Computers, Materials & Continua DOI:10.32604/cmc.2022.029366 | |
Article |
Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability
1School of Artificial Intelligence, Beijing Technology and Business University, Beijing, 100048, China
2Beijing Laboratory for Intelligent Environmental Protection, Beijing, 100048, China
3Beijing Institute of Fashion Technology, Beijing, 100029, China
4University College Dublin, Dublin4, Ireland
*Corresponding Author: Xiaoyi Wang. Email: sdwangxy@163.com
Received: 01 March 2022; Accepted: 07 April 2022
Abstract: Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization algorithm to find the globally optimal deployment locations of heterogeneous nodes. Then, establish a shortcut to communicate with sink nodes through heterogeneous nodes. Besides, considering the practical deployment operation, we set the threshold of the mobile location of heterogeneous nodes, which greatly simplifies the deployment difficulty. Simulation results show that compared with traditional routing protocols, the proposed algorithm can make the network load more evenly, and effectively improve energy-utilization and the fault tolerance of the whole network, which can greatly improve the invulnerability of the wireless sensor networks.
Keywords: Wireless sensor networks; invulnerability; small world characteristic; heterogeneous node; deployment
Wireless sensor network (WSN) has been regarded as an important part of the Internet of Things (IoT), informatization, intelligence, and the Internet of Everything are closely related to it [1]. WSN comprises a massive number of arbitrarily placed sensor nodes that are linked wirelessly to monitor the physical parameters from the target region [2]. WSN are used in many fields because of their low cost and easy deployment [3]. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it [4]. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication [5]. Therefore, studying the invulnerability of wireless sensor networks has important theoretical value to solve the bottleneck of large-scale application of wireless sensor networks [6]. Network invulnerability measures the ability of the system to provide reliable services in a sustainable and stable manner [7].
Small world network has both short average path length and high clustering coefficient. In sensor networks, the small average path length means that nodes only need less hops and energy when transmitting data to sink nodes [8]. The large clustering coefficient means that the propagation range of local information in the network is relatively wide and the connection between local nodes is relatively close, which makes the data in the network redundant to a certain extent. Therefore, a larger clustering coefficient can improve the fault tolerance and prolong the life cycle of the network.
In wireless sensor networks, cluster heads consume more energy because they have to collect and forward the information perceived by nodes in the cluster. Cluster heads which close to sink nodes consume more energy because they undertake more forwarding tasks. In order to solve the problem of excessive and fast network energy consumption caused by unbalanced load, heterogeneous nodes are introduced which can communicate directly with sink nodes in the network, and the energy of the heterogeneous nodes can be supplemented. Heterogeneous sensor networks with small world characteristic are constructed by using the super link formed between heterogeneous nodes and sink as a shortcut. The addition of heterogeneous nodes and the construction of super links can balance the network load and enhance the invulnerability of the network.
In recent years, the small world characteristic has been widely concerned by researchers. The small world characteristic shows how everyone in the real world connects with others. Milgram conducted a series of mail delivery experiments in 1967 [9]. The experimental results show that there are about six intermediate transmissions on average before reaching the final receiver. This work quantifies the famous concept of “six degrees of separation” between any individual on earth for the first time.
In 1998, Watts and Strogatz propose a network model, which shows that rewiring several links in a regular ring grid graph (the end point of the rewiring link is randomly selected from the graph) can greatly reduce the average path length between any two nodes in the graph, while still maintaining a high degree of clustering in adjacent nodes [10]. In 2003, Helmy et al. introduce the idea of small world network into the research of wireless networks. They study the relationship between wireless sensor networks and small world networks, and build a wireless sensor network with small world characteristic by introducing logical links. The results show that the average path length between network nodes is greatly reduced by the method of random edging of links [11]. Fu enhances the invulnerability of wireless sensor networks and prolongs the network life through super lines and super nodes, which also uses the small world feature [12]. Jiang proposes a method to build a small world in wireless networks. Different from the previous deployment of wired lines as shortcuts, he uses a mobile router node called data mule. Data mule moves and transmits data between nodes without direct communication, and imitates shortcuts in the small world [13]. Guidoni proposes a tree method based on the concept of small world to design heterogeneous sensor networks. The proposed model introduces an adjustable search space to find heterogeneous sensors and create shortcuts between them. When a shortcut is added to create a connection topology between heterogeneous sensors, the data communication delay is significantly reduced [14]. Pandey introduces probability model to develop cognitive small world. The probability model introduced by the link takes advantage of the characteristics of the network and nodes, such as the number of hops and the geographical distance from the sensor node to the receiver. In addition, a new data transmission scheme is proposed, which uses the residual energy of sensor nodes to change the energy consumption of the link [15]. Sreejith models the sensor network as a small world network by introducing directional sensor nodes, so as to find a route with the smallest path length. This method can find a path with the least hops from the source node to the sink node, so as to transmit data in the shortest time and reduce the network energy consumption [16]. In Sun’s paper, a small-world network model is introduced for water quality sensor networks. The energy consumption of the relay nodes near the heterogeneous node is too much, so the energy threshold and non-uniform clustering are constructed to improve the lifecycle of the network. Simulation results show that, compared with the low-energy adaptive clustering hierarchy routing algorithm and the best sink location clustering heterogeneous network routing algorithm, the proposed improved routing model can effectively enhance the energy-utilization. The lifecycle of the network can be extended and the data transmission amount can be greatly increased [17]. In Wang’s paper, according to the event level and the node energy of the sensor networks, the nodes’ types are defined, which can help to determine the cluster node. Then, an event driven routing protocol (EDRP) is proposed, which considers the event information and the remaining energy of the whole network. EDRP can effectively prolong the life cycle and greatly increase the amount of data transmission of the network [18]. In Çavdar’s paper, they propose a novel approach for finding the optimal number of anchor nodes and an optimal placement strategy in a large-scale WSN, based on the output of Grey Wolf Optimization (GWO) and Particle Swarm Optimization (PSO) methods [19]. A large number of research results show that the introduction of small world characteristic into wireless sensor networks can not only effectively reduce the average path length of the network, but also significantly reduce the occurrence probability of isolated clusters in the network. It can greatly improve the overall coverage effect and life cycle of wireless sensor networks. To sum up, most of the previous studies adopt the strategy of random deployment of heterogeneous nodes, however it is obvious that random deployment is not the best. Therefore, for deploying heterogeneous nodes in wireless sensor networks to establish long-range connections, the core problem is how to deploy heterogeneous nodes to achieve global optimization. In order to solve these problems, a heterogeneous node deployment routing optimization algorithm is proposed based on small world characteristic. The algorithm combines the advantages of DEEC clustering algorithm and BAS optimization algorithm.
3 Construction of Heterogeneous Network Routing Algorithm
Heterogeneous nodes that can communicate directly with sink nodes are introduced in this paper. Super link which is between heterogeneous nodes and sink is as a shortcut to construct heterogeneous sensor networks with small world characteristic. In heterogeneous sensor networks, the location and number of heterogeneous nodes have a great impact on the performance of the network. In order to effectively reduce the energy consumption of the network and prolong the network life cycle, the primary task of the algorithm is to determine the number and location of heterogeneous nodes.
3.1 Transmission Mode of Super Link in Heterogeneous Network
Ordinary nodes are powered by mobile power, while heterogeneous nodes are powered by solar panels, which means, ordinary nodes have limited energy, while heterogeneous nodes can ignore energy consumption. The data transmission mode of super link in heterogeneous network is shown in Fig. 1. Heterogeneous node h and sink node directly transmit data through super link, while ordinary node vi transmits data to sink node or heterogeneous node through multi-hop.
3.2 Energy Consumption Model of Clustered Sensor Networks
In a wireless sensor network, sensor nodes are powered by mobile power, and the total energy of the whole network is limited. As shown in Fig. 2, 100 sensor nodes are deployed in the monitoring area, and the energy of the nodes is gradually consumed as time passed. The red star point in the figure is the cluster head node, and the circles are the ordinary nodes. After initial deployment, all nodes are blue with sufficient energy, as shown in Fig. 2a. As time passed, due to unbalanced energy consumption, some nodes consume energy very quickly, and their colors gradually change from blue to red, as shown in Fig. 2b. When nodes fail, they are represented in black, as shown in Fig. 2c and Fig. 2d. Therefore, it is very important to overcome the resource constraints and facilitate monitoring through an effective routing algorithm. Clustering wireless sensor networks can reduce the energy consumption and improve the response speed of the network. The introduction of heterogeneous nodes that can communicate directly with sink nodes and the construction of heterogeneous networks with small world characteristic can prolong the network life cycle and enhance the invulnerability of wireless sensor networks.
3.3 Heterogeneous Node Location Optimization Model
DEEC algorithm is a clustering algorithm to balance the energy of multi-level heterogeneous networks. Its main principle is to select the cluster head according to the ratio of the residual energy of each node to the average energy of the network. Nodes with high initial energy and residual energy are more likely to be selected as cluster heads than nodes with low energy, which can balance the energy and prolong the life cycle of the network [20].
In DEEC algorithm, the calculation method of the probability that a node in the network is selected as the cluster head is shown in Eq. (1).
Where
Due to the different initial energy and energy consumption of each node [21], the probability of becoming a cluster head is different. The relationship between the probability Pi of a node becoming a cluster head and the threshold
where G represents the set of nodes that have not been selected as cluster heads,
After the nodes are clustered by DEEC algorithm, the ordinary nodes transmit the data to the cluster head. The cluster head processes the received data centrally, which can not only reduce energy consumption, but also increase the amount of data transmission. The transmission of network nodes will change accordingly with different nodes selected as cluster heads, so as to make the energy consumption more balanced and enhance the invulnerability of the network.
Suppose that the initial position of heterogeneous nodes is h(uc,vc). After the nodes are clustered according to the DEEC algorithm, there are n cluster heads whose positions are vi (xi,yi), i = 1,2,…,N, and the location of the sink node is (xm,ym). Data transmitted by cluster heads can through multi-hop transmission or super link.
When the cluster head transmits data directly to the sink, the node vi finds the shortest transmission path to transmit the data to the sink node through the greedy algorithm, and sets the distance from the cluster head node vi to the sink node as dis. When the cluster head vi transmits data to the sink node through the super link, the node vi also finds the shortest transmission path from all neighbor cluster heads to the heterogeneous node h through the greedy algorithm, and sets the distance between the node vi and the heterogeneous node h as dih. When the data is transmitted to the heterogeneous node, the heterogeneous node transmits the data to the sink node through the super link.
The data transmission mode of the cluster heads is determined according to the transmission distance dih and dis. When dis ≥ dih, the cluster head transmits data to the sink node through the super link; When dis < dih, the cluster head transmits data directly to the sink node in multiple hops. For example, for cluster head v1, the distance to sink node through multi-hop transmission is less than that to heterogeneous node. Therefore, it directly transmits data to sink node through multi-hop, as shown in Fig. 3.
It is assumed that S cluster heads directly transmit data to sink node through multi-hop, and H cluster heads transmit data to sink node through super link, where, H + S = N. In wireless sensor networks with heterogeneous node, because the energy of heterogeneous node and sink node can be supplemented, the energy consumption of data transmission in the super link needn’t to be considered. Therefore, only the distance between cluster head nodes and heterogeneous node needs to be considered.
When H cluster heads transmit data to sink through the super link, label the relay cluster head nodes in the transmission path. It is assumed that there are l relay cluster heads with coordinates of (αn, βn), n = 1, 2, …, l, transmission distance is shown in Eq. (4).
Similarly, when S cluster heads directly transmit data to sink, label the relay cluster head nodes in the transmission path. It is assumed that the coordinates of j relay cluster head nodes are (γn,δn), n = 1, 2, …, j, transmission distance is shown in Eq. (5).
Finally, when the heterogeneous node h is at h (uc,vc), the total distance d of all cluster head nodes transmitting data to sink node is calculated. The calculation of d is shown in Eq. (6).
Because the initial location h (uc,vc) of heterogeneous nodes is random, we need to find a globally optimal heterogeneous node location, that is, to minimize the total distance d from all cluster head nodes to sink node.
After clustering by DEEC algorithm, BAS algorithm [22] is introduced. Heterogeneous node is individuals to be searched. The objective function to be optimized is
The optimization steps of the algorithm expressed by mathematical model are as follows:
(1) When heterogeneous node is in any position, the direction of progress is random. In dimension D, the heterogeneous node orientation is represented and normalized to the vector.
(2) The position of the left and right sides of the heterogeneous node (
(3) According to the objective function
In Eq. (9),
(4) The update rule for the front progress length δ of heterogeneous nodes and the distance d on both sides is as follows
In Eq. (10),
Because BAS algorithm has excellent convergence speed and low complexity. It is very suitable for the optimization of heterogeneous node positions.
The simplified deployment diagram is shown in Fig. 4. Heterogeneous node is deployed at the location in the diagram, and heterogeneous node form a super link with sink node (as shown in the bold solid line in the figure). During data transmission, the cluster head nodes which are near the heterogeneous node transmits data to the heterogeneous node (as shown in the dashed line), and then the heterogeneous node transmits data to sink through the super link. Besides, the nodes near sink transmits data to sink (as shown in the thin solid line in the figure).
Finally, the minimum value dmin of the total distance d of all cluster heads that transmitting data to sink node is found through BAS algorithm. At this time, the location h (uz, vz) of heterogeneous node is the optimized location. Because the nodes which are selected as cluster heads are different after each round of clustering, the optimal location of heterogeneous node will change accordingly. Therefore, it is necessary to introduce BAS algorithm once after each round of clustering to find the optimal location of heterogeneous node in a new round and deploy heterogeneous node. The above steps are repeated in each round of DEEC algorithm until the end. The program flow chart of ODHN routing algorithm is shown in Fig. 5.
3.4 Optimization Model of Heterogeneous Node Number
The cost should be considered when building heterogeneous sensor networks. The number of heterogeneous nodes can’t be too many, but must meet the network performance requirements. In order to solve this problem, BAS algorithm is introduced after each round of clustering to find the optimal deployment location of heterogeneous nodes, so as to realize the location updating of heterogeneous node. Different from traditional methods of building a small world by fixed multiple heterogeneous nodes in WSN, a heterogeneous network is proposed according to the ODHN algorithm. Therefore, only one heterogeneous node can achieve good results, which not only saves the cost, but also optimizes the network structure.
4 ODHN Algorithm for Setting Moving Threshold
The movement of heterogeneous node will consume a lot of energy. In practical applications, real-time deployment can’t be realized according to the optimal location of heterogeneous node after each round of clustering. Through experiments, the distribution of the optimal locations is concentrated in several regions. Most of the optimal positions are distributed in the area far from the sink node. This is because the area farther away from the sink node has more load, and heterogeneous node can be deployed there to balance the load. As shown in Fig. 6, the sink node is a red pentagram located at (50,50), and the optimal locations are small circular points, which are concentrated in the upper left and lower right regions. In this way, heterogeneous node can share part of the load in the network, make the network load more balanced, and greatly improve the transmission efficiency and life cycle.
Therefore, mobility threshold of heterogeneous node is set (ODHN-SMT algorithm). If the distance of the optimal locations is less than the threshold, the heterogeneous node will not move. On the contrary, heterogeneous node move to the optimal location of current round. As shown in Fig. 7, the distance between the heterogeneous node Y2 in the second round and the heterogeneous node Y1 in the first round is less than the threshold, so the heterogeneous node does not move. The position Y2 is equal to the position of Y1. The distance between Y3 and Y2 is greater than the threshold, so the heterogeneous node moves to the position Y3.
If the threshold is too large, the frequency of heterogeneous node movement will be reduced, which can reduce energy consumption. But it will reduce the accuracy of the heterogeneous node location. Therefore, it will reduce the transmission efficiency and life cycle of the network.
On the contrary, if the threshold is too small, the frequency of heterogeneous node movement will increase and the system energy consumption will increase. But the accuracy of heterogeneous node location will also improve. So, the transmission efficiency and life cycle of the network will be improved.
Therefore, it is necessary to comprehensively consider the overall deployment cost and the invulnerability of the network. It is necessary to set an appropriate threshold. We conducted many experiments. According to the regional range of the optimal location obtained from the experiments, we get the movement threshold as 60 m which is shown in Fig. 8. The threshold setting should ensure that heterogeneous node will be distributed in a better area. After many experiments, we conclude that the threshold should be set to 50% ∼ 60% of the length or width of the experimental area.
5 Simulation Results and Analysis
The ultimate goal of the algorithm is to improve the energy efficiency and prolong the life cycle of the network. In the simulation analysis, we compare the network in five aspects: the number of dead nodes (life cycle), the amount of data transmission, energy consumption, the number of cluster heads and load distribution.
We deploy 100 sensor nodes in the monitored area to simulate ODHN algorithm, ODHN-SMT algorithm and DEEC algorithm. Other conditions are set as follows.
1) The energy of ordinary nodes is limited. Sink node is located in the monitoring area, and the energy can be supplemented;
2) Each node has an independent ID number;
3) Each node has the ability to sense and transmit data.
The network simulation parameter settings are shown in Tab. 1.
The number of dead nodes can intuitively display the length of the network life cycle. As shown in Fig. 9, the node death speed of ODHN algorithm is much slower than that of DEEC algorithm. The death of all nodes of ODHN algorithm is at round 4602, while in DEEC algorithm is at round 2957. So, the life cycle of ODHN algorithm is 55.6% longer than that of DEEC algorithm. The performance of ODHN-SMT algorithm with a moving threshold of 60 m is almost the same as that of ODHN algorithm without a moving threshold, which is within an acceptable range.
The amount of data transmission determines the accuracy and application way of data analysis. A large amount of data transmission can make the realization of functions more effective. Fig. 10 shows the data transmission volume of ODHN algorithm and DEEC algorithm. 182749 bits is transmitted by ODHN algorithm, which is 1.62 times data transmission volume than that of DEEC algorithm (69653 bits). The transmission effect of ODHN-SMT algorithm is almost the same as that of ODHN algorithm.
The energy will gradually decrease over time until the nodes die. Reducing energy consumption can prolong the network life cycle. The comparison of energy consumption between ODHN algorithm and DEEC algorithm is shown in Fig. 11. The energy consumption of ODHN-SMT algorithm and ODHN algorithm is lower than DEEC algorithm by about 36.7%.
The cluster heads can not only aggregate the data of the member nodes, but also reduce the amount of data transmission and save energy consumption. Moreover, with the different selection of cluster heads, the transmission paths of these nodes will change accordingly, so that the energy is consumed evenly to improve the survival time of nodes. Therefore, the generation of cluster heads is of great significance. The comparison of the number of cluster heads produced by the ODHN algorithm, ODHN-SMT algorithm and DEEC algorithm is shown in Fig. 12. The number of cluster heads produced by the ODHN algorithm and ODHN-SMT algorithm is higher than that of the DEEC algorithm and the cluster heads have a longer survival time.
The load balanced degree is determined by the ratio of the number of member nodes in the cluster, the number of cluster heads and the total number of the sensor nodes. The more the number of cluster head nodes, the smaller the value of the balanced degree, which indicates that the network is more balanced. When the network load is balanced, the network operation efficiency is high, and the value of network load balanced degree is small and stable. When the network load is unbalanced, the operation efficiency decreases, and the value of network load balanced degree is large. As shown in Fig. 13, after the 2000 rounds of DEEC algorithm, the network load balanced degree began to soar, and after the 2600 rounds, the network completely failed. In ODHN algorithm and ODHN-SMT algorithm, after 3200 rounds, the network load balanced degree began to soar, and the network completely failed after the 4500 rounds. The essence of optimization scheme is to balance the network load, so as to improve the invulnerability of the network.
Nodes that close to the sink consume more energy because of more transmitting tasks. The cluster head node consumes too much energy because it needs to process and transmit the data uploaded by the member nodes. Because heterogeneous node is added, the cluster heads that near to the heterogeneous node can transmit data to heterogeneous node, and then the heterogeneous node transmit data to sink through super link. Therefore, the excessively fast energy consumption caused by unbalanced network load is solved.
100 sensor nodes are deployed in the monitoring area, as shown in Fig. 14. The red star in the figure is the cluster head node, the blue triangle is the sink node at the coordinates (50,50), the green star is the heterogeneous node at the coordinates (80,80) and the blue circle are the ordinary nodes with sufficient energy. It can be seen from Figs. 14a and 14b that the residual energy of the network is very different whether heterogeneous nodes are added or not.
As time passed, due to unbalanced energy consumption, some nodes consume energy more quickly, and their colors gradually change from blue to red. When the nodes die, they are represented in black.
The simulation results show that the network with heterogeneous node can balance the network load, and improve the connectivity between sensor nodes, which can greatly increase the life cycle of the network.
An optimal heterogeneous node deployment algorithm (ODHN algorithm) is proposed for clustering heterogeneous wireless sensor networks. By building a heterogeneous network model with small world characteristic, optimal deployment of heterogeneous nodes is studied, which can optimize the routing efficiency and communication efficiency of wireless sensor networks. In ODHN algorithm, cluster heads are selected in a probabilistic manner according to the ratio of the residual energy of each node to the average energy of the network. After each round of clustering, BAS algorithm is introduced to find the optimal deployment location of heterogeneous node, so as to realize the location update of heterogeneous nodes from the first round to the last round. However, in practical application, it is impossible to update the location of heterogeneous node at each round. Therefore, the heterogeneous node mobility threshold is defined, and an ODHN-SMT algorithm is proposed. The simulation results show that the algorithm can greatly prolong the life cycle and improve the invulnerability of the wireless sensor networks.
Funding Statement: This research was funded by the National Natural Science Foundation of China, No. 61802010; Hundred-Thousand-Ten Thousand Talents Project of Beijing No. 2020A28; National Social Science Fund of China, No.19BGL184; and Beijing Excellent Talent Training Support Project for Young Top-Notch Team No. 2018000026833TD01.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. A. Daniel, K. Baalamurugan, V. Ramalingam and K. Arjun, “Energy aware clustering with multihop routing algorithm for wireless sensor networks,” Intelligent Automation & Soft Computing, vol. 29, no. 1, pp. 233–246, 2021. [Google Scholar]
2. R. Punithavathi, C. Kurangi, S. P. Balamurugan, I. V. Pustokhina, D. A. Pustokhin et al., “Hybrid bwo-iaco algorithm for cluster based routing in wireless sensor networks,” Computers, Materials & Continua, vol. 69, no. 1, pp. 433–449, 2021. [Google Scholar]
3. S. R. Lahane and K. N. Jariwala, “Secured cross-layer cross-domain routing in dense wireless sensor network: A new hybrid based clustering approach,” International Journal of Intelligent Systems, vol. 36, no. 1, pp. 3789–3812, 2021. [Google Scholar]
4. H. Shahid, H. Ashraf, H. Javed, M. Humayun, N. Jhanjhi et al., “Energy optimised security against wormhole attack in iot-based wireless sensor networks,” Computers, Materials & Continua, vol. 68, no. 2, pp. 1967–1981, 2021. [Google Scholar]
5. S. Perumal, M. Tabassum, G. Narayana, S. Ponnan, C. Chakraborty et al., “Ann based novel approach to detect node failure in wireless sensor network,” Computers, Materials & Continua, vol. 69, no. 2, pp. 1447–1462, 2021. [Google Scholar]
6. W. F. Li and X. W. Fu, “Survey on invulnerability of wireless sensor networks,” Chinese Journal of Computer, vol. 38, no. 3, pp. 625–647, 2015. [Google Scholar]
7. Y. J. Tan, J. Wu, H. Z. Deng and D. Z. Zhu, “Summary of research on invulnerability of complex networks,” Systems Engineering, vol. 24, no. 10, pp. 1–5, 2006. [Google Scholar]
8. B. C. Gong, X. L. Wang and R. Shun, “Wireless sensor network routing protocol and its application,” Science Press, vol. 32, no. 21, pp. 89–113, 2017. [Google Scholar]
9. S. Milgram, “The small world problem,” Psychology Today, vol. 2, no. 1, pp. 60–67, 1967. [Google Scholar]
10. D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature, vol. 393, pp. 440–442, 1998. [Google Scholar]
11. A. Helmy, “Small worlds in wireless networks,” Communications Letters IEEE, vol. 7, no. 10, pp. 490–492, 2003. [Google Scholar]
12. X. Fu, W. Li and G. Fortino, “Empowering the invulnerability of wireless sensor networks through super wires and super nodes,” in Proc. the 13th IEEE/ACM Int. Symposium on Cluster, Cloud, and Grid Computing, Delft, Netherlands, pp. 561–568, 2013. [Google Scholar]
13. C. J. Jiang, C. Chen and J. W. Chang, “Construct small worlds in wireless networks using data mules,” in Proc. SUTC, Taiwan, China, pp. 28–35, 2008. [Google Scholar]
14. D. L. Guidoni, A. Boukerche and L. A. Villas, “A Tree-based approach to design heterogeneous sensor networks based on small world concepts,” in Proc. 2011 IEEE 36th Conf. on Local Computer Networks, Bonn, Germany, pp. 666–672, 2011. [Google Scholar]
15. O. J. Pandey and R. M. Hegde, “Low-latency and energy-balanced data transmission over cognitive small world WSN,” IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7719–7733, 2018. [Google Scholar]
16. V. Sreejith, P. Parikh and A. Goel, “An energy efficient routing protocol for small world WSN using directional antennas,” in Proc.TENCON, Kochi, India, pp. 1998–2003, 2019. [Google Scholar]
17. Q. Sun, G. X. Cheng and X. Y. Wang, “Energy efficient routing algorithm based on small world characteristics,” CMC-Computers Materials & Continua, vol. 69, no. 2, pp. 2749–2759, 2021. [Google Scholar]
18. X. Y. Wang, G. X. Cheng, Q. Sun, J. P. Xu, H. Y. Zhang et al., “An event-driven energy-efficient routing protocol for water quality sensor networks,” Wireless Networks, vol. 26, no. 8, pp. 5855–5866, 2020. [Google Scholar]
19. T. Çavdar, F. B. Günay, N. Ebrahimpour and M. T. Kakız, “An optimal anchor placement method for localization in large-scale wireless sensor networks,” Intelligent Automation & Soft Computing, vol. 31, no. 2, pp. 1197–1222, 2022. [Google Scholar]
20. Q. Li, Q. X. Zhu and M. W. Wang, “Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks,” Computer Communications, vol. 29, no. 12, pp. 2230–2237, 2006. [Google Scholar]
21. X. Wang and B. Dong, “Research on a reactive routing algorithm based on energy efficiency,” Journal of Northeast Normal University (Natural Science Edition), vol. 54, no. 3, pp. 68–72, 2017. [Google Scholar]
22. X. Jiang and S. Li, “BAS: Beetle antennae search algorithm for optimization problems,” International Journal of Robotics and Control, vol. 1, no. 13, pp. 1–3, 2017. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |