Next Article in Journal
Performance Characterization of a Hybrid Satellite-Terrestrial System with Co-Channel Interference over Generalized Fading Channels
Next Article in Special Issue
A Novel Petri Nets-Based Modeling Method for the Interaction between the Sensor and the Geographic Environment in Emerging Sensor Networks
Previous Article in Journal
SensoTube: A Scalable Hardware Design Architecture for Wireless Sensors and Actuators Networks Nodes in the Agricultural Domain
Previous Article in Special Issue
Maximum Data Collection Rate Routing Protocol Based on Topology Control for Rechargeable Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

CoDA: Collaborative Data Aggregation in Emerging Sensor Networks Using Bio-Level Voronoi Diagrams

1
School of Engineering, Sun Yat-Sen University, Guangzhou 510006, China
2
Research Institute of Sun Yat-Sen University in Shenzhen, Shenzhen 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(8), 1235; https://doi.org/10.3390/s16081235
Submission received: 2 June 2016 / Revised: 13 July 2016 / Accepted: 26 July 2016 / Published: 5 August 2016
(This article belongs to the Special Issue Topology Control in Emerging Sensor Networks)

Abstract

:
To implement minimum power consumption of the link, cluster heads adopt the multi-hop manner for inter-cluster communication so as to forward the aggregation data to the relay nodes. This paper proposes a collaborative data aggregation in emerging sensor networks using a bio-level Voronoi diagram, which is an energy-efficient data aggregation protocol that integrates topology control, Multiple Access Control (MAC) and routing. The sensor nodes situated in the lower level of the diagram are responsible for listening and gathering data, and should be organized by optimal clustering node. In the inter-cluster communication stage, a particle swarm optimization algorithm is addressed to seek optimal transmission path which could simultaneously achieve the minimization of the maximum next hop distance between two nodes in the routing path and the minimization of the maximum hop count, so the minimization of whole network energy consumption is realized. The results of theoretical analysis and simulation results show that energy efficiency and synchronization accuracy of the proposed algorithm can be much better than with traditional routing protocols, and the energy consumption of nodes in the whole network can be more balanced.

1. Introduction

With the development of the Internet of Things (IoT) industry, the application scope and complexity of emerging sensor networks (ESNs) have reached unprecedented heights. Against the background of the IoT, ESNs are highly dependent on a huge and complex network, which brings great reliability risks and presents many new problems and challenges to research on topology control in wireless sensor networks [1]. By deploying massive numbers of sensor nodes in the monitoring region, ESNs can collect the information of perceived objects effectively and deliver the fusion solution to the end user through wireless communication. Most applications of ESNs are focused on the field of military reconnaissance [2], environmental monitoring [3] and disaster relief [4], control and command in autonomous vehicles and robots [5], etc. However, the static sensor nodes are usually equipped with low processing and limited power capabilities, and often communicate over unreliable, short-range radio links. Since the communication range of sensor nodes is limited, they often are arranged in a self-organized manner and adopt hop-by-hop communication to exchange data. The prominent characteristics in the target monitoring applications of ESNs includes: many-to-one communication, the sensor nodes with greater density, and limited resources. Thus any communication protocol should strive for the timeliness and reliability of data transmission [5]. Among the factors that affect the performance of wireless sensor networks, topology control is one of the key problems [6]. If there is no topology control in wireless sensor networks, there will be the following problems [7]:
  • Each node communicates with the maximum transmission power, and the limited node energy will be consumed quickly, thus reducing the lifetime of network.
  • Large communication radius can increase the signal interference between nodes, which will affect the communication quality and reduce the network throughput.
  • A lot of redundant edges exist in the generated network topology and result in network topology information redundancy. Large and complex routing calculation will bring about a waste of valuable computing resources.
  • Non-uniform sparse link between nodes will impact on the network connectivity, reliability and survivability, especially in military application, which will directly affect the network security.
How to optimize the network topology, enhance the adaptability and robustness of the network topology, and provide a good topology support for the upper layer communication protocol is an important issue in the research of topology control and optimization. The existing literature shows that there are many constraints and challenges in the topology control of wireless sensor networks:
  • Nodes’ dispersion [8]. In the face of different network applications, the nodes are distributed in two ways: predetermined and random dispersion. For the former, the data transmission can be carried out along a pre-designed path. For the latter, the distribution of nodes is not uniform and it is necessary to carry out reasonable clustering to ensure the network connectivity and energy efficiency.
  • Energy consumption [9]. The lifetime of a network node depends on its battery life, and the communication and computation of the energy reserve form is very important. Because a node failure will change the topology, it may lead to the failure of the original algorithm.
  • Heterogeneous nodes [10,11]. In many studies, it is usually assumed that the nodes are isomorphic, but in the face of different applications, the roles and capabilities of nodes may be different, which will lead to the emergence of many new problems in topology control.
  • Tolerance [12]. The fault tolerance mechanism in the topology control is necessary, which can ensure the function of the network at the time some nodes out of action; for instance, lack of energy, physical damage or environmental interference.
  • Scalability [13,14]. Large numbers of nodes are distributed in a sensing area, hence the design of a topology control scheme must be adapted to large-scale wireless sensor networks.
  • Connectivity [15]. The connectivity of the network is constrained by the topology changes, node failure and random distribution of nodes.
  • Coverage [16]. Due to the limitation of the communication radius of the sensor nodes, the area coverage is an important problem in the topology control of wireless sensor networks, especially for the mobile WSNs.
  • Data fusion [17,18]. Considering the redundancy of the data collected by monitoring nodes, data fusion can be used to reduce the energy consumption by means of decease the packets being transmitted. Besides, it can also improve data accuracy. Thus the topology design should can provides an essential support for data fusion.
  • Quality of service [19,20]. In some applications, the perception of the data should be issued within a certain time interval. Otherwise the data will be invalid. Especially for some important information, the reliability of data transmission is also very important, and the topology control algorithm should be designed to meet the requirement for different quality of service.
By using a reasonable topology control method, the system can work under a stable state for a long time and to improve the efficiency of data fusion. Therefore, it is needed to design a data aggregation protocol to integrate topology control, MAC and routing efficiently. Meanwhile, the communication path between neighbor nodes should be optimized to prolong the lifetime of network.
On the basis of existing research, a collaborative data aggregation in emerging sensor networks using a bio-level Voronoi diagram (CoDA) is proposed. The main idea is that all nodes in the network are distributed in the bio-level Voronoi diagram. The sensor nodes situated in the lower level of the diagram are responsible for listening and gathering data, and should be organized by some optimal clustering method. In each cluster, a cluster head is selected for gathering the data from its members and sending to the sink. In the upper level of the diagram, the relay nodes are deployed and constructed as the backbone network for forwarding data of all sensors to the sink node, in which the region covered by these nodes is relatively large and cluster heads adopt the manner of multi-hop for inter cluster communication so as to realize the integration of intra cluster data transmission to the backbone node. In the stage of inter cluster communication, a particle swarm optimization algorithm is addressed to seek optimal transmission path which could simultaneously reach the minimization of the maximum next hop distance between two nodes in the routing path and the minimization of the maximum hop count, so the minimization of whole network energy consumption was realized. Considering the time synchronization problem in multi-hop transmission mode, this paper proposes a multi-hop precision time synchronization model, which can achieve the balance between the synchronization accuracy and energy consumption.
The specific contributions of this paper include:
  • A literature survey about various existing energy saving protocols and topology control approaches in ESNs, and analyze their advantages and disadvantages.
  • An effective bio-level Voronoi diagram model based on Voronoi-cluster and relay nodes for ESNs is proposed.
  • A collaborative data aggregation in emerging sensor networks using bio-level Voronoi diagram is proposed, which is an energy-efficient data aggregation protocol and integrates topology control, MAC and routing.
  • Performance analysis of the proposed algorithm and an evaluation of the algorithm with respect to other traditional routing protocols.
The rest of this paper is outlined as follows. In Section 2 an overview of related works are presented. In Section 3, a collaborative data aggregation model using a bio-level Voronoi diagram is introduced with the presence of inhomogeneous time delays affecting the different hops. The multi-hop transmission mechanism and a multi-hop precision time synchronization model are presented in Section 4. In Section 5, the performance and features of the proposed algorithm are analyzed. Finally, conclusions are presented in Section 6.

2. Related Works

The research on ESNs includes many aspects, such as system survival time, routing selection and data fusion mechanism. Among them, how to reduce energy consumption is one of the key issues in ESN design, which directly determines the working lifespan of the network. Research shows that the communication between nodes is the main factor of the energy consumption in wireless sensor networks (WSNs), and some experts have put forward routing protocols with low energy consumption. The structure of self-organized sensor node clusters is proved to be a reasonable and effective mode to meet the need for sensors’ distributed deployment, which can save energy and optimize the topology of WSNs [21], however, the reasonable distribution of cluster heads can make the network energy consumption more stable and the energy distribution more uniform. In the early clustering protocol LEACH [22], it was proposed to select a node as cluster head in a rotation way for each node, so that the nodes can be elected as cluster heads as much as possible. This way makes the sensor nodes can be self-organized by an adaptive way. However, the problem is that the imbalance in energy consumption of the network is inevitable, and residual energy of the nodes is not taken into consideration of the cluster heads’ selection.
Subsequently, the cluster head selection algorithm is continuously optimized. In HEED [23], cluster head rotation and topology reconstruction were carried out in the whole network for a preset time period. In EDCR [24], Gamwarige et al. presented that the calculation of the energy threshold is adopted dynamically to trigger the cluster head rotation process. Although the rotation strategy can balance the network energy consumption, excessive alternation will influence the stabilization of the nodes’ organization and lead to heavy interruption of the transmission.
In [25], an improvement scheme was proposed based for traditional LEACH by using multiple conditions to determine the cluster head’s selection, which can reduce the energy consumption during the stage of cluster’s formation, and increase the efficiency of packet transmission. LEACH-V was proposed for resolving the problem of energy imbalance between the nodes and low utilization rate of the whole network [26]. The residual energy and the average energy of the network were considered during the process of calculating the threshold for cluster head’s selection. Also, a Voronoi diagram was used to restrict the situation of the cluster heads.
A two levels-weighted clustering algorithm (TL-WCA) was proposed for optimizing the routing path [27]. The network is divided into several clusters based on the improved competition mechanism. Then, the elected cluster head uses greedy algorithm to find the shortest path principle and then form a chain. Next, the nodes with more than the average energy in the chain and close to the sink are selected as the cluster head, and then execute the data fusion. In [28], the possible redundancy of cluster heads was analyzed, and a clustering routing algorithm based on cluster head redundancy was proposed to apply in industrial wireless sensor networks. When the energy of the cluster head was insufficient, the redundant cluster heads can be switched to the work state. For the isolated nodes that cannot communicate with any cluster head directly, the multi-hop routing mechanism based on a probabilistic model was used for data forwarding.
In [29], an analytical model for cluster head rotation was designed, which built a contention scheme for cluster head selection to remove the energy consumption in cluster head rotation. An EEHC algorithm for multi level energy heterogeneous network was proposed in [30], where the nodes with larger weights were more likely to become cluster heads. The main purpose of ESNs is that the sensors monitor the environment constantly and transmit the monitoring data to the cluster head, then forward the aggregation data to the sink through the cooperation of other nodes. From the point of view of data forwarding between nodes, multi-hop routing usually demonstrate more energy efficient than single hop routing, and it can avoid the energy-hole problem [31,32].
In [33], an equal cluster-based multi-hop routing (EMR) was proposed. The cluster head candidates for EMR were selected by their communication range and energy reserves. In addition, the communication between the cluster heads adopted a multi-hop manner and it is dominated by a weight indicating the energy-reserves and the distance among them. In [34], an energy-efficient clustering multi-hop routing (EECMHR) algorithm was proposed for resolving the problem of unbalanced energy consumption in traditional clustering routing. An average residual energy factor was introduced, i.e., the percentage of the cluster-head among other nodes was updated according to the ratio of each node’s residual energy and average residual energy within the cluster at the end of last round.
Wang et al. proposed an energy cost optimization model for the nodes deployed in Poisson distribution in wireless sensor networks [35]. Considering that multi-hop routing consumes less energy than single-hop routing, the relationships among the nodes’ density of Poisson distribution, optimal number of clusters and power consumption for multi-hop routing was examined. In [36], a clustering hierarchy arithmetic based on time delay and a multi-hop routing mechanism (CHTD-M) were presented. The algorithm makes the equally distributed cluster-heads of the network construct a routing tree, and it reduces the number of cluster head nodes connected directly with the base station in communication through the multi-hop transmission way.

3. System Model

Due to the diversity of the ESNs environment, topology control should be designed according to the characteristics of particular applications and take into account the state of sensor nodes. Also, there are some problems which affect the network performance, i.e., the network connectivity, coverage, reliability, robustness and fault-tolerant, as follows:
(1)
The model is too ideal to consider many uncertain factors in practical application, which cannot meet the requirements of dynamic sensors distribution.
(2)
Lack of effective measurement of the dynamic and self-adaptive network topology.
(3)
Topology control mechanism or method should be designed in aspects of tolerance, high reliability and strong survivability.
This section will demonstrate a topology control model based on the Voronoi diagram, which can optimize the cluster structure and deploy the relay nodes reasonably.

3.1. Definition and Properties of Voronoi Cells

Definition 1. 
Given a set of n points S = { p 1 , p 2 , , p n } in the field, the Voronoi diagram can be constructed by drawing the perpendicular bisector of line segment of each pair. Those bisector line segments form the boundaries of Voronoi cells are called Voronoi edges, and it can be defined as:
V ( p i ) = j i { p | d ( p , p i ) < d ( p , p j ) } ,    i = 1 , 2 , , n
where d(p,pi) denotes the Euclidean distance between points p and pi, and the area V(pi) is said to be the Voronoi cell of pi. Obviously, the Euclidian distance from the point in the region of V(pi) will be shorter than the points outside.
Voronoi graphs have many interesting and surprising mathematical properties [37,38], such as influence region, lateral adjacency, liner behavior, largest empty circle, local dynamic characteristics, etc. These characteristics all provide a powerful tool to solve problems in spatial analysis, geography science, computer science and mathematics [39,40]. Among them, there are three main properties:
(1)
Each Voronoi node is the intersection of the three Voronoi edges. If any node in the graph make a circle, which goes through the Voronoi edges corresponding to all the vertices (three or more), cannot incorporate any other vertex. The circle with the largest radius is called the maximum empty circle.
(2)
For Voronoi polygons, Euler’s Regulation demonstrates that no more than six adjacent space targets can be influenced while a vertex is being deleted or added. This feature is consistent with the practical characteristics of node deployment and network topology in wireless sensor networks.
(3)
For the points a , b V , the edge ab is a Delaunay edge if there is a circle through a and b so that all other points of V lie outside the circle. The collection of Delaunay edges defines a plane geometric graph D(V) known as the Delaunay triangulation of V. In the non-degenerate case, which excludes four or more points on a common circle, D(V) is indeed a triangulation. Even in degenerate cases, the faces of D(V) are convex polygons, and these can be further subdivided into triangles using additional edges.

3.2. The Model of Bio-Level Voronoi Diagram

In the whole wireless sensor network, all the nodes are managed in the form of clusters, and the communication between the cluster head and its member nodes is carried out by single hop mode. The Voronoi diagram of the lower layer is composed of all the cluster heads, which reflects the adjacent distance and distribution of each cluster head. In addition, the upper Voronoi diagram is generated by the relay nodes, which constitute the backbone of the network. For each relay node, it owes a larger coverage range and can communication with various cluster heads, which attempt to transmit packets in multi-hop wireless routing. Therefore, the path optimization strategy should be designed for minimize the expense during the packets forwarding. Figure 1 show the bio-level Voronoi model presented in this paper. Especially, the division of the relay nodes in the upper Voronoi diagram is not absolute, and the cluster heads on the edge of the upper Voronoi diagram has the equal opportunity to select the appropriate relay node as the destination.

3.3. Structure of Voronoi-Cluster

From the point of view of the Voronoi structure corresponding to the computational geometry, the plane is divided into N zones by the Voronoi diagram, which depends on the number of discrete points N. The basic Voronoi diagram describes the areas that are nearest to a set of given points, and these can be viewed as zones of control [41]. Therefore, dividing the space plane into several regions and designating the sensor nodes into corresponding Voronoi-clusters, can ensure that all nodes in a single cluster are evenly distributed and make the distance between the member nodes to its cluster head as short as possible.
In ESNs, the selection of cluster heads plays a very important role in ensuring energy efficiency, and the main objective of cluster head selection is to make the cluster distribution reasonable. On the one hand, it is necessary to make the member nodes evenly distributed, so the communication overhead can be maintained at a low level. On the other hand, considering the inter-cluster communication, the distance between cluster head nodes should be within a reasonable range so as to keep the multi-hop transmission losses small. Therefore, to reduce the transmission losses and ensure insignificant difference between the member nodes in the aspect of cluster-in energy consumption, the topological structure of the network should be optimized. Meanwhile, by reducing the energy consumption in the multi-hop transmission as much as possible, ultimately it can achieve the balance of energy consumption in the whole network, and improve the life cycle of the network.
Due to the vulnerability of nodes and the variability of network topology, once some sensors with poor performance are selected as cluster heads it will seriously affect the quality of service of the network. The reliability of cluster heads and the distribution of clusters become the keys to determine whether the network can run efficiently.
In order to analyze the influence of the number of cluster heads on the overall energy consumption of the network, the first order radio model can be used for measuring energy consumption between sensor nodes. Equation (2) represents the amount of energy consumption in transmitting a packet with l bits over d distance according to the first order radio model [42]:
E T x ( l , d ) = { l E e l e c + l ε f s d 2 , d < d 0 l E e l e c + l ε m p d 4 , d d 0
In which, E e l e c is the electronics energy, ε m p d 4 is the amplifier energy of the next CH, and d0 is a threshold. The energy consumption of b bits received by the receiver is E R X = l E e l e c .
The optimal number of clusters can be solved by calculating the energy consumed per round. It is assumed that the N sensor nodes are distributed evenly in the area of M × M , and the k cluster heads are generated by the election network. During the initial stage, the energy consumption depleted for message exchange between cluster head and its members can be calculated as:
E i n i t = k E C H b r o a d + ( N k ) E m e m b e r b r o a d                = k ( l 0 E e l e c + l 0 ε m p R 4 ) + ( N k ) l 0 E e l e c
In order to ensure that all nodes in the network receive the broadcast message, the radius R should be set as the maximum distance between any two nodes in the area. Under normal circumstances, R > d 0 and power amplifier consumption uses multipath fading channel model.
During the stage of the cluster formation, the k cluster heads receive the JOIN message sent by the respective member nodes and broadcasts the TDMA time slot table. Then, N k member nodes send JOIN messages and receive the TDMA slot table. Because the distance between the cluster heads is relatively small, the power amplifier power consumption is free space channel model. The length of the JOIN message and the TDMA time slot table are set as l J O I N and l T D M A respectively, the energy consumption of the network can be calculated by:
E f o r m = k ( E C H J O I N + E C H T D M A ) + ( N k ) ( E m e m b e r J O I N + E m e m b e r T D M A ) = k [ l J O I N E e l e c ( N k 1 ) ] + l T D M A E e l e c + l T D M A ε f s d t o C H 2 ] + ( N k ) [ l J O I N E e l e c + l T D M A E e l e c + l J O I N ε f s d t o C H 2 ]
In the stable operation stage, k cluster heads receive the data collected by their member nodes respectively, and then send the aggregation resolution to the relay nodes through multi-hop. The transmission range in inter-cluster communication is often not more than, then the consumption of energy can be represented as:
E c l u s t e r i n = k [ l 0 E e l e c + l 0 ε m p ( 2 * d t o C H ) 2 ] + k l 0 E e l e c
For the solution of d toCH 2 we can use the derivation in [43]:
E [ d t o C H 2 ] = M 2 π k
The total energy consumed in a round is:
E t o t a l = E i n i t + E f o r m + E c l u s t e r i n
Let the partial derivative of E t o t a l to k is equal to zero, then the optimal number of clusters can be given as:
k = N 2 π × ( 2 l T D M A + l J O I N ) ε f s ( N l 0 ) ε m p
Definition 2 (Voronoi-Cluster). 
It is assumed that each node knows its own geographical position, and the network is divided into Voronoi cells. The sensor nodes situated in each Voronoi cell can be organized in a single cluster, and they may determine the corresponding Voronoi cell by the geographical position information. The structure of a Voronoi-cluster is shown as Figure 2.
Corollary 1. 
In the lower level of Voronoi diagram, the distance between the cluster heads in different Voronoi-clusters has the same expected value.
Proof. 
Suppose that the Euclidean distance between node u and v is d ( u , v ) and the area of network is square of M × M . In order to ensure the full coverage of the network, the coverage radius of the cluster head can be defined as M k π r 2 M k π .
The distribution function of the node in the region can be expressed as:
ζ ( r ) = p { d ( u , v ) r }
In Equation (9), the pairwise node of i and j is selected randomly, and the distance of other pairwise nodes in the network follows the same distribution. For a single cluster, there are N / k nodes in the wireless sensor network, and the number of pairwise nodes is N k * ( N k 1 ) / 2 . Denote the distance of pair wise nodes is less than or equal to r as X ( N k , r ) , then X ( N k , r ) is random variables and the expected value E { N ( n , r ) } can be expressed as:
E { X ( N k , r ) } = ζ ( r ) * N k ( N k 1 ) / 2
The probability function of the distance between nodes u and v limited by r is defined as:
p ( ( u , v ) , r ) = { 1 , d ( u , v ) r 0 , d ( u , b ) > r
Suppose S N i is a sample of N nodes distributed in a wireless sensor network which are divided by Voronoi cells. For one node in a Voronoi region and X ( S N i , r ) denotes the number of nodes whose distance to other nodes is less than or equal to r in S N i , then:
X ( S N i , r ) = i = 1 N j = i + 1 N p ( ( i , j ) , r )
Suppose that the probability for each candidate instance is p ( S N i ), then the expectation value E = [ X ( S N i , r ) ] is:
E [ X ( S N i , r ) ] = i = 1 K j = i + 1 N ( X ( S N i , r ) * p ( S N i ) )
When K tends to infinity, if the total number of instances of the Voronoi cell in the wireless sensor network is brought into the formula, the expected value of the candidate cluster head distribution can be obtained. In the practical applications, it is very difficult to determine the value of p, which is related to the scale of the network and the density of nodes. When the cluster head selection is carried out in the Voronoi cell, the candidate cluster heads are subject to two-dimensional uniform distribution in the rectangular area. Because the selection of cluster head is taken place in a local area, it can ensure that the distribution of cluster heads is relatively uniform. □
Definition 3. 
Suppose G = ( V , E ) , and G being called as a simple undirected graph should satisfy the following conditions:
(1) 
G is a connected undirected graph without a self-circle.
(2) 
There is at least one side between any two nodes in G.
Graph G should be guaranteed with k-coverage and k-connectivity, and the single hop communication mode is adopted for cluster-in communication. In the existing clustering schemes, the nodes in the cluster can choose multi-hop or single-hop mode to transmit their gathering data to the cluster head. In order to balance the energy of the cluster head nodes often need to be replaced regularly, and the members may also change. If using multi-hop communication, each rotation for cluster head selection need rebuild the routing tree, which will result in high overhead and hard to maintain. Figure 3 shows the minimum communication radius for inter-cluster transmission.
To determine the minimum radius of inter-cluster transmission, the proposed Algorithm 1 is designed as following:
Algorithm 1. Determination of the minimum transmission radius for inters cluster communication.
Input: G = ( V , E ) , Vertex set of V ( S )
Output: minimum communication radius R max
1. R max = 0 ;
2.  Create the Voronoi diagram V (S) of the point set;
3.  for each node i S do
4.    Calculate Convex Hull C H ( S i ) ;
5. end for;
6. for each v V ( S )
7.  if v is located inside the rectangle, then
8.        Calculate the radius of circle with v as the center;
9.         R max = R v ;
10. end for;
11. for each edge e C H ( S )
12.    Find the point x of perpendicular and rectangular of e ;
13.    Calculate the distance d i s t ( x , e ) between x and the endpoints of e ;
14.    if d i s t ( x , e ) > R max then
15.         R max = d i s t ( x , e ) ;
16.    end if;
17. end for;

3.4. Formation of the Voronoi-Cluster

During the process of cluster formation, each cluster head records the information near the other cluster heads, including the remaining energy and the distance between nodes. The specific steps are described as follows:
Step 1:
There are N sensor nodes and a sink node which are deployed on 2-D plane, and k cluster heads are selected by sink according to the residual energy and geographical position;
Step 2:
The monitoring area is divided into k Voronoi cells in terms of the cluster heads’ position;
Step 3:
Cluster head CHi broadcasts the message, including its residual energy and ID, to adjacent nodes. The other cluster heads which can receive the information will restore to the memory and generate their own node list, including the residual energy of the source node, and the distance between them.
Step 4:
Next, find out the center node among all cluster heads in a single Voronoi cell. The center node sends Center Declare Message (CDM) to other cluster heads, and adds the nodes to the set by S e n d M e s s a g e ( I D u , C D M ) .
Step 5:
After working for some time, if R e s E n e r g y ( u ) < R e s E n e r g y ( v ) , v n o d e l i s t u , node u will give up the role of center node and notify all cluster heads of the set.
Step 6:
Calculate the distance between all adjacent cluster heads. If min { d ( u , v ) } < d 0 , combine the Voronoi cells with adjacent cluster heads and constitute the links for all member nodes.
Step 7:
All cluster heads send Active Dynamic Information (ADI) message to others periodically. Once a cluster head failures, other cluster heads can perceive quickly and then output the backup set. The partition of the link caused by cluster head failure can be fixed as far as possible, so as to reduce the loss of data and ensure the reliability of transmission.

3.5. Deployment of Relay Nodes

The research shows that the use of the multi-hop communication manner between sensor nodes can improve the energy efficiency and prolong the network lifetime, but it also brings some problems, for example, more delay for packet forwarding, and the formation of energy holes owing to the excessive overhead for the nodes close to the sink.
Therefore, the data aggregation mechanism proposed in this paper divides the nodes of the whole network into three levels, consisting of the cluster head, the member node and the relay nodes. The backbone network topology is formed by arranging a small amount of powerful relay nodes in the network, which can achieve inter cluster communication efficiently and reduce the delay of the data transmitted from the monitoring sensor to the sink effectively. Relay nodes usually are equipped with strong energy supply, communication capacity and computing power. In contrast with cluster heads, they possess much wider coverage and are responsible for data aggregation from adjacent clusters. Obviously, the bio-level structure of the node is adaptive for nodes’ management. Meanwhile, it has a good scalability.
For the lower level network, each cluster head can communicate with corresponding relay node by using multi hop mode. In the upper level topology, relay nodes consist of the backbone network. In order to reduce the communication cost, the number of relay nodes should be as less as possible under the premise of connectivity.
Definition 4. 
If s j satisfies the condition: N c ( i ) = { s i | d ( s i , s j ) R c , j i } , then s j is the neighbor node of s i , where R c denotes the transmission radius and s j is the neighbor node of s i .
Definition 5. 
If any point in a region is within the scope of coverage from any node in the set S , and satisfy that the points in S are connected, then, S can be defined as a connected coverage set.
Definition 6. 
If the minimal nodes can constitute a connected coverage set, then the set S = { s 1 , s 2 , , s n } can be defined as a minimum connected coverage set.
To determine the minimum communication radius of inters cluster communication, the proposed Algorithm 2 is designed as following:
Algorithm 2. Determination of the minimum communication radius of inters cluster communication.
Input: the sensor node set S = { s 1 , s 2 , , s N } , the number of cluster head k.
Output: the set of relay nodes RS.
1. Suppose all nodes in the set S as generic point, generates the corresponding k order Voronoi diagram V k ( S ) ;
2. The set of polygon for Voronoi diagram is denoted as V = { V k ( P L 1 , S ) , V k ( P L 2 , S ) , , V k ( P L M , S ) } , where V k ( P L 1 , S ) is the i-th polygon for V k ( S ) ;
3. R S = ;
4. while V do
5.    for each V k ( P L i , S ) V do
6.      if s j is the generic point of polygon V k ( P L i , S ) then
7.        record the occurrence time of node s j ;
8.      end if;
9.   end for;
10. Find out the s max which denotes the maximum number of occurrences of generic point;
11. The node s max can be added in the set of R S ;
12. V = V { V k ( P L i , S ) | s max P L i } ;
13. end while.

4. Multi-Hop Transmission and Synchronization

Since the energy consumption of data transmission increases exponentially with the distance between nodes, it is necessary to form a backbone network among the nodes in the cluster head and the hot spot area to realize the multi-hop communication so as to save energy consumption. In this paper, a particle swarm optimization algorithm is designed, which makes use of a multi-objective adaptive value function to find the optimal routing tree and satisfy the minimum energy consumption condition.

4.1. Fitness Function

In the case of the particle swarm optimization algorithm applied to the problem domain, the set of fitness functions is directly determined by the selection and removal of the transmission path. In order to minimize the energy consumption of the whole network, the design of the fitness function should satisfy the following two conditions: (1) The distance between the nodes of any hop should be as small as possible; (2) The maximum number of hops in the monitored area should be as small as possible. Therefore, the fitness function can be constructed as:
{ f i t n e s s = w 1 * M a x D i s t + w 2 * M a x H o p s + w 3 * D i r e c 0 w i 1 ,    w i = 1
where w 1 , w 2 and w 3 are the distance factor, the hop factor and the direction factor, respectively. M a x D i s t is the maximum communication distance between any adjacent two-hop nodes in the monitoring area, M a x H o p s is the maximum number of hops in all transmission paths, and D i r e c denotes the deviation angle between the source node and the relay node.

4.2. Initialization of Particle Swarm Optimization

The particle is defined as the different paths of the data transmission, and each particle’s dimension M is the same, which is corresponding to the number of cluster heads in a cell in the upper Voronoi diagram. The position of particle i is initialized of P o s ( i , σ ) randomly, P o s ( i , σ ) R a n d [ 0 , 1 ] and 1 σ M . The method of selecting the next hop node S d for node S S is as follows:
s d = I n d e x ( N e x t H o p ( s s ) , n )
where I n d e x ( N e x t H o p ( S S ) , n ) is the index function of returning the value of the nth cell in the set N e x t H o p ( S S ) . N e x t H o p ( S S ) denotes the candidate nodes for the next-hop, and the value of n is determined by the formula:
n = P o s ( i , σ ) × | N e x t H o p ( s s )
In the phase of data communication, the specific steps of using particle swarm optimization algorithm to select the optimal path are as follows:
Step 1:
Initialize the particle i per dimension with random velocity P o s ( i , σ ) ;
Step 2:
Mapping particle i routing tree;
Step 3:
According to the routing tree can obtain M a x D i s t and M a x H o p s ;
Step 4:
Calculate the fitness value f i t n e s s ( P o s ( i , σ ) of each particle;
Step 5:
Finding the individual extreme value P b e s t _ i and the global extreme value G l o b a l b e s t ;
Step 6:
Update the speed and position of the particles and make the corresponding adjustment;
Step 7:
Repeat Steps 2 to 6 until the threshold number of iterations;
Step 8:
According to the individual extreme value and the global extreme value in Step 5, the optimal path from node i to the relay node can be determined.

4.3. Precision Time Synchronization Model

In distributed systems, different nodes have their own local clock. Due to the frequency of different nodes of the crystal oscillator frequency deviation, as well as temperature changes and electromagnetic interference and so on, their time clock will gradually deviats even if at a certain moment all nodes can achieve time synchronization. In the multi-hop mode, time synchronization issues need more attention in order to ensure that the data collected by different clusters can be accurately reached by the relay nodes.
The precision clock synchronization protocol (PTP) is a high precision time synchronization protocol which is applied in industrial measurement and control system. In the process of network communication, its synchronization accuracy can still be controlled below the subtle level, which can effectively meet the requirements of real-time performance in distributed systems. In this paper, the basic mechanism of multi-hop time synchronization is designed based on the PTP protocol idea, and the time stamp exchange of PTP protocol in multi-hop mode is shown in Figure 4.
The horizontal axis represents the time interval, and demonstrates the process while the cluster head nodes forward data packets to a relay node in single hop or multi-hop manner. For the time synchronization in the first hop, C H k 1 is the slave node of C H k . However, the role of C H k 1 will become the master node for C H k 2 , and so on. Actually, there exists a clock offset between the master and slave nodes, and time delay happens in the process of packet switching. If the slave nodes and the master node can calculate the clock offset by exchanging time stamps, the time synchronization can be achieved.
The basic principle is that the slave node can calculate the clock offset θ through the exchange message from the master node, which contains the time stamp information, then estimate the actual time of the master node and adjust the local clock. The time stamp exchange process of PTP protocol is shown in Figure 4. As can be seen from the Figure 4, t 1 and t 2 are the time stamps of a master node and slave node during an interaction for time synchronization respectively. t 3 and t 4 represent the time stamps of a master node and slave node derived from the delay request message in the following process. Considering the asymmetry of the transmission delay between the master and slave nodes, a linear equation set is established for the PTP synchronous packet switching process:
{ t 2 = t 1 + θ + d m s t 4 = t 3 θ + d s m
Then:
θ = ( t 2 t 1 ) ( t 4 t 3 ) 2 + d s m d m s 2
Similarly, time synchronization in multiple rounds can be derived from the above function. While the time synchronization happens at the round t , the clock offset between the master node and slave node can be expressed as:
θ t = 1 t i = 1 t [ t 2 ( i ) t 1 ( i ) ] [ t 4 ( i ) t 3 ( i ) ] 2 + Δ d
where Δ d = d s m d m s 2 is a Gauss random variable with mean value of 0 and the variance of σ d 2 / 2 .
In the process of synchronous packet transmission, the discrete clock model is adopted to resolve the optimization problem in the case of the noise being doped [44,45]. Then, the time deviation of Receiver-Only synchronization mode can be given as:
{ θ ( t ) = θ ( C H k , Δ t ) θ ( C H k 1 , Δ t ) + α [ t ] τ [ t ] + v [ Δ t ] Δ ( t ) = { [ θ ( C H k , t ) θ ( C H k , t 1 ) ] , [ θ ( C H k 1 , t ) θ ( C H k 1 , t 1 ) ] }
Once monitoring the SYNC message, the slave node begins to calculate the length of the synchronization beacon, count the number of synchronized packets received and the measure the transmission delay. Furthermore, it can track the unstable clock drift of the master node to maintain the minimum offset state by Calman information gain. When the observation noise is σ v 2 , the gain formula is as follows:
G F ( C H k , C H k 1 ) = S Y N C ( C H k , C H k 1 ) × θ ( t ) σ v 2 + S Y N C ( C H k , C H k 1 ) × θ 2 ( t )
where S Y N C ( C H k , C H k 1 ) denotes the length of the synchronization beacon between C H k and C H k 1 in every time of synchronization.
When the synchronous data packet transmission is finished, the clock drift can be obtained by the formula:
θ ^ [ t ] = θ ^ [ t 1 ] + G F ( C H k , C H k 1 ) × θ [ Δ t ]
Therefore, the clock offset of the node can be tracked in a timely manner, and the synchronization error can be accurately calculated to obtain a relatively small clock offset.

5. Simulation Results

This study uses a simulation for performance evaluation of the proposed protocol, which uses the network simulation software NS2 [46] to set up the model and environment needed by the experiment. In the experiment, we assume that the sensor nodes are distributed in a square area, and the location of each sensor node is randomly generated. In order to reduce the error, we repeat the experiment 100 times.
Figure 5 shows the placement of relay nodes and their coverage area in CoDA, HCDD [47], and DDB [48], where there are 200 sensor nodes distributed in the field of four square sides with a length of 400 m.
By comparison, we can find that the number of relay nodes in CoDA is 14, which is a minimum feasible topology for relay nodes. Also, HCDD and DDB can achieve the coverage of the whole network by deploying more relay nodes, but the number of relay nodes is 16 and 17, respectively. Next, the number of relay nodes required by each algorithm is analyzed under different experimental scenarios. Two sets of experiments are carried out, where the communication radius of the sensor nodes is set to 50 m, and the communication radius of the relay node is 100 m. The number of sensor nodes deployed in the network increased from 200 to 800. The tests were repeated 10 times, respectively, and the average number of required relay nodes was obtained. Figure 6a,b show the number of relay nodes required for each algorithm with different node density, where the horizontal axis represents the number of sensor nodes and the vertical axis represents the number of relay nodes. In the first scenario of experiments, the density of the sensor is set to 0.25, and the density of the sensor is 0.5 in the second scenario. It can be seen that the number of relay nodes for each algorithm has a linear increasing trend under the condition that the distribution density of sensor nodes is constant.
As it can be seen from the Figure 6, the number of relay nodes demonstrates a linear increasing trend under the condition that the distribution density of sensor nodes being kept constantly. When the number of sensor nodes is equal, the number of relay nodes in HCDD is of the most, and the least number of relay nodes in CoDA can cover most of the area. According to the slope of the graph, with the increase of the number of sensor nodes, the gap between the numbers of relay nodes being arranged in the three algorithms is more and more large. By contrast between Figure 6a and 6b, we can observer that the greater the distribution density is, the fewer the number of relay nodes need to be arranged, which demonstrates the characteristic of geometric coverage for the relay node arrangement. Next, the number of relay nodes generated by different protocols is analyzed under the condition that the region size is fixed and the radius of the relay node is different. In two scenarios, the sensor nodes are evenly distributed in the 800 m × 800 m fixed area. The sensor node communication radius r = 50 m, the communication radius of relay node is 100 m and 200 m. As shown in Figure 7a,b, with the increase of the density of sensor nodes, the number of nodes generated is gradually increased, and the rate of growth slows down gradually in the fixed area. It can be observed that the distribution density is sensitive to the variation of R.
Coverage rate is usually regarded as an index for measuring the quality of service [49,50]. Here, We define it as a proportion of active nodes in the network at a certain time t , i.e., C o v ( t ) = 1 n b ( t ) N , where n b ( t ) is the number of nodes out of range of arbitrary relay nodes. In this test, the transmission radius of all relay nodes is fixed so as to analyze the relationship between the coverage rate and the number of relay nodes in different protocols.
Figure 8a shows the variation of coverage rate. It can be seen that the stability of DBB and CoDA is relatively better than HCDD, and they can maintain a high coverage rate. When the number of nodes is small, the coverage rate of HCDD can be maintained at a stable level. However, with the increase of the number of nodes, the coverage rate fluctuates greatly, which shows that the algorithm is greatly affected by the node’s transmission radius. Figure 8b shows the corresponding number of relay nodes. We can find that the deployment of relay nodes increases rapidly and thus achieves a higher coverage rate in DDB while the node density increases. In other words, the coverage rate of DDB is implemented by generating more relay nodes. It will cause too much redundancy of relay nodes and may result in serious communication interference. The number of relay nodes in CoDA is relatively stable at this point and indicates the reasonable deployment of relay nodes and topology control can realize the high coverage.
Further, we analyze the data collecting path length. Because those protocols are all applied with multi-hop transmission, we do not constrain the communication radius of relay nodes in the experiments. Then, the communication radius are adaptively adjusted in each protocol using the most energy-efficient way, and average hop count is statistically evaluated. As shown in Figure 9, we can see the increase of the number of nodes, the hop corresponding growth trends. While the node number reaches 1000, the path hops of HCDD has increased more than 10. As a consequence, this inevitably leads to high network latency and it can’t be better adaptive to the delay-sensitive applications with HCDD protocol. On the other hand, the basic hops of CoDA protocol for data acquisition can always keep within five hops. In conclusion, the cluster head can forward packets to the relay node via other cluster heads and this reduces the number of forwarding steps, which may benefit from the relay nodes of reasonable deployment, reasonable planning for the lower level Voronoi diagram, and the application of particle swarm optimization.
In order to analyze the equilibrium characteristics of the node average energy consumption, we deploy 200 nodes with unique identification numbers and analyze the average energy consumption of these nodes in 100 rounds [51,52]. The average energy consumption of nodes with different number of sensors is shown in Figure 10. From the result, we can see that the node’s energy consumption of CoDA is more balanced rather than the HCDD and DDB. This is because the CoDA can manage the nodes hierarchically via double Voronoi diagram. Meanwhile, the CoDA can determine the cluster heads via the optimal clustering method. As a result, the node average energy consumption remains at a lower level. At the same time, the cluster heads can also balance well the energy consumption of different cluster heads in multi-hop transmission mode through the optimized path forwarding to relay nodes, which can avoid the overloaded energy consumption.
The energy consumption of the each node is shown in Figure 11, and the energy consumption of the top 20 clusters is more comparable to the latter. The energy consumption in HCDD and CoDA is more smooth and lower than in DDB. The DDB protocol adopts the polling mode method to select cluster heads with same probability, and there may be a chance that a cluster head will die earlier and cause the hot-spot problem. The HCDD and CoDA algorithms in the cluster head selection are conditional and relatively stable. By searching for the solution for minimizing the maximum distance between adjacent nodes and the maximum number of hops simultaneously, CoDA obtains the optimal path for cluster heads to deal with inter-cluster communication. Therefore, it has a better effect on energy consumption.
Finally, the synchronization error and overhead of the CoDA and DDB protocol are analyzed. The time derivation is set as sending node broadcasts a message until it being receives by the destination node. Figure 12 shows the synchronization error comparison. Each error variable is independent and follows the Gauss distribution. In the early stage of synchronization, the synchronization error of the two protocols is not quite different. With the time elapse, it can be observed that CoDA demonstrate much better than DDB in aspect of synchronization error, and the variation range of error value is stable and narrow.
Figure 13 shows the comparison of cumulative synchronization error of different protocols. In the experiment, the synchronization of 4 hops is set up, and the simulation time is limited to 120 s. In the initial stage, DDB can obtain relatively better precise synchronization than CoDA. Generally, the differences of cumulative synchronization error between DDB and CoDA are not significant. With the passage of time, the cumulative synchronization error demonstrates an increasing trend.
As shown in Figure 14, the CoDA and DDB algorithms are compared to the synchronization overhead. Before the burst packet is sent, the RTS packet is 20 bytes, CTS is 14 bytes, the data frame is 2346 bytes. Besides, the reply message is a fixed length. Therefore, the effect of RTS/CTS on the convergence rate is very small. From the experimental results, it can be seen that the number of synchronous information packets of CoDA can be controlled at a lower level with the increase of the node. That is because the inter-cluster communication by multi-hop mechanism in CoDA can reduce a large number of overhead packets compared to DDB, which can reduce the power consumption of cluster heads. In addition, the number of synchronization messages is related to the number of nodes in the network. The number of nodes is more, the greater the synchronization overhead is. In general, the CoDA has the advantages of less accumulation error, high synchronization accuracy and good availability.

6. Conclusions

Topology control is a basic problem in wireless sensor networks, and it is also one of the important supporting technologies for large-scale applications. By means of reasonable topology control mechanism, the networks can work stably and effectively, thus extending their lifetime and reducing communication countermeasures. In this paper, a bio-level Voronoi diagram is proposed, which is a high energy efficiency data collection protocol that integrates topology control, MAC and routing. The research of this paper can provide a topology control mechanism and methods of network planning and dynamic maintenance. Also, it offer a powerful optimization mechanism and application example for research on variable, complex constraints and real-time requirements in large-scale and complex networks, therefore, our work has both a certain theoretical significance and practical application value.

Acknowledgments

This work was supported by Science and technology project of Guangdong Province under Grant No. 2013B010401012, Science and Technology Project of Shenzhen under Grant No. JCYJ20140424173418463, Special Funds for the Development of Strategic Emerging Industries in Guangdong Province under Grant No. 2012556036. The authors would like to thank the anonymous reviewers and the editor for the very instructive suggestions that led to the much improved quality of this paper.

Author Contributions

Chengpei Tang conceived and designed and performed the experiments; Nian Yang analyzed the data and contributed analysis tools; Chengpei Tang wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Melodia, T.; Chowdury, K.R.Y. Wireless multimedia sensor networks: A survey. IEEE Wirel. Commun. 2007, 14, 32–39. [Google Scholar] [CrossRef]
  2. Winkler, M.; Tuchs, K.-D.; Hughes, K.; Barclay, G. Theoretical and practical aspects of military wireless sensor networks. J. Telecommun. Inf. Technol. 2008, 2, 37–45. [Google Scholar]
  3. Holman, R.; Stanley, J.; Ozkan-Haller, T. Applying Video Sensor Networks to Nearshore Environment Monitoring. IEEE Pervasive Comput. 2003, 2, 14–21. [Google Scholar] [CrossRef]
  4. Cayirci, E.; Coplu, T. SENDROM: Sensor networks for disaster relief operations management. Wirel. Netw. 2007, 13, 409–423. [Google Scholar] [CrossRef]
  5. Mohamed, N.; Al-Jaroodi, J.; Jawhar, I. A Cost-Effective Design for Combining Sensing Robots and Fixed Sensors for Fault-Tolerant Linear Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2014, 20, 1–11. [Google Scholar] [CrossRef]
  6. Shaikh, R.A.; Jameel, H.; d’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.-J. Group-based trust management scheme for clusteredwireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2009, 20, 1698–1712. [Google Scholar] [CrossRef]
  7. Dandekar, D.R.; Deshmukh, P.R. Energy balancing multiple sink optimal deployment in multi-hop wireless sensor net-works. In Proceedings of the 3rd International Advance Computing Conference (IACC ’13), IEEE, Ghaziabad, India, 22−23 February 2013; pp. 408–412.
  8. Caillouet, C.; Pérennes, S.; Rivano, H. Framework for optimizing the capacity of wireless mesh networks. Comput. Commun. 2011, 34, 1645–1659. [Google Scholar] [CrossRef]
  9. Shih, K.-P.; Wang, S.-S.; Chen, H.-C.; Yang, P.-H. Collect: Collaborative event detection and tracking in wireless heterogeneous sensor networks. Comput. Commun. 2008, 31, 3124–3136. [Google Scholar] [CrossRef]
  10. Martina, V.; Garetto, M.; Leonardi, E. Capacity scaling of large wireless networks with heterogeneous clusters. Perform. Eval. 2010, 67, 1203–1218. [Google Scholar] [CrossRef]
  11. Haenggi, M.; Andrews, J.; Baccelli, F.; Dousse, O.; Franceschetti, M. Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J. Sel. Areas Commun. 2009, 27, 1029–1046. [Google Scholar] [CrossRef]
  12. Carli, R.; Chiuso, A.; Schenato, L.; Zampieri, S. Distributed Kalman filtering based on consensus strategies. IEEE J. Sel. Areas Commun. 2008, 26, 18–27. [Google Scholar] [CrossRef]
  13. Ingelrest, F.; Barrenetxea, G.; Schaefe, G.; Vetterli, M.; Couach, O.; Parlange, M. Sensor scope: Application-specific sensor network for environmental monitoring. ACM Trans. Sens. Netw. (TOSN) 2010, 6, 17–21. [Google Scholar]
  14. Kong, Z.; Yeh, E.M. Information dissemination in large-scale wireless networks with unreliable links. In Proceedings of the 4th Annual International Conference on Wireless Internet, Maui, HI, USA, 17–19 November 2014; pp. 321–329.
  15. Thai, M.T.; Zhang, N.; Tiwari, R.; Xu, X. On approximation algorithms of k-connected m-dominating sets in disk graphs. Theor. Comput. Sci. 2007, 385, 49–59. [Google Scholar] [CrossRef]
  16. Almahorg, K.A.; Naik, S.; Shen, X. Efficient localized protocols to compute connected dominating sets for Ad Hoc networks. In Proceedings of the IEEE Global Communications Conference (Globecom 2010), Miami, FL, USA, 6–10 December 2010; pp. 1–5.
  17. Ji, S.; He, J.; Pan, Y. Continuous data aggregation and capacity in probabilistic wireless sensor networks. J. Parallel Distrib. Comput. 2013, 73, 729–745. [Google Scholar] [CrossRef]
  18. Lee, U.; Magistretti, E.; Gerla, M.; Bellavista, P.; Corradi, A. Dissemination and harvesting of urban data using vehicular sensing platforms. IEEE Trans. Veh. Technol. 2009, 58, 882–901. [Google Scholar]
  19. Chen, L.; Wei, S. Throughput capacity of hybrid multi-channel wireless networks. AEU-Int. J. Electron. Commun. 2010, 64, 299–303. [Google Scholar] [CrossRef]
  20. Ramamurthi, V.; Reaz, A.; Ghosal, D. Channel, capacity, and flow assignment in wireless mesh networks. Comput. Netw. 2011, 55, 2241–2258. [Google Scholar] [CrossRef]
  21. Larsson, A.; Tsigas, P. A self-stabilizing (k,r)-clustering algorithm with multiple paths for wireless Ad-hoc networks. In Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, 20−24 June 2011; pp. 353–362.
  22. Heinzelman, W.R.; Chandrakasan, A.P.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  23. Younis, O.; Fahmy, S. HEED: A hybrid, energy-efficient, distributed clustering approach for Ad hoc sensor networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef]
  24. Gamwarige, S.; Kulasekere, E. An algorithm for energy driven cluster head rotation in a distributed wireless sensor network. In Proceedings of the International Conference on Information and Automation (ICIA2005), Colombo, Sri Lanka, 15–18 December 2005; pp. 354–359.
  25. Xu, J.; Guo, L.; Tai, D. The Algorithm of Threshold Model Based on LEACH. Microelectron. Comput. 2011, 28, 131–134. [Google Scholar]
  26. Chen, B.; Shi, Y. WSN Routing Protocol Based on Cluster Heads Selection in Regions. Comput. Eng. 2011, 37, 96–98. [Google Scholar]
  27. Zhang, P.; Jiang, Y.; Chen, L. Routing Protocol Based on Optimizing Choosing Two Levels Clusters for Wireless Sensor Network. Chin. J. Sens. Actuators 2011, 24, 447–451. [Google Scholar]
  28. Feng, D.; Li, G.; Quan, J.; Jin, J. Reliability of wireless sensor networks based on redundancy of cluster heads. J. Zhejiang Univ. (Eng. Sci.) 2009, 43, 849–854. [Google Scholar]
  29. Deng, H.; Li, L.; Huang, H.; Yuan, X.; Wang, Y. Energy Consumption Analysis and Improvement Strategy for Cluster-Head Rotation in Wireless Sensor Networks. J. Shanghai Jiaotong Univ. 2011, 45, 317–326. [Google Scholar]
  30. Dilip, K.; Trilok, C.A.; Patel, R.B. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Comput. Commun. 2009, 32, 662–667. [Google Scholar]
  31. Olariu, S.; Stojmenovic, I. Design guidelines for maximizing lifetime and avoiding energy holes in sensor networks with uniform distribution and uniform reporting. In Proceedings of IEEE INFOCOM, Barcelona, Spain, 23–29 April 2006; pp. 1–12.
  32. Sarikaya, Y.; Atalay, I.C.; Gurbuz, O. Estimating the channel capacity of multi-hop IEEE 802.11 wireless networks. Ad Hoc Netw. 2012, 10, 1058–1075. [Google Scholar] [CrossRef]
  33. Xu, J.; Bi, W.; Zhu, J.; Zhao, H. Design & Simulation of WSN Equal-cluster-based Multi-hop Routing Algorithm. J. Syst. Simul. 2011, 23, 992–997. [Google Scholar]
  34. Bi, X.; Guo, W.; Feng, W. Energy-efficient clustering multi-hop routing algorithm for wireless sensor networks. J. Circuits Syst. 2011, 16, 13–18. [Google Scholar]
  35. Wang, H.; Cheng, H. Energy Cost Optimization Model for Multi-hop Routing Protocol Based Clustering in Wireless Sensor Networks. J. Syst. Simul. 2014, 26, 1021–1025. [Google Scholar]
  36. Shang, F.; Ren, D. A Distributed Multi-Hop Routing Algorithm in Wireless Sensor Networks. Chin. J. Sens. Actuators 2012, 25, 529–535. [Google Scholar]
  37. Baccelli, F.; Gloaguen, C.; Zuyev, S. Superposition of planar voronoi tessellations. Commun. Stat. Stoch. Models. 2000, 16, 69–98. [Google Scholar] [CrossRef]
  38. Kim, K.; Lee, B.G. Kalp: A Kalman filter-based adaptive clock method with low pass prefiltering for packet networks use. IEEE Trans. Commun. 2000, 48, 1217–1225. [Google Scholar]
  39. Du, Q.; Wang, D. Anisotropic centroidal Voronoi tessellations and their applications. SIAM. J. Sci. Comput. 2005, 26, 737–761. [Google Scholar] [CrossRef]
  40. Du, Q.; Gunzburger, M. Grid generation and optimization based on centroidal Voronoi tessellations. Appl. Math. Comput. 2002, 133, 591–607. [Google Scholar] [CrossRef]
  41. Mayya, N.; Rajan, V.T. Voronoi diagrams of polygons: a framework for shape representation. J. Math. Imaging Vis. 1994, 4, 638–643. [Google Scholar]
  42. Wolf, S.; Merz, P. Evolutionary local search for the minimum energy broadcast problem. In Proceedings of the 8th European Conference, EvoCOP 2008, Naples, Italy, 26–28 March 2008; pp. 61–72.
  43. Rajesh, H.; Kulkarni, V.A. En-LEACH Routing Protocol for Wireless Sensor Network. Int. J. Eng. Res. Appl. 2012, 2, 2099–2102. [Google Scholar]
  44. Morteza, O.; Mohsen, S.; Hossein, M. Task allocation to actors in wireless sensor actor networks: An energy and time aware technique. Proced. Comput. Sci. 2011, 1, 484–490. [Google Scholar]
  45. Zeynali, M.; Khanli, L.M.; Mollanejad, A. TBRP: Novel Tree Based Routing Protocol in Wireless Sensor Network. Int. J. Grid Distrib. Comput. 2009, 2, 35–48. [Google Scholar]
  46. Balasangameshwara, J.; Raju, N. Performance-driven load balancing with primary backup approach for computational grids with low communication cost and replication cost. IEEE Trans. Comput. 2013, 62, 990–1003. [Google Scholar] [CrossRef]
  47. Lin, C.; Chou, P.; Chou, C. HCDD: Hierarchical cluster-based data dissemination in wireless sensor networks with mobile sink. In Proceedings of the 2006 international conference on Wireless communications and mobile computing, Vancouver, BC, Canada, 3–6 July 2006; pp. 1021–1025.
  48. Lu, J.L.; Valois, F. On the data dissemination in WSNs. In Proceedings of the IEEE WIMOB, White Plains, NY, USA, 8–10 October 2007; pp. 56–62.
  49. Zhao, J.; Zeng, J.C. A virtual centripetal force-based coverage-enhancing algorithm for wireless multimedia sensor networks. IEEE Sens. J. 2010, 10, 1328–1334. [Google Scholar]
  50. Zhu, C.; Zheng, C.; Shu, L.; Han, G. A survey on coverage and connectivity issues in wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 619–632. [Google Scholar] [CrossRef]
  51. Yao, Y.; Yang, L.T.; Xiong, N.N. Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing. IEEE Int. Things J. 2015, 2, 381–390. [Google Scholar] [CrossRef]
  52. Tang, C.; Shokla, S.K.; Modhawar, G.; Wang, Q. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks. Sensors 2016, 16, 261. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The model of a bio-level Voronoi diagram.
Figure 1. The model of a bio-level Voronoi diagram.
Sensors 16 01235 g001
Figure 2. Dividing the monitoring area into Voronoi-clusters.
Figure 2. Dividing the monitoring area into Voronoi-clusters.
Sensors 16 01235 g002
Figure 3. The minimum communication radius for inter-cluster transmission.
Figure 3. The minimum communication radius for inter-cluster transmission.
Sensors 16 01235 g003
Figure 4. Time stamp exchange of PTP in multi-hop mode.
Figure 4. Time stamp exchange of PTP in multi-hop mode.
Sensors 16 01235 g004
Figure 5. The placement of relay nodes in different protocols.
Figure 5. The placement of relay nodes in different protocols.
Sensors 16 01235 g005
Figure 6. Comparison of number of relay nodes in different distribution density.
Figure 6. Comparison of number of relay nodes in different distribution density.
Sensors 16 01235 g006
Figure 7. Comparison of number of relay nodes in different coverage radius.
Figure 7. Comparison of number of relay nodes in different coverage radius.
Sensors 16 01235 g007
Figure 8. Comparison of relationship between the coverage rate and the number of relay nodes.
Figure 8. Comparison of relationship between the coverage rate and the number of relay nodes.
Sensors 16 01235 g008
Figure 9. Comparison of average path length.
Figure 9. Comparison of average path length.
Sensors 16 01235 g009
Figure 10. Comparison of average energy consumption of sensor nodes.
Figure 10. Comparison of average energy consumption of sensor nodes.
Sensors 16 01235 g010
Figure 11. Comparison of energy consumed by each node.
Figure 11. Comparison of energy consumed by each node.
Sensors 16 01235 g011
Figure 12. Comparison of synchronization error.
Figure 12. Comparison of synchronization error.
Sensors 16 01235 g012
Figure 13. Comparison of the cumulative synchronization error.
Figure 13. Comparison of the cumulative synchronization error.
Sensors 16 01235 g013
Figure 14. Comparison of the synchronization overhead.
Figure 14. Comparison of the synchronization overhead.
Sensors 16 01235 g014

Share and Cite

MDPI and ACS Style

Tang, C.; Yang, N. CoDA: Collaborative Data Aggregation in Emerging Sensor Networks Using Bio-Level Voronoi Diagrams. Sensors 2016, 16, 1235. https://doi.org/10.3390/s16081235

AMA Style

Tang C, Yang N. CoDA: Collaborative Data Aggregation in Emerging Sensor Networks Using Bio-Level Voronoi Diagrams. Sensors. 2016; 16(8):1235. https://doi.org/10.3390/s16081235

Chicago/Turabian Style

Tang, Chengpei, and Nian Yang. 2016. "CoDA: Collaborative Data Aggregation in Emerging Sensor Networks Using Bio-Level Voronoi Diagrams" Sensors 16, no. 8: 1235. https://doi.org/10.3390/s16081235

APA Style

Tang, C., & Yang, N. (2016). CoDA: Collaborative Data Aggregation in Emerging Sensor Networks Using Bio-Level Voronoi Diagrams. Sensors, 16(8), 1235. https://doi.org/10.3390/s16081235

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop