Вы находитесь на странице: 1из 10

Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Contents lists available at ScienceDirect

Engineering Applications of Artificial Intelligence


journal homepage: www.elsevier.com/locate/engappai

Optimized sugeno fuzzy clustering algorithm for wireless sensor networks MARK

Mohammad Shokouhifar , Ali Jalali
Department of Electrical Engineering, Shahid Beheshti University G.C., Tehran, Iran

A R T I C L E I N F O A BS T RAC T

Keywords: Clustering is the most common approach to achieve energy efficiency in wireless sensor networks. The existing
Wireless sensor networks clustering techniques exhibit some drawbacks which limit their usage for practical networks. First, cluster heads
Clustering are typically selected among all sensor nodes within the network, and consequently, unbalanced clusters may be
Fuzzy c-means (FCM) generated. Second, the controllable parameters are defined manually. Third, the protocol is not adjusted and
Sugeno fuzzy inference system
tuned based on application specifications. In this paper, we propose an adaptive fuzzy clustering protocol
Artificial bee colony (ABC)
(named LEACH-SF), in order to overcome the mentioned drawbacks. In LEACH-SF, fuzzy c-means algorithm is
used to cluster all sensor nodes into balanced clusters, and then appropriate cluster heads are selected via
Sugeno fuzzy inference system. The fuzzy inputs of the Sugeno fuzzy inference system include the residual
energy, the distance from sink, and the distance from cluster centroid. Unlike the existing fuzzy-based routing
protocols in which the fuzzy rule base table is defined manually, we utilize artificial bee colony algorithm to
adjust the fuzzy rules of LEACH-SF. The fitness function of the algorithm is defined to prolong the network
lifetime, based on the application specifications. In other words, LEACH-SF not only prolongs the lifetime, but
also is applicable to any kind of application. Simulations over 10 heterogeneous wireless sensor networks show
that LEACH-SF outperforms the existing cluster-based routing protocols.

1. Introduction energy consumption of nodes and maximize the network lifetime


(Shokouhifar and Jalali, 2015). Lifetime in WSNs can be defined via
Wireless sensor network (WSN) is a rapidly evolving technological different criteria based on application specifications, e.g., first node
platform with tremendous applications in several domains such as dies (FND), half node die (HND), last node dies (LND), etc. Attea and
military, agriculture, structural monitoring, health monitoring, home Khalil (2011). In heterogeneous WSNs with different data packets, the
networks, etc (Akyildiz et al., 2002). A WSN consists of a number of most important criterion is FND, as perishing of even one node may
small-size low-power sensor nodes capable of detecting physical result irreparable damages. However, perishing of some nodes is not
phenomena, which are constrained in energy supply, processing power, critical in homogeneous WSNs (Shokouhifar and Jalali, 2015).
and bandwidth. Because WSNs usually are deployed in open and In WSNs, a routing protocol is required when a node cannot send
unprotected areas, they are vulnerable to various types of attacks its data packet directly to the base station, and has to rely on the
(Wang et al., 2011). Self-organizing nature, limited bandwidth, dis- assistance of intermediate nodes to forward its packet (Attea and
tributed operations via wireless communications, multi-hop traffic Khalil, 2011). Based on the network structure adopted, the existing
forwarding, and dependency on other sensor nodes are such character- routing protocols can be categorized into flat, hierarchical, and loca-
istics of WSNs that expose it to many security attacks. Therefore, tion-based (Ming and Wong, 2007). In flat routing, all nodes have the
information security should be considered during the design of WSNs same functionality and they work together to sense and route
(Alrajeh et al., 2013). Many security solutions have been proposed such (Intanagonwiwat et al., 2000). Hierarchical routing techniques divide
as authentication, key exchange, and secure routing or security the network into distinguished clusters. The most famous and attrac-
mechanisms for specific attacks. Comprehensive review of security tive hierarchical protocol is low energy adaptive clustering hierarchy
mechanisms and intrusion detection systems can be seen in (Alrajeh (LEACH) (Heinzelman et al., 2000). In location-based approaches, the
et al., 2013; Butun et al., 2014). information about the location of sensor nodes is used to generate the
Sensor nodes may be applied in inaccessible or dangerous environ- routing path (Xu et al., 2001).
ments, where the power supplies could not be replaced or recharged Clustering is an effective approach to reduce the energy consump-
easily (Yick et al., 2008). Thus, it is highly required to minimize the tion in WSNs (Vlajic and Xia, 2006). Cluster-based protocols segment a


Corresponding author.
E-mail addresses: m_shokouhifar@sbu.ac.ir (M. Shokouhifar), a_jalali@sbu.ac.ir (A. Jalali).

http://dx.doi.org/10.1016/j.engappai.2017.01.007
Received 21 July 2015; Received in revised form 19 October 2016; Accepted 11 January 2017
Available online 19 January 2017
0952-1976/ © 2017 Elsevier Ltd. All rights reserved.
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

network into non-overlapping clusters, each of them contains a cluster advertisement message to inform the rest of nodes that it is a new
head (CH), acts as a gateway between its members and the base station CH in the current round. Once each non-CH node receives the
(sink). Generally, clustering consists of two phases: setup and steady advertisement messages from all CHs, it chooses the nearest CH based
state (Heinzelman et al., 2000). In the setup phase, CHs are selected on the signal strength of the received messages. After cluster forming
and clusters are formed. In steady state phase, each member node process, each CH creates a time scheduling based on the TDMA method
transmits its data packet to the corresponding CH, and then, the CH which assigns a time slot for each non-CH node to send its data to the
sends the gathered data to the base station. corresponding CH. When each CH receives the data packets of all
member nodes, it aggregates them and forwards to the sink. The
1.1. Our contribution residual energy of nodes is not taken into account for CH-election in
LEACH protocol. On the other hand, if a node with lower residual
In this paper, we propose a new centralized cluster-based routing energy decides to become a CH, it would be rapidly dead. Considering
protocol based on Sugeno fuzzy inference system (named LEACH-SF). the residual energy of nodes, LEACH-C (Heinzelman et al., 2002) and
In the cluster-based protocols in the literature, CHs are typically LEACH-EP (Jia et al., 2010), two extensions of LEACH have been
selected among all sensor nodes, and then, clusters are formed by proposed, in which, an energy factor is also takes into account.
simply assigning each node to the nearest CH. The main drawback is to LEACH-C (Heinzelman et al., 2002) is the centralized version of
generate an inappropriate distribution of CHs over the network. LEACH, in which, the sink is responsible to select the CHs. At the
However, in LEACH-SF, an overall clustering is firstly performed on beginning of every round, all nodes send information about their
all nodes to form balanced clusters, and then, proper CHs are selected. location and residual energy to the base station. The base station
The main contributions in this paper can be summarized as follows: selects some nodes as CHs from the set of nodes whose their residual
energy is higher than the average energy of all nodes. This selection is
• An optimized Sugeno fuzzy clustering algorithm is proposed as an done via simulated annealing. Then, the base station broadcasts the
efficient application specific routing protocol in WSNs. IDs of the CHs in the network to inform them that are the current CHs.
• Fuzzy c-means algorithm is utilized to form balanced clusters over The rest of the LEACH-C process is quite similar to that of the LEACH.
the network. LEACH-EP (Jia et al., 2010) is another centralized energy-aware
• Sugeno fuzzy inference system is used to select the appropriate CHs extension of LEACH protocol. In LEACH-EP, the nodes with more
and form clusters. energy have more opportunities to serve as CH. Energy-based thresh-
• We utilize artificial bee colony algorithm to optimize the fuzzy rules old TEP (n ) for node n in LEACH-EP is calculated according to Eq. (2), in
in order to prolong the network lifetime, based on the application which, p is the desired percentage of nodes to be CHs, E (n ) is the
specifications. current residual energy of node n , and Ech_av is the average residual
• These Sugeno fuzzy rules should be adaptively tuned in order to energy of CHs in the previous round.
prolong the network lifetime, once before LEACH-SF operates for
⎧ p × E (n) if E (n ) ≥ 0. 5×E
the each application. ⎪ Ech _av ch _av
TEP (n ) = ⎨
• We present an efficient encoding scheme to represent feasible ⎪ 0
⎩ if E (n ) < 0. 5×Ech _av (2)
solutions, and design a weighted average multi-objective fitness
function to optimize the Sugeno fuzzy rules of LEACH-SF. The Recently, evolutionary algorithms (EAs) have begun to attract
fitness function of the ABC algorithm can be defined based on the attention from researchers to develop cluster-based routing protocols
application specifications. in WSNs (Shokouhifar and Jalali, 2015; Attea and Khalil, 2011; Kuila
and Jana, 2014; Mudundi and Ali, 2007; Sengupta et al., 2013;
The rest of the paper is organized as follows: Section 2 briefly Hussain et al., 2007a, 2007b; Shakshuki and Malik, 2009;
reviews cluster-based routing protocols in WSNs. In Section 3, the Shokouhifar and Hassanzadeh, 2014). The main aim is to dynamically
proposed LEACH-SF protocol is introduced in details. The optimiza- cluster the sensor nodes in setup phase via EA in such a way that the
tion procedure of LEACH-SF using artificial bee colony algorithm is energy consumption is minimized and clustering criteria are optimized.
presented in Section 4. The network model is addressed in Section 5. For N sensor nodes, there are totally 2N −1 different solutions, where in
Section 6 presents the simulation results and comparison with the each solution, each node can be either selected as a CH or not.
existing techniques. Finally, Section 7 concludes the paper with some Therefore, clustering in WSNs is an NP-hard problem. EAs have been
future directions. applied successfully to a variety of NP-hard problems, and especially in
the context of clustered routing in WSNs. Although these approaches
2. Literature review outperform other attractive routing protocols in prolonging the net-
work lifetime, making a precise inspection, one can see that one
2.1. Classical methods common drawback emerges. Since EA should be performed online in
the setup phase in the each round, these approaches increase an extra
Cluster-based routing protocols can be distinguished by how the overhead and delay to transmit data packets.
CHs would be elected. LEACH (Heinzelman et al., 2000) is the first
cluster-based protocol. It uses stochastic self-election which means that
nodes make autonomous decisions to be CHs without centralized 2.2. Fuzzy methods
control. At the every round in LEACH, each node chooses a random
number in the range of [0,1]. If the random number of node n is Because of the uncertainties occurring in the WSN environments,
smaller than T (n ), it becomes a CH in the current round. The threshold many clustering-based protocols make use of fuzzy systems for
T (n ) is calculated according to Eq. (1), in which, p is the desired clustering (Gupta et al., 2005; Mamdani and Assilian, 1975; Ran
percentage of CHs, r is the current round number, and G is the set of et al., 2010; Kim et al., 2008; Lee and Cheng, 2012; Zhang et al., 2014;
nodes which have not been CH in the last 1/ p rounds. Zahedi et al., 2016; Sert et al., 2015). By using fuzzy input/output
variables, uncertainties inherent in the WSN nature are handled in an
⎧ p
if n∈G
⎪ effective manner. Moreover, fuzzy logic has comparatively more
T (n ) = ⎨ 1 − p × (rmod (1 / P ))
⎪ flexibility than crisp logic. On the other hand, fuzzy inference system
⎩ 0 otherwise (1)
can achieve a better combination of the input parameters to obtain the
When a node has been selected as a CH, it broadcasts an optimal output.

17
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Gupta et al. (2005) proposed a fuzzy based CH-selection approach. in MOFCA: residual energy, distance from the sink, and node density.
In the design of the fuzzy system, three variables (residual energy, This method is distributed, and thus, uses local decisions to determine
centrality and concentration) are designed as fuzzy inputs. This the node competition radius and select tentative and final CHs.
approach, similar to LEACH, has two main phases: setup phase and The proposed LEACH-SF algorithm is different from the existing
steady state phase. The only difference with LEACH is in the setup classical and fuzzy cluster-based routing protocols with the following
phase, where the base station calculates the fuzzy chances of nodes to respects:
be CHs. This method utilizes the Mamdani fuzzy inference system
(Mamdani and Assilian, 1975). At the every round, the nodes with the 1) The proposed LEACH-SF algorithm can prolong the network life-
maximum fuzzy chances are selected as the current CHs. time based on the specifications of the network for any application.
LEACH-FL (Ran et al., 2010) is an improved version of the LEACH Whereas the performance of the existing techniques may be high
protocol which utilizes fuzzy logic to select CHs. It has a similar but cannot adapt with new applications.
mechanism to Gupta et al. (2005), however, three fuzzy input variables 2) In LEACH-SF, balanced clusters are formed and then an appro-
are used: residual energy, distance from the sink, and node density. priate CH is selected within each cluster. Therefore not only
The clustering procedure in LEACH-FL is centralized, in such a way balanced clusters are generated, but also precise number of CHs
that all calculations for CH-selection are utilized in a processor located can be controlled. Whereas in the other clustering approaches, CHs
in the base station. Although this method has the same defect of the are typically selected among all nodes, and consequently, unba-
protocol presented in Gupta et al. (2005), it offers better results. lanced clusters may be generated.
CHEF (Kim et al., 2008) is another fuzzy based clustering algo- 3) We present a Sugeno fuzzy clustering algorithm for CH selection in
rithm. Unlike Gupta et al. (2005) and Ran et al. (2010), CHEF does not WSNs. Whereas Mamdani inference system is mainly used in the
need sink to collect the information of all nodes. It uses a distributed existing fuzzy-based approaches.
local CH-election mechanism based on the fuzzy logic. At the every 4) The fuzzy rules of LEACH-SF can be adaptively optimized based on
round, each node generates a random number between 0 and 1. If the the application specifications. Whereas fuzzy rules of the existing
random number of the node is smaller than a pre-specified threshold, fuzzy methods are defined manually.
the node calculates its chance to be a CH via the fuzzy system. In the 5) The iteratively-based optimization algorithm is performed to tune
design of the fuzzy inference system, two variables are considered as LEACH-SF only once before the network operation. Whereas the
fuzzy inputs: residual energy and local distance. Once each node existing EAs are typically applied for the CH selection at the setup
advertises its candidate message, it waits for receiving the messages phase of every round. Therefore, extra delay is generated in the data
from the other nodes within its vicinity. If the chance of the node is transmission phase.
greater than the others, it becomes a CH and advertises a message to
the other nodes that it is a CH in the current round. The other phases in 3. Sugeno fuzzy clustering algorithm (LEACH-SF)
CHEF are similar to those of in the LEACH protocol.
LEACH-ERE (Lee and Cheng, 2012) is similar to CHEF, except in 3.1. Overall operation of LEACH-SF
the determining the chance of nodes to be CHs in the pre-specified
threshold and in the maximum distance in the vicinity. The cluster The operation of the proposed LEACH-SF protocol in the every
forming procedure in LEACH-ERE is distributed and there is no need round can be separated into setup phase and steady state phase. The
to centralized calculations in the base station. At the every round, each steady phase is quite similar to that of in the original LEACH protocol.
node generates a random number. If the random number is greater The difference is in the setup phase, where unlike LEACH, sink needs
than the pre-specified threshold, the node becomes a candidate. Then, to collect the information about the residual energy and location of
the node calculates its chance using fuzzy system and broadcasts the nodes, to select CHs via the Sugeno fuzzy model. The CH selection
obtained value along with the candidate message. The residual energy procedure in LEACH-SF is centralized, in such a way that all calcula-
and the expected residual energy are considered as the fuzzy inputs. At tions for clustering is utilized in the sink. During the setup phase, at
the every round, the consumed energy of all nodes in case of becoming first Fuzzy C-Means (FCM) is performed on all nodes. Then, an impact
CHs are calculated. These values are subtracted from the actual factor (IF) is calculated via the proposed Sugeno fuzzy model for the
residual energy of nodes and the expected residual energy of nodes every node within each cluster. IFs are defined in the range of [0,1],
are estimated. In other words, the intention to be CH is used to and represent the goodness of nodes for becoming CH. The larger IF,
estimate the energy dissipation of each node. the more priority to be a CH. After calculation of IFs in the each cluster,
CRT2FLACO (Zhang et al., 2014) is a combined clustering ap- the node with the maximum IF is selected as the CH of that cluster.
proach based on type-2 fuzzy logic and ant colony optimization. It uses After selection of CHs, the base station broadcasts an advertisement
type-2 Mamdani fuzzy inference system to calculate the probability of message to the selected CHs. Then, each CH informs to all its member
nodes to be selected as CHs. Here, three fuzzy input variables are nodes that it is the CH of them in the current round. Each CH creates a
considered: the residual energy, the number of neighbor nodes, and the TDMA telling each non-CH node when it can transmit its data packet.
distance from the base station. In this approach, the selected CHs are During the steady state phase, each member node sends its data to the
linked to the base station via a multi-hop routing based on ant colony corresponding CH, and then, the CH aggregates the gathered data and
optimization. transmits to the sink.
SIF (Zahedi et al., 2016) is a swarm intelligence based fuzzy
clustering technique which adopt Mamdani fuzzy inference system 3.2. Cluster forming
for appropriate CH-selection process. This approach utilizes three fuzzy
input variables: residual energy, global distance to the sink and local FCM (Bezdek, 1981) is an efficient fuzzy clustering algorithm.
distance to the cluster centroid. For each cluster, those nodes which Unlike traditional clustering techniques such as c-means and k-means,
have the residual energy higher than a threshold, are selected as FCM considers a degree of belonging each instance to each cluster. The
candidate nodes for that cluster. Then, one node is selected as CH via aim is to minimize the sum of distances between each instance and its
the Mamdani fuzzy system. cluster centroid. In WSNs, there are N nodes which should be clusters
MOFCA (Sert et al., 2015) is a multi-objective fuzzy clustering into M groups. Each node has two features which are the two-
algorithm. This technique selects the CHs via energy-based fuzzy dimensional coordinate of the node. Therefore, the dimension of each
competition among tentative CHs which were initially determined feature vector is 2. Input instance matrix is x={x1, x2 , …xi , …xN }T of
using a probabilistic model. Three fuzzy input variables are defined dimension N × 2 . Also, the matrix of cluster centers is

18
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

C ={c1, c2 , …cj , …cM }T of dimension M × 2 . The objective function of The CH-selection procedure in LEACH-SF, as seen in Fig. 1,
FCM can be formulated as (Shokouhifar and Farokhi, 2010) includes four parts: normalizer, fuzzifier, Sugeno fuzzy inference
N M engine, and defuzzifier. As mentioned above, in LEACH-SF, three
OF = ∑i =1 ∑ j =1 Uijq × d (xi , cj ) (3) input variables are considered for each node n : the residual energy,
E (n ), the distance from the sink, D (n ), and the distance from the
where xi is the coordinate of node i , cj is the coordinate of the cluster cluster centroid, d (n ). The aim of LEACH-SF is to calculate the impact
centroid j , and q is the fuzziness degree which has a value greater than factor of the node n to be a CH, IF (n ), based on the three input
1. Moreover, Uij is the membership of node i to the cluster j , where variables. Due to the different ranges of each variable in each cluster
M
Uij∈[0,1], and ∑ j =1 Uij =1. Also, d (xi, cj ) measures the dissimilarity and to make them applicable for any circumstance, the crisp input
betweenxi andcj , popularly defined via Euclidian distance. In order to variables should be normalized between 0 and 1 as
minimize the objective function, partial derivation OF with respect to
Uij and cj should be consequtively performed using Eqs. (4) and (5). To xi − min(x )
Normalized (xi ) =
terminate the algorithm, an ending criterion such as Uij (t )−Uij (t − 1) <ε max(x ) − min(x ) (7)
is used, where t is the current iteration, and ε is a positive number
around zero (e.g., 0.001). After termination of the algorithm, each node where xi is the crisp value of the input variable x for the node i . Also,
is assigned to the cluster with the maximum fuzzy membership. min (x ) and max (x ) are the minimum and the maximum value of the
variable among all nodes within the cluster of node i .
M
⎛ d (xi , cj ) ⎞2/(1− q ) Fuzzifier converts the normalized inputs to linguistic fuzzy variables
Uij = ∑ ⎜⎝ ⎟
r =1
d (xi , cr ) ⎠ (4) using the membership functions. The membership functions for input
variables can be seen in Fig. 2. The fuzzy sets used for fuzzification of
N
∑i =1 (Uijq × xi ) each input variable can be divided into three membership functions:
cj = N Low, Medium, and High. After fuzzification, the Sugeno fuzzy inference
∑i =1 Uijq (5)
engine processes the predetermined fuzzy rules optimized via ABC, in
such a way that some rules are fired based on the input fuzzy variables.
3.3. Cluster-head selection So, the fuzzy output for the each fired rule is calculated. Finally,
defuzzifier aggregates the fuzzy outputs and converts to a single crisp
Fuzzy logic (Zadeh, 1965) tries to model our decision making, and value Z (n ).
is able to provide accurate results based on uncertain and vague The final impact factor of the node n can be calculated as
information. The most popular fuzzy inference models are Mamdani
⎧ Z (n ) if E (n ) ≥ t × 1 ∑ N E (i )
(Mamdani and Assilian, 1975) and Sugeno (Takagi and Sugeno, 1985). ⎪ e N i =1
Generally, each model can be represented as “If antecedence then IF (n ) = ⎨
⎪ 0 if E (n ) < te× 1 ∑ N E (i )
consequence”. The antecedence is the same for all fuzzy models, but the ⎩ N i =1 (8)
consequence has different forms for each model.
In this paper, Sugeno fuzzy model is employed in LEACH-SF to where N is the number of alive sensor nodes, E (n ) is the residual
select appropriate CHs. In the design of the fuzzy model, three energy of node n , D (n ) is the distance between node n and sink, d (n ) is
variables are considered as fuzzy inputs: residual energy, distance the distance between noden and its cluster centroid, and te is a
from the sink, and distance from the cluster centroid. The residual threshold parameter to determine whether node n is a candidate node
energy (first input) is the most important variable which directly affects to be a CH or not. The Sugeno fuzzy rule base table applied in LEACH-
the lifetime. If a node with low residual energy decides to become a CH, SF can be seen in Fig. 3.
it would be rapidly dead. The higher residual energy, the more priority According to the range of E , D , and d for the node n , some of the
for the node to be a CH. The distance between a CH and the sink fuzzy rules fires. Then, “weighted average” defuzzification method
(second input) determines the energy consumption of the CH. The (Ross, 2004) is used to generate the final crisp output Z (n ) from the
distance between a CH and the cluster centroid (third input) is also aggregation of the fired outputs yk (n ), k = 1,2, ..,27, according to Eq.
important, because the shorter the distance from the cluster centroid, (9), in which, wk is the minimum value (or multiple) of the member-
the smaller the summation of intra-cluster distances. We considered ships of the three inputs E , D , and d to the corresponding membership
these input variables to avoid selecting low energy nodes (first input), functions within the Rule k .
to minimize the total energy consumption of CH nodes (second input), 27
and to minimize the total energy consumption of non-CH nodes (third ∑k =1 (wk × yk )
Z (n ) = 27
input). ∑k =1 wk (9)
A typical Sugeno fuzzy rule with three inputs x1, x2 and x3, and one
output y can be shown as “If x1=a and x 2=b and x3=c, then y = f (x1, x 2, x3)”, In the given fuzzy system, the number of fuzzy memberships for the
where a , b and c are the membership function of the corresponding each input is 3 (Low, Medium, and High). So, the number of fuzzy if-
inputs. In the Sugeno fuzzy model, f is a crisp function, very often a then rules is 3×3×3=27, where each rule has 4 constant parameters ( pk ,
polynomial function of the input variables as qk , rk , and sk ). Therefore, the total number of controllable parameters in
the fuzzy system is 4×27=108. These parameters should be optimized
f (x1, x2 , x3) = px1 + qx2 + rx3 + s (6)
via artificial bee colony (ABC) algorithm (Karaboga and Basturk, 2007).

Fig. 1. Flowchart of cluster head selection procedure in LEACH-SF.

19
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Table 1
Time complexity analysis for LEACH-SF.

Phase Time complexity

Cluster forming via FCM algorithm O (N×M 2×IFCM)


Cluster-head selection via Sugeno O (N×NRules)
fuzzy system
Fitness function evaluation for each O(N×M 2×IFCM×LND)
artificial bee
Rule-tuning via ABC algorithm O(PopABC×IABC×N×M 2×IFCM×LND)

bees: employed bees, onlooker bees and scout bees (Sabet et al., 2013).
In order to optimize the fuzzy rules of LEACH-SF via ABC algorithm,
the initial population of employed bees is randomly generated within
Fig. 2. Membership functions for input variables in LEACH-SF. the predetermined boundary range of the optimization variables. Then,
two overall steps are consequently done, until the maximum number of
3.4. Time complexity analysis iterations reached: fitness evaluation and population updating. To
evaluate the fitness of an artificial bee, the WSN is simulated via
Time complexity of the different phases of the proposed clustering LEACH-SF protocol with the corresponding Sugeno fuzzy rules deter-
algorithm can be summarized in Table 1. The cluster forming mined by the bee. The population updating consists of three phases:
procedure via FCM has a time complexity of O(N×M 2×IFCM), where employed phase, onlooker phase, and scout phase. At the every
N is the number of sensor nodes, M is the desired number of clusters, iteration, the global best solution should be updated (by comparing
and IFCM is the number of FCM iterations. Moreover, time complexity the current best solution with the best solution found so far). The
of the cluster-head selection via the Sugeno fuzzy system is overall flowchart of the ABC-based optimization procedure of LEACH-
O(N×NRules), where NRules is the number of fuzzy rules. The SF can be seen in Fig. 4.
automatic rule-tuning via ABC has a time complexity of
O(PopABC×IABC×TCFitness), where PopABC is the population size 4.1. Problem representation
of ABC, IABC is the number of ABC iterations, and TCFitness is the
time complexity of the fitness function for one solution, i.e., an artificial As mentioned above, there are 108 controllable parameters in
bee. To evaluate a solution, a network simulation should be completely LEACH-SF, including pk , qk , rk , and sk (k= 1,2,3,…,27). Tuning these
performed until LND. Therefore, TCFitness can be expressed as parameters is the most important issue to operate LEACH-SF effi-
O(N×M 2×IFCM×LND). It should be emphasized that the rule-tuning ciently, based on the application specifications and the lifetime defini-
procedure is performed offline only once before the main network tion. Since the residual energy has a positive impact for a node to
operation, and consequently, it adds no delay neither to the setup become a CH, the each pk is considered to be optimized in the range of
phase nor to the steady state phase. [0,1]. Also, each qk and rk are optimized in the range of [−1,0], as the
both distance-based fuzzy inputs (the distance from sink, and the
4. Automatic rule-tuning via ABC distance from cluster centroid) have the negative impacts. Finally, the
range of [−1,1] is used for the each bias sk . As seen in Fig. 5, a feasible
Generally, the rules of fuzzy inference systems are manually defined solution in ABC algorithm can be represented as a string of length 108.
by an expert. Since proper selection of fuzzy rules is of major
importance during the design of fuzzy systems, we perform an 4.2. Generation of initial population
automatic rule-tuning procedure to optimize the Sugeno fuzzy rules
of LEACH-SF. The rule-tuning procedure can be utilized via such At the first step, the initial population of employed bees is randomly
optimization algorithms as heuristic, metaheuristic, evolutionary and generated. In order to construct an initial solution, a uniform random
swarm intelligence algorithms. In this paper, we apply ABC algorithm number is generated for the each optimization variable, within the
mainly because of its simplicity and good local- and global-search predetermined boundary range of that variable. Then, the two follow-
ability. ABC is as simple as particle swarm optimization (PSO) and ing steps are consequently done, until the maximum number of
differential evolution (DE), and uses only common control parameters iterations of ABC has been reached: fitness evaluation of the current
such as colony size and maximum cycle number. It does not need to set population, and population updating.
external parameters and was confirmed to obtain better function
optimization results than PSO and DE. Moreover, ABC can effectively 4.3. Fitness evaluation
search the whole search-space through its local and global search
mechanisms (Karaboga and Basturk, 2008). After all bees have constructed their solutions, they come back to
In ABC, the position of each point in the search space corresponds the hive and share their information with the other bees. The fitness
to a food source (a feasible solution), and its nectar corresponds to the value of the each bee is evaluated according to the proposed fitness
fitness value of the solution. A bee colony consists of three kinds of function according to Eq. (10). In this way, each bee should firstly be

Fig. 3. The Sugeno fuzzy rule base table in LEACH-SF.

20
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Fig. 4. Overall flowchart of the proposed ABC-based optimization procedure of LEACH-SF protocol.

a new food source within the neighborhood area.

( fitnessg ) β
Pg = E
Fig. 5. A feasible solution to optimize the Sugeno fuzzy rules of LEACH-SF. ∑ f =1 ( fitnessf ) β (13)

decoded to extract its corresponding parameters ( pk , qk , rk , and sk ). In order to neighborhood search (for both employed and onlooker
Then, the WSN is simulated for the each bee, using LEACH-SF phases) in traditional ABC algorithm, one optimization variable is
protocol, with the corresponding Sugeno fuzzy rules. Finally, the randomly selected among all variables. Then, the current value of the
obtained network lifetime is calculated and the fitness value is selected variable is replaced with a uniform random value within the
evaluated. The proposed multi-objective fitness function and its con- allowable boundary range of that variable. However, it is better to start
straints can be formulated as follows: with global search and ending the algorithm with a local search
Maximize: mechanism. In order to improve the investigation of the search space
and increase the convergence speed in ABC algorithm, an adaptive
fitness = w1 × FND + w2 × HND + w3 × LND (10)
neighborhood search strategy is introduced. It enables ABC algorithm
Subject to: to search the neighborhood area via a hybrid global-local search
mechanism. In this way, the parameter Pchange is proposed to adjust
0 ≤ pk ≤1 , −1 ≤ qk≤0 , −1 ≤ rk≤0 , −1 ≤ sk ≤1 , the probability of changing in the each optimization variable. Pchange is
k =1, 2…,27 (11) considered to be decreased linearly from Pmax to Pmin during execute
algorithm, as follows:
3
0 ≤ wl ≤ 1 , ∑l =1 wl = 1, l = 1, 2, 3 (12) t
Pchange (t ) = Pmax + ×(Pmax −Pmin )
max _iter (14)
where w1 to w3 are three constant weights to adjust the relative
importance of the objective terms (FND, HND, and LND). As men- where Pchange (t ) is the probability for changing the value of each
tioned above, the fitness function should be defined based on the optimization variable in the current iteration t , and max_iter is the
application specifications (e.g., FND, HND, LND, etc.). For example, in maximum number of iterations. The larger Pchange , the more optimiza-
healthcare monitoring only FND is important, and we should set w1=1, tion variables would be changed.
w2=w3=0 .
5. Network communication model
4.4. Population updating
In the every round, the sensor nodes sense the environment and
In the every iteration of ABC, each employed bee is moved onto her send the obtained information to the sink. The sink is responsible for
previously visited food source environment (in the previous iteration), receiving the data from nodes, and then sending this information to the
to explore a new food source in the neighborhood area of the present end user. All nodes have the same capabilities of sensing, processing,
one. If the nectar amount (fitness value) of the new solution is higher, and communicating. Each node can communicates directly with the
the bee forgets the previous one and memorizes the new one. The sink and with other nodes. All nodes are equipped with GPS devices, so
employed bee whose food source has been abandoned will become a they are aware of their own location as well as the location of sink. The
scout bee. It is controlled by a parameter called limit. The scout bee sink is stationary static and has no energy constraint. The first order
caries out random searching the whole search space to discover a new radio communication (Heinzelman et al., 2002) is used to model the
solution. After that all employed bees construct their solutions, they dissipated energy. In this model, a radio dissipates Eelec×l , to run either
come back into the hive and share their information about the quality the transmitter or the receiver circuitry. The energy consumption for
of the food sources with onlookers waiting in the hive. The more nectar transmitting an l -bit data packet with distanced can be formulated as
the food source contains, the larger probability the onlooker will choose Eq. (15). Depending on the transmission distance, the free space or
it. The probability of an employed bee to be selected by onlookers is multi-path fading channel model is used for the transmitter amplifier,
calculated via Eq. (13), in which, Pg is the probability of the gth as seen in the right term of Eq. (15). Also, the energy consumption to
employed bee to be chosen by the onlookers, and E is the total number receive an l -bit data packet is calculated according to Eq. (16).
of employed bees. Also, β is a constant parameter adjusts the selection
type. The larger β , the more probability for selecting the employed bee ⎧
⎪ l × Eelec + l × εfs × d
2 if d ≤ d 0
with more fitness. After an onlooker selects an employed bee, she then ETX (l , d )=⎨
⎪ 4
⎩ l × Eelec + l × εmp × d if d > d 0 (15)
goes onto the food source area of the employed bee, in order to explore

21
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

ERX (l ) = l × Eelec (16) Table 3


Setting the controllable parameters of ABC.
where Eelec is the dissipated energy (per bit) in either transmitter or
receiver circuit, and depends on such electronic factors as digital Parameter Value
coding, modulation, filtering, and spreading of the signal. The amplifier
Iterations 50
parameter used for free space and multipath environment is εfs and εamp Population 20
respectively. The distance threshold d 0 is defined as d 0= εfs / εamp . Number of employed bees 10
Number of onlooker bees 10
limit 0.7
6. Performance evaluation β in Eq. (13) 6
Pmax in Eq. (14) 0.2
6.1. Simulation settings Pmin in Eq. (14) 0.01

In order to evaluate the performance of the proposed LEACH-SF 100

clustering algorithm, we compare it against the original LEACH 90


LEACH
LEACH-DT
protocol (Heinzelman et al., 2000), the distance-aware LEACH-DT LEACH-ERE
80 LEACH-FL
protocol (Kang and Nguyen, 2012), the energy-aware ASLPR protocol ASLPR
70
(Shokouhifar and Jalali, 2015), the distributed fuzzy-based LEACH-

Number of Alive Sensors


LEACH-SF

ERE protocol (Lee and Cheng, 2012), and the centralized fuzzy-based 60

LEACH-FL protocol (Ran et al., 2010), in terms of the network lifetime 50


(FND, HND, LND), round history of dead nodes, intra-cluster dis- 40
tances, and the number of data packets received in the base station.
30
The routing mechanism in ASLPR, LEACH-FL, and LEACH-SF is
centralized, in such that the CH-selection procedure is utilized in a 20

processor located in the sink. However, LEACH, LEACH-DT, and 10

LEACH-ERE use stochastic self-election mechanism. On the other 0


0 500 1000 1500
hand, each node makes autonomous decision to be CH, without any Rounds
centralized control. It is expected that centralized protocols achieve
Fig. 6. Number of alive sensor nodes versus rounds, for WSN #1.
better performance than local ones to prolong the network lifetime.
However, given a certain WSN, a centralized protocol encounters 100
higher computational complexity, delay and overhead than a local LEACH
90 LEACH-DT
protocol. LEACH-ERE
80
In the existing cluster-based protocols, CHs are selected among all LEACH-FL
ASLPR
nodes, which may generate inappropriate distribution of CHs over the 70
Number of Alive Sensors

LEACH-SF
network. In order to form balanced clusters in LEACH-SF (unlike the 60

previous protocols), an overall clustering is firstly performed via FCM, 50


and then, a CH is selected within the each cluster. In order to
40
demonstrate the effectiveness of the proposed approach to form
balanced clusters, the maximum and standard deviation of intra- 30

cluster distances are used to compare the mentioned algorithms. The 20

standard deviation (STD) of intra-cluster distances can be expressed as 10

M N 0
1 0 200 400 600 800 1000 1200 1400 1600
STDcl = ∑ ∑ (xi aij − cj )2 Rounds
N j =1 i =1 (17)
Fig. 7. Number of alive sensor nodes versus rounds, for WSN #2.
where aij is a binary parameter determining whether the node i belongs
to cluster j or not. As mentioned above, the fuzzy rules of the LEACH-SF clustering
In order to demonstrate the effectiveness of the LEACH-SF, algorithm should be tuned based on the application specifications and
simulation results of the proposed are compared with those of the lifetime definition, once before LEACH-SF operates. Typically, the
other protocols for 10 different heterogeneous topographical areas, network is not valid after HND. Therefore, the weights of the fitness
each composed of 100 sensor nodes randomly deployed in a topological function in Eq. (10) were set to w1= 0.7, w2= 0.3 and w3=0 , because FND
area of dimension 150 m×150 m. The base station is located at the is the most important factor, HND has less importance, and LND is not
center of the network. All sensors have the same initial energy. Table 2 important. The value of threshold parameter in Eq. (8) was set to
presents the network details. In order to tune the controllable para- te= 0.9. Unlike the previous protocols, the precise number of clusters
meters of ABC, different values were tested and the best ones were can be set in LEACH-SF. We use the optimal number of clusters
chosen. Parameter settings for ABC can be summarized in Table 3. according to Heinzelman et al. (2000). As mentioned above, we should
tune LEACH-SF via ABC algorithm, to prolong the defined network
Table 2 lifetime, once before it operates. However, the obtained simulation
Network details. results show that there is no major variance for the each controllable
parameter, optimized in the different runs of ABC in the different
Parameter Value
WSNs.
Initial energy 1J
Eelec 50 nJ/bit 6.2. Simulation results
εfs 100 pJ/bit/m2
εmp 0.013 pJ/bit/m4
In order to capture the performance of the compared clustering
Data packet size 4000 bit
Control packet size 50 bit techniques, Figs. 6 and 7 statistically qualify them for network lifetime
in WSN #1 and WSN #2. These figures depict the total number of alive

22
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Table 4
Maximum and standard deviation of intra-cluster distances (on average), in the each round.

WSN # LEACH LEACH-DT LEACH-ERE LEACH-FL ASLPR LEACH-SF

Max STD Max STD Max STD Max STD Max STD Max STD

1 49 11.8 55.2 14.8 50.5 12 44.2 10.6 37.4 9.3 24.6 8.2
2 53.2 11.5 56.5 13.7 52.4 11.5 42.6 11.3 35.4 10.1 26.2 8.4
3 50.5 11 53.1 14.2 54 12.3 43.9 10.8 36.3 10 25.9 9.1
4 49.5 10.8 52.4 13.3 49.5 10.9 42.9 11 34.8 9.6 23.2 8
5 56.3 12.4 55.8 14.7 52 12.1 47.4 12.4 40.1 11 27.3 9.3
6 50.4 12.3 54.9 15.3 50.4 11.7 46.6 11.4 38.2 9.9 26.9 8.4
7 51.8 11.6 53.8 15 57.3 12.5 48 12.5 38.6 9.5 23.9 8.8
8 53.4 12.4 55.5 13.7 54.3 11.9 46.2 10.1 41.3 10.4 27.5 10.2
9 52.9 11.5 56 15.2 54.9 12.4 46.3 9.9 35.3 10.1 23.4 8.3
10 48.5 10.9 53.7 13.8 50.4 11.9 44.7 10.5 36.6 9.7 25.3 9.1
Average 51.6 11.6 54.7 14.4 52.6 12 45.3 11 37.4 10 25.4 8.8

Table 5
Network lifetime in FND and HND.

WSN # LEACH LEACH-DT LEACH-ERE LEACH-FL ASLPR LEACH-SF

FND HND FND HND FND HND FND HND FND HND FND HND

1 616 819 811 994 863 1147 1219 1304 1332 1372 1367 1437
2 640 816 837 1000 871 1176 1226 1326 1372 1384 1424 1452
3 620 806 819 1004 868 1158 1231 1320 1348 1377 1394 1442
4 647 830 846 1023 875 1182 1236 1332 1375 1386 1435 1449
5 597 806 802 989 857 1115 1197 1293 1312 1358 1360 1417
6 623 848 834 1010 879 1188 1210 1306 1338 1385 1389 1430
7 610 792 795 966 823 1117 1182 1285 1290 1378 1345 1362
8 632 836 829 1022 888 1202 1232 1320 1349 1412 1365 1435
9 680 827 855 1017 912 1215 1222 1367 1402 1476 1425 1458
10 636 825 844 1021 883 1189 1230 1385 1367 1440 1417 1456
Average 630.1 820.5 827.2 1004.6 871.9 1168.9 1218.5 1323.8 1348.5 1396.8 1392.1 1433.8

Table 6
Round history of dead nodes (on average) for 10 WSNs.

% Dead nodes LEACH LEACH-DT LEACH-ERE LEACH-FL ASLPR LEACH-SF

1 (FND) 630.1 827.2 871.9 1218.5 1348.5 1392.1


10 687.3 879.6 948.3 1272.3 1357.7 1407.5
20 734.7 911 1032.3 1291 1369.2 1413.2
30 776.4 953.3 1083.7 1307.7 1375.8 1420
40 790.1 975.9 1117 1316.7 1386.2 1427.4
50 (HND) 820.5 1004.6 1168.9 1323.8 1396.8 1433.8
60 834 1032.3 1196.2 1332.5 1400.1 1441.8
70 868.5 1064.2 1221.6 1340.2 1403.6 1450.3
80 893.1 1089.8 1280 1351.3 1406.3 1459
90 931 1163 1332.2 1360 1409 1466.7
100 (LND) 983.4 1265.2 1384.9 1368.1 1411.3 1472.2

Table 7
Total number of data packets received in sink, until the network lifetime.

WSN # LEACH LEACH-DT LEACH-ERE LEACH-FL ASLPR LEACH-SF

FND HND FND HND FND HND FND HND FND HND FND HND

1 61600 78239 81100 96187 86300 108938 121900 129481 133200 136633 136700 143274
2 64000 77893 83700 96583 87100 110918 122600 131537 137200 138153 142400 144786
3 62000 77910 81900 95789 86800 106397 123100 131032 134800 137120 139400 143902
4 64700 78329 84600 97328 87500 109380 123600 129890 137500 139222 143500 146290
5 59700 76771 80200 96020 85700 106936 119700 128379 131200 135550 136000 142029
6 62300 78709 83400 97355 87900 110849 121000 128364 133800 136489 138900 144987
7 61000 76989 79500 93459 82300 10478 118200 125490 129000 138028 134500 137523
8 63200 78280 82900 97271 88800 111294 123200 130488 134900 136890 136500 141034
9 68000 81289 85500 98178 91200 110679 122200 130829 140200 143967 142500 146092
10 63600 78378 84400 96250 88300 106874 123000 129380 136700 138339 141700 146783
Average 63010 78278.7 82720 96442 87190 99274.3 121850 129487 134850 138039.1 139210 143870

23
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

Table 8
CPU running time.

Phase LEACH LEACH-DT LEACH-ERE LEACH-FL ASLPR LEACH-SF

Online clustering (in milliseconds) 0.4 0.5 1.7 1.2 1.4 0.8
Offline rule-tuning (in minutes) N/A N/A N/A N/A 178 145

Fig. 8. Effect of the network dimension on FND for different clustering techniques.

Fig. 9. Effect of the number of nodes on FND for different clustering techniques.

Fig. 10. Effect of the sink location on FND for different clustering techniques.

sensor nodes versus rounds. Additionally, quantitative results are Moreover, comparison of the CPU running time of the clustering
included summarizing the maximum and STD of intra-cluster dis- procedure (online clustering) and the rule-tuning algorithm (offline
tances, on average in the each round (Table 4), the network lifetime in rule-tuning) on average for all WSNs can be summarized in Table 8.
terms of FND and HND (Table 5), the round history of dead nodes It can be concluded from Table 3 that LEACH-SF forms balanced
(Table 6), and the total data packets received in the sink before lifetime clusters. As seen, LEACH-SF performs the smallest maximum and STD
arrivals (Table 7). In these tables, the best values are given in bold. of intra-cluster distances as compared with the other approaches. Since

24
M. Shokouhifar, A. Jalali Engineering Applications of Artificial Intelligence 60 (2017) 16–25

the clusters are formed via the FCM algorithm in LEACH-SF, the Attea, B.A., Khalil, E.A., 2011. A new evolutionary based routing protocol for clustered
heterogeneous wireless sensor networks. Appl. Soft Comput. 12 (7), 1950–1957.
number of member nodes has not much different between the different Bezdek, J.C., 1981. Pattern Recognition With Fuzzy Objective Function Algorithms.
clusters. It is notable that the load of a CH node depends on the Plenum Press, New York.
Butun, I., Morgera, S.D., Sankar, R., 2014. A survey of intrusion detection systems in
number of member nodes in its cluster. Therefore, the little bit wireless sensor networks. IEEE Commun. Surv. Tutor. 16 (1), 266–282.
difference in the number of member nodes within the different clusters Gupta I., Riordan D., Sampalli S., 2005. Cluster-head election using fuzzy logic for
means that the load is properly distributed among all clusters. wireless sensor networks. In: Proceedings of the 3rd Annual Conference on
Communication Networks and Services Research. pp. 255–60.
Figs. 6 and 7 shows that LEACH-SF is more stable than the other Heinzelman W., Chandrakasan A., Balakrishnan H., 2000. Energy-efficient
protocols, because node deaths begin later and continue linearly until communication protocol for wireless microsensor networks. In: Proceedings of the
33rd International Conference on System Science, Hawaii, USA. pp. 1–10.
all sensor nodes die. Moreover, the results in Tables 4–7 clearly
Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H., 2002. An application-specific
illustrate the positive impact of the proposed routing protocol. protocol architecture for wireless microsensor networks. IEEE Trans. Wirel.
According to Table 5, the gain in stable region of LEACH-SF until Commun., 660–670.
Hussain, S., Matin, A.W., Islam, O., 2007a. Genetic algorithm for hierarchical wireless
FND is 121%, 68%, 60%, 14%, and 3%, as compared with LEACH, sensor networks. J. Netw. 2 (7), 87–97.
LEACH-DT, LEACH-ERE, LEACH-FL, and ASLPR, respectively. Hussain, S., Islam, O., Matin, A.W., 2007. Genetic algorithm for energy efficient clusters
In order to capture the performance of the compared protocols for in wireless sensor networks. In: Proceedings of the 4th International Conference on
Information Technology: New Generations, IEEE Computer Society, pp. 147–154.
different WSNs, three scenarios are given. In the first scenario, five Intanagonwiwat C., Govindan R., Estrin D., 2000. Directed diffusion: a scalable and
WSNs with different dimensions, each composed of 100 sensor nodes robust communication paradigm for sensor networks. In: Proceedings of ACM
MobiCom, Boston, USA. p. 56–67.
are applied. Fig. 8 illustrates the effect of dimensional variation on the Jia J., He Z., Kuang J., Mu Y., 2010. An energy consumption balanced clustering
FND network lifetime. As it was expected from the network commu- algorithm for wireless sensor network. In: Proceedings of IEEE conferences.
nication model in Eq. (15), the larger the topological area, less lifetime Kang, S.H., Nguyen, T., 2012. Distance based thresholds for cluster head selection in
wireless sensor networks. IEEE Commun. Lett. 16 (9), 1396–1399.
is obtained. The second scenario captures the FND versus different Karaboga, D., Basturk, B., 2007. A powerful and efficient algorithm for numerical
number of nodes in five WSNs of dimension 150 m×150 m. It can be function optimization: artificial bee colony (ABC) algorithm. J. Glob. Optim. 39 (3),
seen in Fig. 9 that the number of nodes does not have so much effect on 459–471.
Karaboga, D., Basturk, B., 2008. On the performance of artificial bee colony (ABC)
the network lifetime, because each additional sensor has own power algorithm. Appl. Soft Comput. 8 (1), 687–697.
supply component and can assist other nodes to distribute the loads of Kim J., Park S., Han Y., Chung T., 2008. CHEF: cluster head election mechanism using
fuzzy logic in wireless sensor networks. In: Proceeding of the 10th International
CHs. The location of sink was fixed at the center of each network in all Conference on Advanced Communication Technology, pp. 654-659.
above simulations. In the third scenario, the effect of sink location on Kuila, P., Jana, P.K., 2014. Energy efficient clustering and routing algorithms for wireless
the FND is evaluated. To achieve this purpose, sink is located at the sensor networks: particle swarm optimization approach. Eng. Appl. Artif. Intell. 33,
127–140.
center, inside, border, corner, and outside of the network in five WSNs, Lee, J.S., Cheng, W.L., 2012. Fuzzy-logic-based clustering approach for wireless sensor
each composed of 100 sensor nodes randomly deployed in a topological networks using energy predication. IEEE Sens. J. 12, 2891–2897.
Mamdani, E.H., Assilian, S., 1975. An experiment in linguistic synthesis with a fuzzy
area of dimension 150 m×150 m. The results in Fig. 10 clearly show
logic controller. Int. J. Man-Mach. Stud. 7, 1–13.
that the best performance is achieved when sink is located at the center Ming, L.Y., Wong, V.W.S., 2007. An energy-efficient multipath routing protocol for
of the network. The larger distance of sink from the network centroid wireless sensor networks. Int. J. Commun. Syst. 20 (7), 747–766.
Mudundi S., Ali H., 2007. A new robust genetic algorithm for dynamic cluster formation
results in larger average distance between CHs and sink, and conse- in wireless sensor networks. In: Proceedings of Wireless and Optical
quently, more energy consumption in overall. Communications, Montreal, Quebec, Canada.
Ran, G., Zhang, H., Gong, S., 2010. Improving on LEACH protocol of wireless sensor
networks using fuzzy logic. J. inf. Comput.. J. inf. Comput. Sci 7, 767–775.
7. Conclusion Ross, T.J. Fuzzy logic with engineering applications, second edition, 2004, John Wiely &
Sons Ltd, USA
Sabet, S., Shokouhifar, M., Farokhi, F., 2013. A discrete artificial bee colony for multiple
In this paper, we have proposed an energy-efficient cluster-based Knapsack problem. Int. J. Reason.-Based Intell. Syst. 5 (2), 88–95.
routing protocol (named LEACH-SF) to form balanced clusters and Sengupta, S., Das, S., Nasir, M.D., Panigrahi, B.K., 2013. Multi-objective node
prolong the network lifetime in WSNs. In LEACH-SF, balanced clusters deployment in WSNs: In search of an optimal trade-off among coverage, lifetime,
energy consumption, and connectivity. Eng. Appl. Artif. Intell. 26 (1), 405–416.
are formed via fuzzy c-means clustering algorithm, and then, an Sert, S.A., Bagci, H., Yazici, A., 2015. MOFCA: multi-objective fuzzy clustering algorithm
optimized Sugeno fuzzy system is applied to select the proper cluster for wireless sensor networks. Appl. Soft Comput. 30, 151–165.
heads. Local information of sensor nodes (the residual energy, the Shakshuki, E.M., Malik, H., 2009. Multi-agent-based clustering approach to wireless
sensor networks. Int. J. Wirel. Mob. Comput. 3 (3), 165–176.
distance from the sink and the distance from the cluster centroid) are Shokouhifar M., Farokhi F., 2010. An artificial bee colony optimization for feature subset
used as the fuzzy input variables of the Sugeno fuzzy model. Since selection using supervised fuzzy c-means algorithm. In: Proceedings of the
International Conference on Information Security and Artificial Intelligence (ISAI
tuning the fuzzy rules within the fuzzy system is the most important 2010). pp. 427-432.
issue and has a key role in the operation of LEACH-SF, an artificial bee Shokouhifar, M., Hassanzadeh, A., 2014. An energy efficient routing protocol in wireless
colony algorithm is utilized to optimize the Sugeno fuzzy rules. The sensor networks using genetic algorithm. Adv. Environ. Biol. 8 (21), 86–93.
Shokouhifar, M., Jalali, A., 2015. A new evolutionary based application specific routing
optimization procedure should be performed once before LEACH-SF protocol for clustered wireless sensor networks. AEU-Int. J. Electron. Commun. 69
operates. Simulation results show that LEACH-SF can efficiently form (1), 432–441.
Takagi, T., Sugeno, M., 1985. Fuzzy identification of systems and its applications to
balance clusters and maximize network lifetime. LEACH-SF outper-
modeling and control. IEEE Trans. Syst., Man, Cybern. 15 (1), 116–132.
forms the exiting classical and fuzzy-based clustering algorithms in Vlajic N., Xia D., 2006. Wireless sensor networks: to cluster or not to cluster. In:
terms of minimizing the intra-cluster distances, maximizing the net- Proceedings of the International Symposium on a World of Wireless, Mobile and
Multimedia Networks. pp. 258–268.
work lifetime, and maximizing the number of received data packets in Wang, S.S., Yan, K.Q., Wang, S.C., Liu, C.W., 2011. An integrated intrusion detection
the base station. The proposed clustering technique was designed for system for cluster-based wireless sensor networks. Expert Syst. Appl. 38 (12),
the networks with stationary sensor nodes. As a future work, it can be 15234–15243.
Xu Y., Govindan R., Estrin D., 2001. Geographical and energy aware routing: a recursive
extended for handling mobile sensor nodes. In LEACH-SF, cluster data dissemination protocol for wireless sensor networks. In: Technical Report
heads directly communicate with the base station. We plan to extend it UCLA/CSD-TR-01-0023, UCLA Computer Science Department.
Yick, J., Mukherjee, B., Ghosal, D., 2008. Wireless sensor network survey. Comput. Netw.
with multi-hop routing in order to cope with large topological areas. 52, 2292–2330.
Zadeh, L.A., 1965. Fuzzy sets. Inf. Control. 8, 338–353.
References Zahedi, Z.M., Akbari, R., Shokouhifar, M., Safaei, F., Jalali, A., 2016. Swarm intelligence
based fuzzy routing protocol for clustered wireless sensor networks. Expert Syst.
Appl. 55, 313–328.
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., 2002. Wireless sensor Zhang Q., Sun Z., Zhang F., 2014. A clustering routing protocol for wireless sensor
networks: a survey. Comput. Netw. 38 (4), 393–422. networks based on type-2 fuzzy logic and ACO. In Proceedings of the IEEE
Alrajeh, N.A., Khan, S., Shams, B., 2013. Intrusion detection systems in wireless sensor International Conference on Fuzzy Systems. pp. 1060–1067.
networks: a review. Int. J. Distrib. Sens. Netw. 9 (5), 1–7.

25

Вам также может понравиться