This quality in-
data transfer by CHs to the BS. Once it receives and aggregates all dicator includes Rm (Clmj (x )) (see Eq. (14)), which is the best RSSI
its followers’ gathered data, the CH sends the aggregated data in a value received by the Clmj (x ), and the worst value is Rw (Clmj (x ))
unique D _AGG message to the next hop toward the BS. After that, it (see Eq. (15)):
switches off its radio and wakes up at the start of the next u unit of
time in order to receive a new sequence of gathered data from its R m (Clmj (x)) = max (R (Clmj (x), i))
j ∈[1, m]∩
followers. Indeed, each CH receives its slots length and the fre-
i ∈ [1, N (( j )] ∩ and i≠x (14)
quency at which it will wake up for the inter-cluster commu-
nication, from the BS at the start of each round.
Besides that, in order to avoid interference of signals that R w (Clmj (x)) = min (R (Clmj (x), i))
j ∈[1, m]∩
usually exist in the case of large scale sensor networks, in addition
to the clear channel assessment feature, we use the effective col- i ∈ [1, N (( j )] ∩ and i≠x (15)
lision avoidance mechanism that uses the signal strength (RSSI)
implemented in the B-MAC protocol. At the end of the creation of ⎡ ⎤
1
the TDMA frame, each CH sends the slot length of each of its fol- QP Clmj (x) = ⎢ Rem (Clmj (x)) × ⎥
⎢⎢ Rem (Clmj (x)) − Rew (Clmj (x)) ⎥⎥ (16)
lowers again by using a controlled flooding mechanism. Then, the
steady-state phase is launched. QoS
Then, we define the QoS criterion f in Eq. (17) in such a way
that the quality of the communication link within the cluster be-
5.2.4. Steady-state comes maximal by minimizing the worst link qualities:
For each sensor, the steady-state phase consists of the use of its
N (( j )
TDMA slots time to transmit the gathered data to its corresponding
f QoS = ∑ QP Clmj (x)
CH, either in a single-hop or in a multi-hop manner, depending on x=1 (17)
the density of the cluster and the location of the CH. This is well
explained in Illustration 4 with an UML sequence diagram (see We bring back the fitness function to a linear programming
Section 5.3.2). When receiving all gathered data from its followers, problem. In fact, we need to minimize the energy loss and the
the CH aggregates the received data and sends it to the BS by using worst link quality. To achieve this, the two proposed criteria in Eqs.
the inter-cluster communication, i.e., by using intermediary CH or (13) and (17) are used to build a multi-objective fitness function.
directly to the BS if the next hop of the considered CH is the BS. For simplicity reasons, we use the weighting parameter α and β in
order to transform these objective functions into a single fitness
5.2.5. Fitness function derivation function. Thus, let us give the fitness function that includes the
The previously described clustering process in Section 5.2.2, energy level criterion, the QoS criterion and the weighting para-
aims at maximizing the network lifetime by well selecting CHs. In meters α and β, as a linear programming problem in Eq. (18):
the selection of CHs, we take into account two criteria: the energy Minimize fit = α × f energy + β × f QoS (18)
efficiency and the quality of service (QoS). The first constraint that
has to be respected is the energy saving criterion while choosing a Indeed, since the objective of the fitness function is to mini-
sensor as a CHc. Indeed, since the CH is responsible for data ag- mize the energy consumption and to minimize the use of worst
gregation and transferring all the Clm gathered data, more energy link, i.e., maximize the QoS, we use β to control the QoS and α to
is used and these sensors’ energy levels can decrease quickly. So, control the energy consumption. For a good weighting, α and β are
since in our network design there is no sensor with a particular subjected to the constraints given in Eqs. (19) and (20):
power resource, CHs must be selected in an optimal way. There- α=1−β (19)
fore, the evaluation of fitness considers the energy level of the CHc,
which should be greater than the fixed threshold value εt . More- 0<β<1 (20)
over, the proposed clustering algorithm aims at reducing the en-
ergy depletion that can be introduced during CHs' operations, by
minimizing the number of CHs since sensors' intra-cluster com- 5.3. ABC-SD routing mechanism
munication is achieved in a multi-hop manner. So, we define the
energy criterion of the fitness function fenergy in Eq. (13): Our proposed routing algorithm adopts an oblivious routing in
which the routing path is discovered by each Clm before starting
k
f energy = p × the steady-state phase. These paths cannot change throughout the
m (13)
round. The design of the routing algorithm is described before
where the constant p is a proportionality constant and k is the presenting the route discovery process in Section 5.3.2.
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 87
id type srcId destId hopC sumE minE data 1. Increments the number hopC of hops.
Fig. 5. The adopted unique packet format with its eight fields for the data transfer
2. Updates the sum of the remaining energy in the path sumE.
over the network. 3. If the Clm remaining energy is lower than that in the current
minE, replace the value of minE by the actual Clm remaining
Table 4 energy.
Descriptions of the fields in the packet format. 4. Adds the Clm id in the data field.
5. Rebroadcasts the P _DISC .
Field Description
id is the unique identifier assigned by sensor to a packet In this way, the packet will reach the CH. Certainly, because
type is the type of the message clusters are not really disjoints in practice, a Clm of a given cluster
srcId is id of the source sensor may receive a P _DISC packet from a Clm of a close cluster, if these
destId is the id of the destination sensor. destId always contains the id of the sensors are in the same communication range. In such a case, by
CH
hopC is the number of hops crossed by the packet before reaching the
using some features of the B-MAC protocol, the receiver will
destination consider the packet only if the destId field contains its CH id, i.e., if
sumE is the sum of the remaining energy of all sensors in the path they have the same CH. When receiving the P _DISC packet, the CH
minE is the energy of the sensor that has the minimum remaining energy in will launch a path acknowledgement packet P _ACK to the sender
the path
srcId. The P _ACK packet is built from the received P _DISC packet
data is the data field
by altering id, type, srcId and destId fields. The value of the id field
in the P _ACK packet structure is assigned by using the id of the
5.3.1. The packet format received P _DISC packet in such a way that a Clm (i.e., the sender)
In the design of the proposed routing protocol, we adopt a can recognize that it is the path acknowledgment message of its
unique packet format. The packet is structured into eight fields: sent path discovery message. Of course, since the CH may receive
packet id, packet type, source sensor id, CH id, the number of hops many versions of a same initial P _DISC message and launch path
in the path, sum of the remaining energy of the path, minimum acknowledgement messages for them, the source sensor may
energy of the path and data. The packet format is given in Fig. 5 therefore receive more than one P _ACK packet at the end of the
and the complete description of the packet fields is given in Ta- route discovery time. Well, in such a situation, the source sensor
ble 4. The fields hopC and sumE are initially set to zero. minE in- has to choose the best path.
itially contains the remaining energy of the sender, i.e., Er (srcId). The choice of the best path is achieved by making a tradeoff
Each packet in the whole network must have a unique identi- between the number of hops in the path and the path's available
fier. Permitting a unique identification of a packet is necessary for energy. In order to realize that, we introduced a non-linear choice
the used controlled flooding mechanism. So, each packet gener- parameter ζ in the design of the proposed routing algorithm that
ated by a sensor has an id compound of the sensor id that is aims at choosing the path with at least hops and better remaining
energy. So, let us define the cost-based function ζ (p (l )) that
concatenated with a sequence number. The field data is structured
evaluates the energy strength of a path p (l ) in Eq. (21):
differently depending on the type of the packet. The used mes-
sages are described in Table 5. ⎢ sumE − (n (p (l)))2 ⎥
ζ (p (l)) = ⎢ (n (p (l)))−1 × ⎥
The H _MSG message is executed in the same mind as the hello ⎣ minE − n (p (l)) ⎦ (21)
message of the B-MAC protocol. For a P _DISC message, the field
data initially contains the srcId. In the P _ACK message, fields id, where l ∈ [1, N (( j )[ ∩ : j ∈ [1, m] ∩ . l is the lth P _ACK packet
type, srcId and destId are modified as explained in Section 5.3.2. In received by the P _DISC sender, i.e., the Clm and n (p (l )) is the
addition to the information to transfer, the path toward the CH is number of hops in the path p (l ). Finally, when the best paths are
concatenated with the information in the data field in D _MSG chosen, each Clm sends a R _MSG to its CH by using the controlled
messages. The D _ACK message is transformed into a simple ACK flooding mechanism implemented in the proposed protocol. While
message like in the B-MAC implementation. receiving all R _MSG from its followers, the CH can now proceed to
the construction of TDMA frames as explained in Section 5.2.3. We
5.3.2. Route discovery mechanism give in the following, the algorithm (see Algorithm 3) for route
When the network is initialized and the clustering process is discovery, which is executed by each Clm.
completed, each Clm starts a route discovery in order to construct a Algorithm 3. The ABC-SD route discovery algorithm.
pre-determined path toward its CH. To start the route discovery
process, each Clm broadcasts a P _DISC message in the network Begin
with its CH id as the destination sensor. When a given Clm receives 1. broadcasts (P _DISC )
a P _DISC message, it will perform the following actions: 2. while (t1)
3. if (receive (P _DISC )) then
Table 5 4. hopC ¼hopC þ 1
The used messages in the ABC-SD routing algorithm. 5. sumE ¼ sumE þ Er (Clm )
6. if (Er (Clm ) < minE) then
Message Description
7. minE ¼ Er (Clm )
H _MSG is a hello neighborhood discover message 8. data ¼data ⊙Clm
P _DISC is a path discovery message
9. rebroadcasts (P _DISC )
P _ACK is a path acknowledgement message sent by the CH to a source
sensor 10. else if (receive( P _ACK )) then
R _MSG is a route message that contains the chosen path from a Clm and its 11. Compute the path strength according to Eq. (21)
CH 12. while (t2 )
D _MSG is a data message sent by each Clm to its CH
13. if (receive( P _ACK )) then
D _ACK is a data acknowledgement message sent by the CH to the sender
sensor
14. Compute the path strength according to Eq. (21)
D _AGG is an aggregated data by a CH for sending to the BS 15. else if (receive( P _DISC )) then
88 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
16. destroy( P _DISC ) t1, the sensor s5 sends the message s5(P_DISC). Sensors s4 and s5
17. Choose the best path among all computed path strength will then receive its sent discovery message since they are in its
18. Launch a R _MSG message. neighbor's table. So, the sensor s4 will forward the message s5
End (P_DISC) to its next hop, i.e., s3 and the sensor s3 will then forward
it to their head s2. In the same way, since the sensor s3 also directly
received the message s5(P_DISC), it will also forward again that
In this way, unlike other bio-inspired routing algorithms for message to their head s2. Thus, when receiving these discovery
WSNs like those proposed in Zungeru et al. (2012), Kuila and Jana messages the head s2 will launch two distinct acknowledgement
(2014), Cai et al. (2015), each sensor si , i ∈ [1, N ] ∩ keeps just one messages s5(P_ACK) to s5 since it received two distinct discovery
route towards its CH. Of course, while clustering and routing messages from s5, from two different paths. To conduct well the
processes are executed at the start of each round, the Clm estab- steps in Algorithm 3, we took a case that one of these acknowl-
lished route may not be the same. An illustration is given below. edgement messages reaches the sensor s5 during the time t2. At
last, the sensor s5 will inform its head s2 the chosen path by
Illustration 3. For instance, in Fig. 6, a sequence of performed launching the route message s5(R_MSG).
actions for establishing routes is described. In this illustration, we
take a simple case in which a cluster with the head s2 and its 5.3.3. Data transfer and acknowledgement mechanism
followers f (s2 ) = {s1, s3, s4 }. During the time t1, each follower will At the end of paths discovery process and the establishment of
perform a number of actions (send/receive messages) in order to routes between each Clm and their CH, then comes the time of data
receive one or more paths toward s2 and during the time t2, it will gathering and transferring, which is explained in Section 5.2.4. In
choose the best path and informs s2 the chosen route among the fact, during its slots time (see Eq. (12)), a sensor will send its
received paths. In the figure, the filled arrow —▶ represents the gathered data to its CH. In the simulation, we stored the total
send of a new message. The open arrow ⟶ represents the for- number of received data from each Clm in each round, in order to
warding message. The dashed arrow represents the path ac- analyse the energy efficiency and throughput metrics that is ex-
knowledgement message both in sending and forwarding. plained in Section 6.2. An illustration of this process is given
In this instance, let us take the case of sensor s5. At the start of hereinafter.
CH.
In summary, in order to have a clear picture about the opera-
6.1. Theoretical analysis of energy consumption
tion of the proposed scheme, Fig. 9 provides a flow chart showing
the various phases and the whole operations of the ABC-SD 6.1.1. Energy consumption derivation
protocol. According to the proposed design, the consumed energy at
each round includes the energy of bootstrapping, the energy of
paths discovery and the energy of data transfer. At the beginning
of each round, the bootstrapping process in which each sensor
6. Performance evaluation
si , i ∈ [1, N ] ∩ discovers its neighbors takes place. Each sensor
has to broadcast a H _MSG packet that will be received by a number
In this section, we propose a performance evaluation of the
of sensors in its communication range. A priori, we cannot know
proposed routing algorithm, which includes a theoretical analysis
the number of neighbors of a given sensor since the deployment is
of energy consumption and the simulation according to some
done randomly. Despite that, we suppose that, in the adopted
proposed evaluation metrics.
sensors' deployment strategy, the maximum number of neighbors
ß is given in Eq. (22):
⎡ r ⎤
ß = ⎢N × ⎥
⎢ λ2 (+ ) ⎥ (22)
packet (respectively, a P _ACK ) by the Clmj , which is a follower of Edata − t = ndata − t ∑ ∑ Edata − t (Clmj )
j=1 l= 1
the head cj ∈ ℶ(ch), j ∈ [1, m] ∩ . In a worst case, i.e., by assuming
m N (( j )
that a P _DISC packet sent by Clmj will be received by all followers of
= 4·Ei·ndata − t ∑ ∑ (n (p (l)) − 1)
the head cj, the expended energy Epdisc (Clmj ) (see Eq. (25)) is equal j=1 l= 1 (33)
to the energy consumed Ei by the Clmj , in the broadcast of the
Finally, according to the aforementioned energy derivations,
P _DISC packet and the energy consumed in the receiving and re-
broadcasting (i.e., 2·Ei ) of the P _DISC by followers, i.e., by the energy expenditure (Eexp) in each round, which includes the
Clmj ∈ f (cj ): expended energy in the bootstrapping, routes establishment and
data packets transfer, in a good network condition is given in Eq.
Epdisc (Clmj ) = Ei × (1 + 2·N (( j )) (25) (34):
For all members of the cluster with the head cj, the expended Eexp = Eboot + Ere + Edata − t
energy by P _DISC packets is computed as shown in Eq. (26) by m
multiplying the energy expended by one follower with the num- = Ei·(N × (1 + ß) + 2· ∑ N (( j )·(N (( j ) + n (p (l)) − 1)
ber of followers of the head cj. Then let us give in Eq. (27), Epdisc, j=1
which is the sum of the expended energy by each cluster, i.e., the m N (( j )
energy expended by each si , i ∈ [1, N ] ∩ : + 4·ndata − t ∑ ∑ (n (p (l)) − 1))
j=1 l= 1 (34)
Epdisc (cj ) = N (( j ) × Epdisc (Clmj ) = Ei·N (( j ) × (1 + 2·N (( j )) (26)
Epack (Clmj ) = Ei × (1 + 2·(n (p (l)) − 2)) (28) P (p (l), k ) = e−rn (p (l)) (35)
where l ∈ [1, N (( j )[ ∩ . By considering all followers of the head where r > 0 is the density parameter of the used Poisson dis-
cj, i.e., each Clmj ∈ f (cj ), the expended energy for P _ACK packets by tribution in Section 5.2.2 for the distribution of clusters on the
each cluster is given in Eq. (29). In addition, the expended energy sensing environment. Then in the case of a data packet re-
by the network in P _ACK packets, which corresponds to the sum of transmission, the modeling of the energy consumed in a certain
each cluster's expended energy in P _ACK packets is given in number of retransmissions depends on the probability (see Eq.
Eq. (30). So, the energy expended in the routes establishment (Ere) (36)) that the kth retransmission leads to the first successful
is given in Eq. (31). transmission. That probability P (X = k ) is given such that the
number of data packet retransmissions follows the geometric
Epack (cj ) = N (( j ) × Epack (Clmj ) = Ei·N (( j )(1 + 2·(n (p (l)) − 2)) (29) distribution:
m m P (X = k ) = (1 − P (p (l), k ))k − 1·P (p (l), k ) (36)
Epack = ∑ Epack (cj ) = Ei· ∑ N (( j )(1 + 2·(n (p (l)) − 2))
j=1 j=1 (30) where X is the random variable that represents the number of
successes in a data packet delivery. Therefore, the energy con-
m
sumption Edata − r (Clmj ) for n retransmissions of one data packet sent
Ere = Epdisc + Epack = 2Ei· ∑ N (( j )·(N (( j ) + n (p (l)) − 1) by Clmj can be expressed as done in Eq. (37). Hence, in each round,
j=1 (31)
the energy consumption Edata − r for the retransmission of ndata − t
Furthermore, we can compute the expended energy in the data packets for the whole network is given in Eq. (38). In the
routing of data packets since the number of hops is known in routing algorithm, the maximum number of retransmissions is set
advance when a Clm tries to send its gathered data to its CH. to 3:
Thereby, the resulting energy consumption in a data packet
transfer toward a path p(l) is equal to the energy expended by the Edata − r (Clmj )
Clm in the sending and the energy expended by the CH at reception n N (( j )
plus the energy of reception and forwarding at the intermediary = ∑ ∑ {(1 − P (p (l), k ))k − 1·P (p (l), k )×
sensors in the path, plus the energy of sending and receiving the k=1 l= 1
D _ACK messages. (see Eq. (32)). So, by assuming that each Clm has
to send ndata − t data packets to its CH in each round, the energy
(E data − t (Cl mj ) + (k − 1) Ei } ) (37)
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 91
first sensor dies in each network's scenario. It can be seen that the
first dead sensor in ABC-SD occurs long after the first dead in
60 LEACH-C and LEACH. Moreover, according to the curves visible in
Fig. 12a–d, we conclude that the energy efficiency in the ABC-SD
Table 8
40 Average sensor's energy consumption (μ¯) and standard deviation (σ ) .
800 energy level of the sensor. Also, there is not a sleep/wakeup me-
chanism for energy conservation during the idle time. The adopted
600 strategies in their design led to weakness results, in particular, it
caused a considerable energy wastage and a low data delivery rate.
400
Furthermore, the adopted fitness function in the building of
200
clusters favored this visible gain in performance obtained in the
ABC-SD protocol. Indeed, the fitness function (see Section 5.2.5) is
0 designed in such a way that it takes into account the energy as
100 200 300 400
well as the QoS criteria. First, the energy criterion allows the
Network scenarios (number of sensors)
choice of CHs with sufficient energy since they act as relay sensors
Fig. 13. Time at which the first sensor dies. that aggregate and forward gathered data to the BS. Moreover,
since CHs and of course clusters change at each round, the power
used by CHs is balanced among other sensors. The second criterion
protocol is far better than the others since the proposed protocol as to it, concerns the assignment of the cluster members to a given
offers a high data delivery to the BS while consuming less power cluster according to the quality of the communication link. The
during all the simulation time. position update mechanism existing in the ABC algorithm used
However, it is important to note that the ABC-C protocol en- here in the proposed clustering algorithm efficiently helps us in
ables good results in terms of first dead. However, concerning the providing optimal assignment of cluster members. Moreover, the
results obtained in the evaluation of the energy efficiency in the adopted mechanism in the route discovery process allows the
ABC-C, the curves in Fig. 12 show good results for network sce- choice of the path with fewer number of hops, and which is less
narios with and 100 and 200 sensors, but in network scenarios power expensive (see the proposed model in Eq. (21)), in which
with 300 and 400 sensors, the ABC-C enabled results close to those gathered data will be forwarded to CHs. These mechanisms help
obtained in PSO-HC and PSO-C. This means that, the ABC-C pro- the ABC-SD for the well balancing of the overall power con-
tocol presents some shortcomings in terms of management of sumption of sensors. The results obtained here by the proposed
energy when the number of sensors grows. On the other hand, it is ABC-SD protocol, specially for network lifetime, confirm the
94 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
× 10 Table 10
2
Mean of packet loss rate (μ¯) and standard deviation (σ ) .
ABC-SD
1.8 ABC-C
PSO-HC Protocol Network scenario
PSO-C
1.6 LEACH-C
LEACH #100 #200 #300 #400
1.4
μ̄ s μ̄ s μ̄ s μ̄ s
1.2
Throughput
0.2
0
100 200 300 400
× 106 180
2.5 ABC-SD
ABC-C
100 sensors 160 PSO-HC
120
1.5
100
80
1
60
0.5 40
20
0
0 1 2 3 4 5 6 7 8 9 10 0
100 200 300 400
Rounds
Network scenarios (number of sensors) - 500*500
Fig. 16. The communication overhead in ABC-SD.
Fig. 18. Energy consumption in a sensing area of 500 × 500 m2 .
25
ABC-SD It can be observed from Fig. 18 that the ABC-SD enables good
ABC-C
results for the energy expenditure in each sensor than the com-
Average number of inactive sensors per round
PSO-HC
PSO-C
20 LEACH-C
pared protocol even if the sensing area becomes larger. Never-
LEACH theless, the standard deviations presented in Table 11 show that
the PSO-C protocol has a minimum dispersion. In addition, it is
15 important to note that the ABC-C and PSO-HC also outputted good
results when changing the sensing area. Fig. 19 reveals the effec-
tiveness of the ABC-SD in terms of amount of data packets re-
10 ceived by the BS with a minimum dispersion, in a sensing area of
500 × 500 m2. Although the ABC-SD enables a better throughput
than the compared, it can be found from Table 12 that the ABC-SD
5
enables higher dispersion in the results.
Finally, by returning to the design goals of the ABC-SD protocol
(see Section 5.1), the results obtained in the evaluation of the
0
100 200 300 400 network lifetime as well as the network coverage and the
Network scenarios (number of sensors) throughput, confirm that the ABC-SD protocol aims at maintaining
Fig. 17. Amount of unclustered sensors.
a good link quality, as well as providing a great number of deliv-
ered packets while preserving the sensor's power consumption as
best as possible.
adopted fitness function in the clustering algorithm which takes
care of energy consumption of sensors and the QoS of commu-
nication link within clusters. Moreover, it can be seen that the
ABC-C and PSO-HC protocols yield good results. This is respec- 7. Conclusion and future work
tively allowed by the positions update of the ABC algorithm in the
ABC-C and the adopted particle encoding scheme in the PSO-HC. The improvement of network performance remains an active
However, the results of the PSO-C protocol for this test are very issue of research in WSNs. In large-scale networks, it is demon-
poor. This is due to the used cost-based function for the intra- strated that, the optimal clustering mechanism has a strong in-
cluster communication, which does not allow far sensors to be fluence on the overall performance of the network. In this paper,
members of a cluster. Regarding the LEACH and LEACH-C protocols we investigated problems of clustering and routing in WSNs and
since their design's aim at balancing the load of CHs, sensors are then, we proposed a cluster-based routing protocol called ABC-SD.
assigned to CHs that are far away from them. This fact leads to a lot The clustering problem is formulated as a Linear Programming
of death of CHs and this considerably increases the amount of
unclustered sensors. Table 11
In the above presented results, we have used the 100 × 100 m2 Average sensor's energy consumption (μ¯) and standard deviation (σ ) – sensing area
of 500 × 500 m2.
sensing area varying the number of sensors in the performance
evaluation. However, in order to confirm the effectiveness of the Protocol Network scenario
ABC-SD, 10 simulation runs of the four network scenarios in an
area of 500 × 500 m2 with the BS positioned at the coordinate #100 #200 #300 #400
(0; 0) of the field have been used in order to evaluate the potential
μ̄ s μ̄ s μ̄ s μ̄ s
impact of changing the sensing area on the average energy con-
sumed by each sensor and the throughput. Figs. 18 and 19 re- ABC-SD 74.81 1.03 59.98 1.63 61.82 1.01 52.72 1.03
spectively show the results of the average energy consumed by ABC-C 79.11 1.01 64.23 1.03 71.01 0.95 76.10 0.98
each sensor and the results obtained in the evaluation of the PSO-HC 81.41 2.12 71.44 2.14 76.43 1.69 74.96 1.53
throughput. In addition, in each network scenario, the average PSO-C 87.83 0.29 82.11 0.41 85.12 0.63 86.40 0.62
LEACH-C 99.03 1.01 98.93 1.04 97.03 0.98 96.33 0.30
energy expended by each sensor and the standard deviations is LEACH 169.01 3.54 178.41 2.97 165.32 1.97 164.09 2.19
given in Tables 11 and 12.
96 A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97
0.4
0.2
References
0
100 200 300 400
Ari, A.A.A., Gueroui, A., Labraoui, N., Yenke, B.O., 2015. Concepts and evolution of
research in the field of wireless sensor networks. Int. J. Comput. Netw. Com-
Network scenarios (number of sensors) - 500*500 mun. 7 (1), 81–98.
Ari, A.A.A., Yenke, B.O., Labraoui, N., Gueroui, A., 2016. Energy efficient clustering
Fig. 19. Amount of data packets received by the BS in a sensing area of algorithm for wireless sensor networks using the ABC metaheuristic. In: 2016
500 × 500 m2 . International Conference on Computer Communication and Informatics (ICCCI).
IEEE, Coimbatore, India, pp. 1–6.
Avril, F., Bernard, T., Bui, A., Sohier, D., 2014. Clustering and communications
Table 12 scheduling in WSNs using mixed integer linear programming. J. Commun.
Mean of throughput (μ¯ ( × 106)) and standard deviation (σ ( × 106)) – sensing area of Netw. 16 (4), 421–429.
Barberis, A., Barboni, L., Valle, M., 2007. Evaluating energy consumption in wireless
500 × 500 m2 .
sensor networks applications. In: 2007 10th Euromicro Conference on Digital
System Design Architectures, Methods and Tools, DSD 2007. IEEE, Lübeck,
Protocol Network scenario Germany, pp. 455–462.
Cai, X., Duan, Y., He, Y., Yang, J., Li, C., 2015. Bee-Sensor-C: an energy-efficient and
#100 #200 #300 #400 scalable multipath routing protocol for wireless sensor networks. Int. J. Distrib.
Sens. Netw. (976127), 0–14.
μ̄ s μ̄ s μ̄ s μ̄ s Dorigo, M., Birattari, M., Stützle, T., 2006. Ant colony optimization. IEEE Comput.
Intell. Mag. 1 (4), 28–39.
ABC-SD 0.42 0.024 1.09 0.014 1.29 0.099 1.83 0.101 Elhabyan, R.S., Yagoub, M.C., 2014. PSO-HC: particle swarm optimization protocol
ABC-C 0.41 0.004 0.83 0.005 1.10 0.008 1.37 0.009 for hierarchical clustering in wireless sensor networks. In: 2014 International
PSO-HC 0.39 0.005 0.80 0.008 1.21 0.004 1.60 0.006 Conference on Collaborative Computing: Networking, Applications and Work-
PSO-C 0.31 0.008 0.74 0.010 1.14 0.010 1.46 0.019 sharing (CollaborateCom). IEEE, Miami, Florida, USA, pp. 417–424.
LEACH-C 0.38 0.012 0.79 0.014 1.17 0.029 1.59 0.101 Fathian, M., Amiri, B., Maroosi, A., 2007. Application of honey-bee mating optimi-
zation algorithm on clustering. Appl. Math. Comput. 190 (2), 1502–1513.
LEACH 0.27 0.016 0.59 0.061 0.79 0.125 1.01 0.163
Hammoudeh, M., Newman, R., 2015. Adaptive routing in wireless sensor networks:
QoS optimisation for enhanced application performance. Inf. Fusion 22, 3–15.
Heidarian, F., Schmaltz, J., Vaandrager, F., 2012. Analysis of a clock synchronization
protocol for wireless sensor networks. Theor. Comput. Sci. 413 (1), 87–105.
problem and the routing problem is solved with a cost-based
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H., 2000. Energy-efficient
function. We opted for a centralized clustering optimization car- communication protocol for wireless microsensor networks. In: 2000 Pro-
ried out in the BS, which has a rich resource suitable for it. Clusters ceedings of the 33rd Annual Hawaii International Conference on System Sci-
are built in an energy efficient way by exploiting the efficient ences. IEEE, Maui, Hawaii, USA, pp. 10–20.
Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H., 2002. An application-spe-
features and the fast convergence characteristics of the Artificial cific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel.
Bee Colony metaheuristic. As for the routing problem, it is brought Commun. 1 (4), 660–670.
back to a problem of choosing a low-cost path among existing Johnson, N.L., Kemp, A.W., Kotz, S., 2005. Univariate Discrete Distributions vol. 444.
John Wiley & Sons, Inc., Hoboken, New Jersey.
paths from a source to a destination, for the intra-cluster com- Kabara, J., Calle, M., 2012. MAC protocols used by wireless sensor networks and a
munication. The choice of CHs in the clustering algorithm also general method of performance evaluation, Int. J. Distrib. Sens. Netw, http://dx.
helps us in the construction of routes for the inter-cluster com- doi.org/10.1155/2012/834784.
Karaboga, D., Okdem, S., Ozturk, C., 2012. Cluster based wireless sensor network
munication. Contrary to the existing protocols, the major con-
routing using artificial bee colony algorithm. Wirel. Netw. 18 (7), 847–860.
tributions of our proposal are illustrated as follows. Firstly, in order Karaboga, D., 2010. Artificial bee colony algorithm, Scholarpedia 5 (3), 6915.
to be closer to the real sensing environment and existing sensor's Kennedy, J., 2010. Particle swarm optimization. In: Encyclopedia of Machine
Learning. Springer, USA, pp. 760–766.
hardware, a realistic energy consumption model is used. Secondly,
Kuila, P., Jana, P.K., 2014. Energy efficient clustering and routing algorithms for
it defines a new cluster balancing mechanism that makes a trade- wireless sensor networks: particle swarm optimization approach. Eng. Appl.
off between sensor's energy level and the quality of the commu- Artif. Intell. 33, 127–140.
nication link. Thirdly, we designed a pre-established routes ap- Labraoui, N., Gueroui, M., Aliouat, M., Petit, J., 2013. Reactive and adaptive mon-
itoring to secure aggregation in wireless sensor networks. Telecommun. Syst.
proach in which the chosen routing path is less-costly in terms of 54 (1), 3–17.
power consumption and employs a least number of hops. Fourthly, Latiff, N.M.A., Tsimenidis, C.C., Sharif, B.S., 2007. Energy-aware clustering for
unlike the most existing methods, which focuses on one metric, wireless sensor networks using particle swarm optimization. In: 2007 IEEE
18th International Symposium on Personal, Indoor and Mobile Radio Com-
the ABC-SD protocol performs well in the above evaluation me- munications, PIMRC 2007. IEEE, Athens, Greece, pp. 1–5.
trics. Extensive simulations were made with a number of network Li, J., Zhou, H., Zuo, D.-C., Hou, K.M., Xie, H., Zhou, P., 2014. Energy consumption
topologies in different network sizes and the obtained results evaluation for wireless sensor network nodes based on queuing petri net, Int. J.
Distrib. Sens. Netw, http://dx.doi.org/10.1155/2014/262848.
show that, the proposed protocol delivers better performance than
Liu, X., 2012. A survey on clustering routing protocols in wireless sensor networks.
its comparatives in terms of the network lifetime, the network Sensors 12 (8), 11113–11153.
coverage and the amount of packets received by the BS. We expect Malesci, U., Madden, S., 2006. A measurement-based analysis of the interaction
several research contributions to be conducted from the reported between network layers in tinyOS. In: Wireless Sensor Networks. Springer,
Zurich, Switzerland, pp. 292–309.
results. As a future work, we plan to study the effects of mobile Moussaoui, O., Ksentini, A., Naimi, M., Gueroui, M., 2006. A novel clustering algo-
sensors as well as mobile BS in the proposed algorithm. rithm for efficient energy saving in wireless sensor networks. In: 2006
A.A.A. Ari et al. / Journal of Network and Computer Applications 69 (2016) 77–97 97
International Symposium on Computer Networks. IEEE, Istanbul, Turkey, pp. coccineus (Fabaceae) flowers at Ngaoundere (Cameroon). Int. J. Trop. Insect Sci.
66–72. 34 (02), 127–137.
Nanda, S.J., Panda, G., 2014. A survey on nature inspired metaheuristic algorithms Texas Instruments, 2014. Chipcon as smartrf® CC2420 Preliminary Datasheet (rev
for partitional clustering. Swarm Evolut. Comput. 16, 1–18. 1.2), 2004-06-09. Technical Report, 〈http://www.ti.com/lit/ds/symlink/cc2420.
Polastre, J., Hill, J., Culler, D., 2004. Versatile low power media access for wireless pdf〉 (accessed 27.06.15).
sensor networks. In: Proceedings of the 2nd International Conference on Em- Titouna, C., Aliouat, M., Gueroui, M., 2016. FDS: fault detection scheme for wireless
bedded Networked Sensor Systems. ACM, Baltimore, Maryland, USA, pp. 95– sensor networks. Wirel. Pers. Commun. 86 (2), 549–562.
107. Winston, M.L., 1991. The Biology of The Honey Bee. Harvard University Press, USA.
Saleem, M., Di Caro, G.A., Farooq, M., 2011. Swarm intelligence based routing pro- Yang, J., Xu, M., Zhao, W., Xu, B., 2010. A multipath routing protocol based on
tocol for wireless sensor networks: survey and future directions. Inf. Sci. 181 clustering and ant colony optimization for wireless sensor networks. Sensors 10
(20), 4597–4624. (5), 4521–4540.
Singh, B., Lobiyal, D.K., 2012. A novel energy-aware cluster head selection based on Zungeru, A.M., Ang, L.-M., Seng, K.P., 2012. Classical and swarm intelligence based
particle swarm optimization for wireless sensor networks. Hum.-Centric
routing protocols for wireless sensor networks: a survey and comparison. J.
Comput. Inf. Sci. 2 (1), 1–18.
Netw. Comput. Appl. 35 (5), 1508–1536.
Srinivasan, K., Dutta, P., Tavakoli, A., Levis, P., 2010. An empirical study of low-power
Zungeru, A.M., Ang, L.-M., Seng, K.P., 2012. Termite-hill: performance optimized
wireless. ACM Trans. Sens. Netw. (TOSN) 6 (2), 16.
swarm intelligence based routing algorithm for wireless sensor networks. J.
Tchuenguem Fohouo, F.-N., Fameni Tope, S., Brückner, D., 2014. Foraging and pol-
lination behaviour of Xylocopa olivacea (Hymenoptera: Apidae) on Phaseolus Netw. Comput. Appl. 35 (6), 1901–1917.