Next Article in Journal
Performance Evaluation of Power-Line Communication Systems for LIN-Bus Based Data Transmission
Next Article in Special Issue
Optimal Energy Beamforming to Minimize Transmit Power in a Multi-Antenna Wireless Powered Communication Network
Previous Article in Journal
Miniaturized Antipodal Vivaldi Antenna with Improved Bandwidth Using Exponential Strip Arms
Previous Article in Special Issue
Cache-Enabled Data Rate Maximization for Solar-Powered UAV Communication Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Clustering Protocol for Cognitive Radio Sensor Networks

School of Electrical and Computer Engineering, University of Ulsan, Ulsan 44610, Korea
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(1), 84; https://doi.org/10.3390/electronics10010084
Submission received: 23 November 2020 / Revised: 28 December 2020 / Accepted: 29 December 2020 / Published: 4 January 2021
(This article belongs to the Special Issue Wireless Network Protocols and Performance Evaluation)

Abstract

:
Wireless sensor networks are considered an integral part of the Internet of Things, which is the focus of research centers and governments around the world. Clustering mechanisms and cognitive radio, in turn, are considered promising wireless network technologies for network management and spectral efficiency, respectively. In this paper, we consider the flaws in the previously proposed network stability-aware clustering technique. In particular, we demonstrate that existing solutions do not operate properly based on the remaining energy and the quality of available common channels, even if their fusion is declared. In addition, security issues have not been sufficiently developed. We offer an approach to address these flaws. To improve protocol efficiency, the problem of parameter tuning is discussed, and a performance analysis of the proposed solution is provided as well.

1. Introduction

Integration of the Internet of Things and wireless sensor networks is paving the way toward optimized production processes, improved operational efficiency in enterprises, and rationalization and delivery of high-quality service. The latest intelligent manufacturing technologies are being developed and implemented around the world. The growth rates in the respective applications have already exceeded the wildest expectations. It is estimated that about 10 billion devices used in the industrial sector are connected to the Internet [1]. However, the rapid expansion of wireless technologies has brought many scientific and technical challenges for both academia and industry. An important and timely problem is the research and development of intelligent and efficient protocols that allow sensor networks to coexist with the existing wireless infrastructure while maintaining the performance required of Internet of Things (IoT) applications [2].
Technologies in cognitive radio (CR) are intended to solve the coexistence problem and improve the fault tolerance of wireless transmissions in a heavily congested environment. In a CR network, a node captures spectrum state information through interference measurements, and then searches for, and uses, the available spectrum resources so that different wireless devices can share the same frequency bands without causing problems for each other. There are two types of user in CR networks. Primary users (PUs) are the licensed users; secondary users (SUs) are allowed to share the licensed channels with PUs provided there is no harmful interference with the PUs. This approach resolves the tension between rapidly growing wireless traffic and spectrum scarcity [3]. Thus, Cognitive Radio Sensor Networks (CRSNs) are capable of meeting the stringent quality of service (QoS) requirements demanded from various IoT applications [4].
To effectively manage communications in a wide variety of distributed wireless systems, a clustering technique is usually used [5]. In accordance with the prescribed rules, neighboring network nodes are combined into groups called clusters. A cluster head is elected from among the cluster members. The cluster head is responsible for intra-cluster communications as well as inter-cluster communications. Clustering protocols are designed to improve the performance of network communications and ensure stable operation and scalability of the networks. Clustering is very important for CRSNs operating in a highly dynamic, unstable wireless environment due to PU activity. Besides monitoring the geographic proximity and the residual energy of the nodes, clustering protocols for CRSNs have to take into account the common licensed channels available to cluster members. This is called spectrum-aware clustering. To take advantage of clustering, we need to overcome a number of challenges due to dynamic changes in the available channels, the heterogeneous quality of heterogeneous channels, and so on. Thus, research and development of clustering protocols for CRSNs is an important and timely problem. The recent network stability-aware clustering (NSAC) protocol outperforms existing solutions. However, the failures of this protocol motivate us to investigate their causes and, thereby, improve the clustering protocols for CRSN.
The contributions of this paper are summarized as follows.
  • We point out critical flaws in the existing network stability-aware clustering technique. We point out that the previously used channel availability metrics are generally untenable. We develop the appropriate formalism to prove this;
  • We argue that the clustering procedure has to be revised;
  • We discuss how to fix the identified flaws. We offer alternative indicators for the selection of the cluster head. It is also suggested to limit the cluster size to a predetermined number. We present an analytical framework to calculate this number and examine the performance of our proposals. The performance analysis results are provided as well.
The rest of this paper is organized as follows: Section 2 introduces related works. Special attention is paid to a network stability-aware clustering protocol for CRSNs. A critical analysis of the existing NSAC technique is provided in Section 3. Section 4 presents an approach to cluster head selection and cluster formation along with the results of a numerical analysis to evaluate the performance of the proposed method. Finally, Section 5 concludes the paper.

2. Preliminaries

2.1. Related Works

Clustering is a fairly common technique for cognitive radio networks. Several recent studies have reported that the proper use of this technique can essentially improve the performance of QoS support mechanisms. For example, a Bayesian method for nonparametric channel clustering, which determines the QoS levels supported over the available licensed channels, was proposed [6]. The proposed method is based on an unsupervised clustering scheme and outperforms K-means and other baseline clustering algorithms.
A comprehensive survey of clustering methods for CRSNs was presented [5]. The clustering methods discussed are mainly based on the number of available channels. In addition, the authors of this paper noted that there are not enough clustering investigations to satisfy the particular requirements of CRSNs, such as limited battery power in the sensor nodes and heterogeneous licensed channels.
In [7], the authors modified a basic distributed clustering protocol for wireless sensor networks, named Low Energy Adaptive Clustering Hierarchy (LEACH) [8], and delivered a spectrum-aware extension of the LEACH protocol, named CogLEACH. The modified protocol utilizes the number of free channels as a weight in the probability of each sensor node becoming a cluster head. It was shown that CogLEACH is more efficient than the LEACH protocol. However, the issues of network topology and channel quality were not properly addressed.
In [9], the spectrum-aware clustering approach is based on joint representation of the network topology and spectrum availability in undirected bipartite graphs. To obtain spectrum-aware clusters, the authors offered to solve the problem of constructing bi-cliques of maximum size from the bipartite graphs. The protocol requires heavy computation and ignores the residual energy of the network nodes.
The weighted clustering metric introduced in [10] includes temporal–spatial correlation, confidence level, and residual energy. The authors use a very firm assumption that the Euclidean distance between any two nodes in the network is known and does not change. Moreover, the channel state was ignored.
Recently, the NSAC protocol was offered [11]. Unlike previous protocols, NSAC handles both power consumption and spectrum dynamics simultaneously. The enclosed simulation results demonstrate that NSAC essentially outperforms existent protocols. Let us consider NSAC in detail in the next subsection.

2.2. Network Stability-Aware Clustering Protocol

According to the system model [11], a set of licensed channels,   C , is opportunistically available to the CRSN, and | C | = m . A cognitive sensor (CS) may use a licensed channel if it is not used by PUs. PU activity on the ith channel is considered a random process with busy and idle states. The probability that the ith licensed channel is available to SUs is denoted by p i . Correspondingly, the probability that this channel is used by PUs is 1 p i . The following channel quality metric, Q i , is assigned to each channel i:
Q i = ( 1 + log ε p i ) M i
where M i is the average idle duration, and ε is a user-defined parameter.
It is important to note that the authors of NSAC claimed the following instructions regarding the choice of ε :
  • ε > 1 ;
  • If p i   is preferable, then select a big ε ;
  • If M i   is preferable, then select a small ε .
Channel quality metric (1) is used to calculate the weight of a network node in terms of spectrum availability. For this purpose, NSAC uses a graph-theoretic approach similar to the one in [12]. CS k actualizes the sets of its neighboring nodes, N k , and available channels, C k (i.e., C k is a subset of C ), and creates a bipartite graph ( N k , C k , L k ) , where C k and N k are independent sets of vertices, and L k is a set of edges. An edge, l   ϵ L k , connects vertex v N ϵ   N k to vertex v C ϵ   C k if channel v C is available to CS v N . The weight of edge l is defined as the quality of the corresponding channel, v C . Next, the maximum edge biclique ( N k , C k , L k ) is calculated. The weight of CS k in terms of spectrum availability is defined as follows:
W k , c = | C k | j ϵ N k Q j
We illustrate the calculation of W k , C in Figure 1. The indexes of available channels for each CS are given in square brackets.
The total weight of CS k is defined as
W k = μ   W k , c + ( 1 μ ) W k , e
where
W k , e = E k E k + j ϵ N k E j
in which μ is introduced as a balance factor between network stability and remaining energy, and E j designates the residual energy in CS j.
The CS with the largest total weight is marked as the cluster head. This node (e.g., CS k) and its neighbors, ( N k ), form a cluster and are excluded from further consideration. Other nodes update environmental information and repeat the process. Thus, a good candidate for the cluster head has enough energy and can use a set of lightly loaded channels.

3. Critical Analysis of NSAC

In this section, we argue that the NSAC protocol fails to meet the declared goals. Therefore, the protocol as currently presented is impractical for deployment in CRSNs.

3.1. Channel Quality Metric

Let us assume that for some channel i it is observed that M i >> M j ,   p i p j ,     j C ,   and   j i . The residual energy is the same for all CSs. Obviously, CS i is the best choice for cluster head. However, if we take
ε = ( 1 p i ) 2 > 1
then Q i = M i and Q i Q j   j . If we increase the power (making ε less), then the channel quality will get worse. In Figure 2, we plot the channel quality metric for the different values of p i , M i = 1 .
Note that the choice of small ε (keeping the requirement ε > 1 ) leads to an unlimited negative value of the channel quality metric for any fixed M i and p i ; i.e.,
lim ε 1 + Q i =
This contradicts the NSAC authors’ assertion regarding the choice of ε . To avoid an absurd situation, the following statement must be true:
Q i ( ε ) > 0
so, from (1), we get
p j > 1 ε     j C
The parameter ε is universal for all CSs. The rules for applying the clustering protocol are the same throughout the system. Hence, ε has to be small enough. In fact, it is difficult to maintain inequality (8) due to the high dynamics of the spectrum available to the CRSN and the geographic distribution of its nodes.
Assume a group of adjacent nodes uses the set of channels C 0 ,   C 0 C . These CSs exchange information directly, and define ε such that (8) is true; i.e.,
min j C 0 p j > 1 ε    
If parameter p i . of another channel (i.e., i C \ C 0 ) has a uniform distribution with CDF
U ( x ) = { 0 ,                                 x < a x a 1 a ,               a x < 1 1 ,                                 x 1    
where constant a < ε 1 , then condition (8) is violated for this channel with the following probability:
ε 1   a 1 a
Therefore, the probability of NSAC protocol failure is as follows:
1 ( 1 ε 1 1 a ) | C \ C 0 |
For example, if ε = 5 ,   a = 0.1 , | C \ C 0 | = 30 , then NSAC fails with a probability of 0.97 .
Next, we consider a big ε . Let us take channels i , j such that M i = M j ,   p j = k p i ,   1 < k < p i 1 . It is easy to see that Q i < Q j . However, for any small δ > 0   ε > 1 :
Q j Q i < δ
Really,
  Q j Q i = M i log ε k
Therefore, if
  ε > k M i δ
then the considered inequality is true. Thus, if ε is large enough, then p i becomes unimportant. This refutes the NSAC claims as well.
Parameter ε is intended to provide a preference between p i and M i . Let us provide the corresponding formalism.
Define set C p of channel pairs, as follows:
C p = { ( i , j )   |     i , j C ,   M i < M j ,     p i > p j }
We say that ε delivers the preference for   p i on set C p (i.e., the probability of channel availability is more important than the average idle duration) if Q i ( ε ) > Q j ( ε )     ( i , j ) C p .
The provided definition is equivalent to the following condition:
  log ε p i M i p j M j > M j M i
Therefore, we obtain
ε < p i M i p j M j M j M i
which can be rewritten in compact form as:
ε < δ ( i , j )
where
δ ( i , j ) = 1 p j   ( p i p j ) γ
γ = M i M i M j
Combining (8) and (19), we obtain a condition for the choice of ε in the situation when   p i is more important
1 min i C p i < ε < min ( i , j ) C p δ ( i , j )
Since γ > 0 , and since p i > p j , the inequality for the choice of ε is always compatible.
Similarly, to formalize the importance of M i , we define the following set:
C M = { ( i , j )   |     i , j C ,   M i > M j ,     p i < p j }
and obtain
ε > δ ( j , i ) ,     ( i , j ) C M
Combining (8) and (24), we obtain a condition for the choice of ε when   M i is preferable:
max { 1 min i C p i ; max ( i , j ) C M δ ( i , j ) } < ε
Thus, the initial single condition for the choice of ε is not sufficient for the correct functioning of the NSAC protocol.
In short,
  • NSAC does not provide the proper choice of parameter ε for the channel quality metric (1);
  • To use metric (1), NSAC needs to abandon some of the available licensed channels or implement a global mechanism for the dissemination of channel status information;
  • In general, metric (1) does not automatically provide a tradeoff between the probability of channel availability and the average idle duration in the sense defined above.

3.2. CS Weight

In NSAC, the CS weight, W k , has the dimension of time, because the first term, W k , c , in Formula (3) has the dimension of time, and the second term,   W k , e , is normalized and dimensionless. Therefore, the absolute value of W k is highly dependent on the unit of measurement for idle duration (seconds, milliseconds, years, etc.). In this situation, it is doubtful to get a balance between W k , e and W k , c . This is evidenced by the following fact. In simulation experiments in [1], the authors used balance factor μ as a normalization multiplier: μ is relatively small, 1 μ 1 . So, if W k , e gets an increment comparable to W k (if compatible), then the new total weight doubles, whereas if W k , c gets an increment of W k , the new weight increases very slightly.
Let us rewrite the residual energy metric in equivalent form:
W k , e = δ δ + 1
where
δ = E k j ϵ N k E j
Consider a simple case of homogeneous CSs, where each CS has the same residual energy, and all channels are isotropic, i.e., | C i | | C j | ,   Q i = Q j   i , j C . Only the set of neighbors, N k , changes. In this case, δ = | N k | 1 , and the weight of residual energy becomes
W k , e = 1 | N k | + 1
Clearly, we also have
W k , c = | C k |   Q 1   | N k |
Therefore, criterion (3) becomes
W k = μ   | C k |   Q 1 | N k |   + 1 μ | N k | + 1
Now, it is easy to see that the terms in sum (3) are not balanced. In Figure 3, we show μ   W k , c and (1 μ ) W k , e versus | N k | . In this figure, we have taken | C k |   Q 1 = 10 . By varying μ from 0.01 to 0.001, we get graphs of three linear functions reflecting the contribution of channel availability to the total weight (the blue lines). The red curve shows the corresponding contribution of residual energy. Here, we present one curve due to the negligible effect of parameter 1 μ .
We can see from Figure 3 that a multiplier is very poor at normalizing factors behind the total weight. Even in a simple case, we cannot guarantee the proper choice for μ . It depends on the dynamics of the system. Thus, the total weight calculation has to be revised.

3.3. Clustering Procedure

In the NSAC protocol, in each iteration, one CS with the highest weight is selected as the cluster head. All its neighbors become members of this cluster, regardless of their number. The absence of cluster size control can potentially lead to unsatisfactory quality of service for the cluster members (a high loss rate for internal cluster packets, long packet latency, etc.), and irrational involvement of licensed channels.
Let us consider the CSRN in Figure 4. We assume that the residual energy is the same for each CS. There are three homogeneous licensed channels that CSs are allowed to use. Using the NSAC protocol, we get
W k , c = 4 q
where q is the value of the channel quality metric. Additionally,
W i , c = 2 q ,   i { a , b , c , d }
All nodes form one cluster with CS k as cluster head. In addition, although there are three licensed channels available, only one is used by all SUs, which essentially reduces the QoS. Packet forwarding latency becomes longer due to the increased contention among the CSs.
Furthermore, it should be noted that NSAC, similar to other network protocols with selection of an intermediate node based on self-promotion, is vulnerable to Denial of Service attacks such as Black/Grey Holes. This type of attack is very popular in wireless networks [13,14,15,16,17]. In one scenario for this intrusion, a malicious node acts as a CS and broadcasts an enormous fake weight. As a result, the malicious node is selected as a cluster head for many nodes, and it then destroys the connections. An unlimited cluster size can potentially amplify the effect of this attack.

4. Proposition

On the basis of the conducted research, we can conclude that the NSAC protocol, in its present form, might fail to achieve its goals due to the identified critical flaws. In this section, we consider how to fix this. First, we suggest changing the metrics used to select the cluster header. Next, we modify the clustering procedure and calculate the cluster size. To substantiate our proposals, we use models based on continuous time Markov chains. Their use often requires simplifying assumptions. However, these models often provide a basis for adequate conclusions and valuable qualitative results. In particular, Markov process-based methods are generally used when the various performance metrics of wireless communication systems are calculated.

4.1. Metrics

First, to resolve the contradictions mentioned above, we propose revising metric (1). Let us consider PU activity on the channels in detail. A channel alternates between idle and busy. To describe the channel status, we use a continuous time, two-state Markov chain, as shown in Figure 5. Similar Markov chain models are usually used in the literature to describe PU activity [9,18].
This process spends an exponentially distributed amount of time with rate λ in the idle state before making a transition to the busy state. Accordingly, the time until a PU releases the channel is an exponential random variable with rate μ.
This is a well-known birth-death process described by a Kolmogorov equation [19]. The vectors of steady-state probabilities are as follows:
( p I d l e   ,     p B u s y ) = ( μ λ + μ ,           λ λ + μ )
Therefore, for the notation introduced above, we get
p i = μ λ + μ
and
M i = 1 λ
Note that changing μ can make significant changes to factor p i , but it has absolutely no effect on M i . At the same time, both p i and M i are decreasing by the interval λ > 0 , i.e.,
p i λ   < 0 ;   M i λ < 0     λ > 0
Moreover, there is a functional dependency between factors p i and M i :
p i = 1 1 + 1 μ M i
and the inverse dependency:
M i = p i μ ( 1 p i )
Thus, from a practical point of view, there is no reason to consider p i and M i as competing entities. If μ is a constant, then M i becomes a monotonically increasing function of p i . Since factor p i is more informative, in the sense that it reflects changes in both λ and μ , we suggest using it as a metric of channel quality, i.e.,
Q i p i
Next, we adopt a channel quality metric in order to be consistent with the residual energy metric:
W k , c = | C k | j ϵ N k Q j i ϵ N k k | C i | j ϵ N i Q j
Thus, Equation (3) is calculated taking into account (39) and (40).

4.2. Limited Cluster Size

Let us use queuing model M/M/1 to analyze the delay in CS packets. A similar approach was used in [20]. Let the cluster size be n. Cluster members’ packets form a Poisson process with rate n λ C S , where λ C S   is the contribution of one CS. A cluster head serves packets, including its own. Service times of packets are assumed to be independent, exponentially distributed, random variables with mean 1 / μ . The system’s measures of effectiveness are well-known [21]. The packet latency is as follows:
T C S ( n , μ , λ C S ) = 1 μ n λ C S ,     μ > n λ C S
Let t Q o S be a strict packet delay constraint specified by a QoS policy, i.e., it is required that
T C S t Q o S
Assume that λ C S is large enough:
λ C S > 1 n ( μ 1 t Q o S )
In this case, inequality (42) is violated. In order to meet the QoS requirements, the number of cluster members can be reduced. Let us define a novel cluster size ( n ^ ) as follows:
n ^ = n ( 1 σ ) ,     0 σ 1 1 n
where σ is the fraction by which the cluster size is reduced. Therefore, the packet latency becomes
T C S ( n ^ , μ , λ C S ) = 1 μ n ( 1 σ ) λ C S
In addition, let us consider the following relative difference:
Δ   =   T C S ( n , μ , λ C S ) T C S ( n , ^ μ , λ C S ) T C S ( n , μ , λ C S ) 100 % ,     n > n ^
We may rewrite this as
Δ   = σ ρ σ ρ + 1 ρ × 100 %
here, ρ is the utilization factor, i.e., it is the ratio of the rate at which cluster members generate packets to the rate at which the cluster head can handle this workload:
ρ = n   λ C S μ
As shown in Figure 6, QoS parameters can essentially be improved if the cluster size is reduced. Figure 6a shows the dependence of packet latency, T C S ( n ^ , μ , λ C S ) , on the fraction of the cluster reduction, σ , for different values of the initial cluster size, n. Here   λ C S = 1 ,   μ = 50 . The contribution of μ is shown in Figure 6b, where   λ C S = 1 ,   n = 20 . Figure 6c illustrates packet latency versus σ for various values of   λ C S . Here, n = 10 ,   μ = 33 . In Figure 6d, we plot the relative difference, Δ , as a function of the utilization factor, ρ , and σ .
At the same time, the number of clusters is positively correlated with the cluster size. The system overhead increases with the number of clusters. It makes sense to use the smallest appropriate number of clusters [22]. Therefore, the optimal cluster size is defined as follows:
n = arg max { k |   T C S ( k ) t Q o S }
Using the floor function, we obtain
n = 1 λ C S ( μ 1 t Q o S )
Depending on the network topology, the number of neighboring nodes may be less than n . From this point of view, Formula (50) determines the maximal cluster size that guarantees QoS. It is a step function, an example of which is shown in Figure 7, where   λ C S = 2 ,     μ = 21 .
Thus, unlike the NSAC protocol, we limit the cluster formation process to n cluster members. This allows for the required packet latency.
Please note that our proposition reduces the re-clustering frequency as well. To address this point, we use an approach offered in [23]. Let us consider a network with a topology described by complete graph K n . All n sensors share the same licensed channels. The NSAC protocol creates one cluster of size n. The cluster head lifetime is as follows:
T 0 = E B   n λ C S e p
where E B is the charge capacity of a CS battery, and e p is the energy consumption for transmitting one packet. In accordance with our proposition, the cluster size is defined by Formula (50), and the cluster head lifetime becomes
T 1 = E B   1 λ C S ( μ 1 t Q o S ) λ C S e p
For example, if   λ C S = 2 ,     μ = 11 ,     t Q o S = 1 , then n = 5 . Let E B = 6   J ,   e p = 0.01   J . The performance comparison of our approach and NSAC is shown in Figure 8.
Finally, note that the limited cluster size increases the passive resistance of networks to intrusions such as Black/Grey Holes.

5. Conclusions

Different from traditional clustering protocols, the recently proposed NSAC protocol considers both energy consumption and spectrum dynamics. It has been shown that that the proposed NSAC protocol clearly outperforms existing methods in the aspects of network stability and energy consumption. [11]. However, as we argued above, overall, NSAC fails to properly work. We proposed changing the channel quality metric and the method for calculating the weight of a CS. When we use the appropriate mathematical tools, we find there is no reason to consider the average idle duration and the probability of channel availability as competing entities. Therefore, we suggest using only the probability of channel availability as a metric of channel quality since this factor is more informative. The overall impact of the various channel states indicators on clustering protocol performance and reliability will be studied in future work.

Author Contributions

Conceptualization, V.S. and I.K.; methodology, V.S.; software, V.S.; validation, V.S. and I.K.; formal analysis, V.S.; investigation, V.S.; resources, V.S. and I.K.; data curation, V.S.; writing—original draft preparation, V.S.; writing—review and editing, V.S. and I.K.; visualization, V.S.; supervision, V.S. and I.K.; project administration, V.S. and I.K.; funding acquisition, V.S. and I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by a National Research Foundation of Korea (NRF) grant through the Korean Government (MSIT) under Grant NRF-2020R1I1A1A01065692.

Data Availability Statement

Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare they have no conflict of interest.

References

  1. Boubiche, D.; Pathan, A.; Lloret, J.; Zhou, H.; Hong, S.; Amin, S.; Feki, M. Advanced Industrial Wireless Sensor Networks and Intelligent IoT. IEEE Commun. Mag. 2018, 56, 14–15. [Google Scholar] [CrossRef]
  2. Chen, P.Y.; Cheng, S.M.; Hsu, H.Y. Analysis of information delivery dynamics in cognitive sensor networks using epidemic models. IEEE Internet Things J. 2018, 5, 2333–2342. [Google Scholar] [CrossRef] [Green Version]
  3. Liu, M.; Liu, L.; Song, H.; Hu, Y.; Yi, Y.; Gong, F. Signal Estimation in Underlay Cognitive Networks for Industrial Internet of Things. IEEE Trans. Industr. Inform. 2020, 16, 5478–5488. [Google Scholar] [CrossRef]
  4. Aslam, S.; Ansar-ul-Haq; Jang, J.W.; Lee, K.-G. Unified Channel Management for Cognitive Radio Sensor Networks Aided Internet of Things. Sensors 2018, 18, 2665. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Özger, M.; Alagoz, F.; Akan, O.B. Clustering in Multi-Channel Cognitive Radio Ad Hoc and Sensor Networks. IEEE Commun. Mag. 2018, 56, 156–162. [Google Scholar] [CrossRef]
  6. Ali, A.; Yaqoob, I.; Ahmed, E.; Imran, M.; Kwak, K.S.; Ahmad, A.; Hussain, S.A.; Ali, Z. Channel Clustering and QoS Level Identification Scheme for Multi-Channel Cognitive Radio Networks. IEEE Commun. Mag. 2018, 56, 164–171. [Google Scholar] [CrossRef] [Green Version]
  7. Eletreby, R.M.; Elsayed, H.M.; Khairy, M.M. CogLEACH: A spectrum aware clustering protocol for cognitive radio sensor networks. In Proceedings of the IEEE 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Oulu, Finland, 2–4 June 2014; pp. 179–184. [Google Scholar]
  8. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  9. Bradonjic, M.; Lazos, L. Graph-based criteria for spectrum-aware clustering in cognitive radio networks. Ad Hoc Netw. 2012, 10, 75–94. [Google Scholar] [CrossRef]
  10. Wang, T.; Guan, X.; Wan, X.; Shen, H.; Zhu, X. A Spectrum-Aware Clustering Algorithm Based on Weighted Clustering Metric in Cognitive Radio Sensor Networks. IEEE Access 2019, 7, 109555–109565. [Google Scholar] [CrossRef]
  11. Zheng, M.; Chen, S.; Liang, W.; Song, M. NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things. IEEE Internet Things J. 2019, 6, 5864–5865. [Google Scholar] [CrossRef]
  12. Liu, S.; Lazos, L.; Krunz, M. Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks. IEEE Trans. Mob. Comput. 2012, 11, 1436–1449. [Google Scholar] [CrossRef]
  13. Djahel, S.; Nait-abdesselam, F.; Zhang, Z. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutor. 2011, 13, 658–672. [Google Scholar] [CrossRef]
  14. Tsiota, A.; Xenakis, D.; Passas, N.; Merakos, L. On Jamming and Black Hole Attacks in Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 2019, 68, 10761–10774. [Google Scholar] [CrossRef]
  15. Jan, S.; Ahmed, S.; Shakhov, V.; Koo, I. Toward a Lightweight Intrusion Detection System for the Internet of Things. IEEE Access 2019, 7, 42450–42471. [Google Scholar] [CrossRef]
  16. Gurung, S.; Chauhan, S. Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 2017, 25, 975–988. [Google Scholar] [CrossRef]
  17. Rathee, G.; Ahmad, F.; Kerrache, C.A.; Azad, M.A. A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks. Electronics 2019, 8, 1299. [Google Scholar] [CrossRef] [Green Version]
  18. Hossain, M.; Xie, J. Third Eye: Context-Aware Detection for Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 214–228. [Google Scholar] [CrossRef]
  19. Ibe, O. Markov Processes for Stochastic Modeling, 2nd ed.; Elsevier: Oxford, UK, 2013; p. 90. [Google Scholar]
  20. Zou, J.; Huang, L.; Gao, X.; Xiong, H. Joint Pricing and Decision-Making for Heterogeneous User Demand in Cognitive Radio Networks. IEEE Trans. Cybern. 2019, 49, 3873–3886. [Google Scholar] [CrossRef] [PubMed]
  21. Gross, D.; Shortle, J.; Thompson, J.; Harris, C. Fundamentals of Queueing Theory, 4th ed.; Wiley: Hoboken, NJ, USA, 2008; p. 62. [Google Scholar]
  22. Xie, N.; Ou-Yang, L.; Liu, A. Spectrum Sharing in mmWave Cellular Networks Using Clustering Algorithms. IEEE/ACM Trans. Netw. 2020, 28, 1378–1390. [Google Scholar] [CrossRef]
  23. Shakhov, V.; Koo, I. Depletion-of-Battery Attack: Specificity, Modelling and Analysis. Sensors 2018, 18, 1849. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. An example of calculations for the spectrum-aware weight of cognitive sensor (CS) k: (a) a four-node fragment of the Cognitive Radio Sensor Network (CRSN) topology; (b) the bipartite graph for CS k; and (c) the maximum edge biclique and weight of CS k in terms of spectrum availability.
Figure 1. An example of calculations for the spectrum-aware weight of cognitive sensor (CS) k: (a) a four-node fragment of the Cognitive Radio Sensor Network (CRSN) topology; (b) the bipartite graph for CS k; and (c) the maximum edge biclique and weight of CS k in terms of spectrum availability.
Electronics 10 00084 g001
Figure 2. Channel quality metric behaviors.
Figure 2. Channel quality metric behaviors.
Electronics 10 00084 g002
Figure 3. The behavior of total weight components.
Figure 3. The behavior of total weight components.
Electronics 10 00084 g003
Figure 4. An example of irrational involvement of licensed channels.
Figure 4. An example of irrational involvement of licensed channels.
Electronics 10 00084 g004
Figure 5. Markov model for a licensed channel’s status.
Figure 5. Markov model for a licensed channel’s status.
Electronics 10 00084 g005
Figure 6. Packet latency versus cluster size reduction: (a) the impact of the initial cluster size; (b) the impact of cluster head performance; (c) the impact of traffic intensity from one cluster node; and (d) a 3D plot of the relative difference.
Figure 6. Packet latency versus cluster size reduction: (a) the impact of the initial cluster size; (b) the impact of cluster head performance; (c) the impact of traffic intensity from one cluster node; and (d) a 3D plot of the relative difference.
Electronics 10 00084 g006
Figure 7. The cluster size’s allowed limit versus the packet latency defined by the quality of service (QoS) policy.
Figure 7. The cluster size’s allowed limit versus the packet latency defined by the quality of service (QoS) policy.
Electronics 10 00084 g007
Figure 8. The performance comparison of the proposed method and network stability-aware clustering (NSAC).
Figure 8. The performance comparison of the proposed method and network stability-aware clustering (NSAC).
Electronics 10 00084 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shakhov, V.; Koo, I. An Efficient Clustering Protocol for Cognitive Radio Sensor Networks. Electronics 2021, 10, 84. https://doi.org/10.3390/electronics10010084

AMA Style

Shakhov V, Koo I. An Efficient Clustering Protocol for Cognitive Radio Sensor Networks. Electronics. 2021; 10(1):84. https://doi.org/10.3390/electronics10010084

Chicago/Turabian Style

Shakhov, Vladimir, and Insoo Koo. 2021. "An Efficient Clustering Protocol for Cognitive Radio Sensor Networks" Electronics 10, no. 1: 84. https://doi.org/10.3390/electronics10010084

APA Style

Shakhov, V., & Koo, I. (2021). An Efficient Clustering Protocol for Cognitive Radio Sensor Networks. Electronics, 10(1), 84. https://doi.org/10.3390/electronics10010084

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop