Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
A Spatio-Temporal Feature Trajectory Clustering Algorithm Based on Deep Learning
Next Article in Special Issue
Algorithm for Increasing Network Lifetime in Wireless Sensor Networks Using Jumping and Mobile Sensor Nodes
Previous Article in Journal
Auction Mechanism-Based Sectored Fractional Frequency Reuse for Irregular Geometry Multicellular Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance

by
Trupti Mayee Behera
1,
Umesh Chandra Samal
1,
Sushanta Kumar Mohapatra
1,
Mohammad S. Khan
2,
Bhargav Appasani
1,
Nicu Bizon
3,4,5,* and
Phatiphat Thounthong
6,7
1
School of Electronics Engineering, KIIT University, Bhubaneswar 751024, Odisha, India
2
Department of Computer & Information Sciences, East Tennessee State University, Johnson City, TN 37614, USA
3
Faculty of Electronics, Communication and Computers, University of Pitesti, 110040 Pitesti, Romania
4
ICSI Energy, National Research and Development Institute for Cryogenic and Isotopic Technologies, 240050 Ramnicu Valcea, Romania
5
Doctoral School, Polytechnic University of Bucharest, 313 Splaiul Independentei, 060042 Bucharest, Romania
6
Renewable Energy Research Centre (RERC), Faculty of Technical Education, King Mongkut’s University of Technology North Bangkok, Bangkok 10800, Thailand
7
Group of Research in Electrical Engineering of Nancy (GREEN), University of Lorraine-GREEN, 54052 Nancy, France
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(15), 2282; https://doi.org/10.3390/electronics11152282
Submission received: 23 June 2022 / Revised: 15 July 2022 / Accepted: 19 July 2022 / Published: 22 July 2022

Abstract

:
Recent developments in low-power communication and signal processing technologies have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN environment, cluster formation and cluster head (CH) selection consume significant energy. Typically, the CH is chosen probabilistically, without considering the real-time factors such as the remaining energy, number of clusters, distance, location, and number of functional nodes to boost network lifetime. Based on the real-time issues, different strategies must be incorporated to design a generic protocol suited for applications such as environment and health monitoring, animal tracking, and home automation. Elementary protocols such as LEACH and centralized-LEACH are well proven, but gradually limitations evolved due to increasing desire and need for proper modification over time. Since the selection of CHs has always been an important criterion for clustered networks, this paper overviews the modifications in the threshold value of CH selection in the network. With the evolution of bio-inspired algorithms, the CH selection has also been enhanced considering the behavior of the network. This paper includes a brief description of LEACH-based and bio-inspired protocols, their pros and cons, assumptions, and the criteria of CH selection. Finally, the performance factors such as longevity, scalability, and packet delivery ratio of various protocols are compared and discussed.

1. Introduction

Wireless sensor networks (WSN) have acquired intensive popularity due to the wide range of applications in different fields. A recent emerging application is the Internet of Things (IoT), which allows the interconnection of different objects or devices through the world of the Internet [1,2]. About 5 billion intelligent devices are already connected, and the number is increasing quickly worldwide [3,4,5]. The number of people interacting can exceed the number of virtual devices that connect to them. As a result, significant traffic will be generated in which humans are the slightest contributor to this traffic [6].
WSNs are of two types, namely, homogenous and heterogeneous [7]. In a homogeneous network, nodes are identical. Resource heterogeneity in WSN can be divided into three categories: Computational, Link, and Energy [8]. Computational heterogeneity describes those networks where nodes differ in microprocessor’s power and storage capacity. Hence, the powerful nodes can perform complex data processing and long-term storage. When nodes differ with bandwidth, the networks come under the link heterogeneity category and are suitable for reliable data transmission. Both link and computational heterogeneity consume a considerable amount of energy, reducing the network lifetime. Hence, the type of WSN must be worked out, where nodes are differentiated in terms of battery power.
The energy source consists of limited battery power, which is one of the major challenges in designing any sensor network [9]. The nodes may be deployed over a hostile location owing to the application that makes the battery recharging almost unmanageable [10]. Moreover, the nodes are expected to perform data acquisition for an indefinite time to achieve the application requirements. Hence, many researchers are currently engaged in exploring various techniques to extend the network lifetime to achieve high quality of service by balancing the energy consumption over the network [11].
When WSN is applied on larger platforms, topology control becomes an important parameter in balancing the network load to enhance the network lifetime and scalability. Clustering is an energy-efficient method for the hierarchical organization of sensor nodes in a network [12,13]. However, each node in an ad hoc network communicating directly with the sink node leads to problems such as data collision, network congestion, and unnecessary drainage of power [14]. Low Energy Adaptive Clustering Hierarchy (LEACH) [15] is a classical cluster-based protocol proposed to minimize energy consumption by efficiently selecting cluster heads. Forming small clusters within the network helps overcome these crucial issues through efficient resource utilization. For each cluster, a cluster head (CH) is elected to act as a hop between the sensing nodes and the sink (as shown in Figure 1), thereby reducing the transmission distance. The CHs are elected dynamically after a certain interval to reduce the overhead. Once the CHs are elected, they broadcast an ADV message using the CSMA MAC protocol (see Figure 2a). Based on the RSSI of the ADV message, the nodes decide which CH wants to join for the current round and send a REQ message back to it using CSMA MAC protocol (see Figure 2b).
The clustered network helps the system to maintain a longer life term by scheduling a duty cycle between nodes in a cluster without affecting the normal functionalities of the network [16]. The CH sets a time division multiple access (TDMA) schedule for data transmission to prevent any collision of messages. The non-CH node sends its data to the respective CHs with the DSSS (Direct Sequence Spread Spectrum) communication, in which each cluster has its unique propagation code to reduce interference. The CHs add received data and send it to BS through a fixed propagation code with CSMA.
Energy-saving is the utmost priority of a sensor network [17]. Different methods have been adopted according to the requirement of the application and user. The characteristics of WSN-based IoT diverges from traditional network paradigms such as the Internet and even from ad hoc network [18]. Unlike ad hoc networks, WSNs designed for IoT applications confront a slew of additional hurdles, including node density, hardware, communication mode, battery capacity, and computational cost, to mention a few. In an IoT paradigm, nodes are given additional functions and must overcome new hurdles in terms of security, QoS (Quality of Service), and energy management [19]. Ring routing, as proposed by Tunca et al. [20], targets to reduce overhead by introducing mobile sink nodes. These concerns can be alleviated by implementing various technology upgrades in traditional WSN methods and schemes. The potential applications of WSN-based IoT required data to be sent to the user with a minimum delay to provide an immediate response to an event, as in the case of tracking. The query response time in a WSN is another key factor in applications such as forest fire detection. Mobile forest fire patrol units can inject queries into the WSN to monitor environmental variables such as temperature and humidity. The WSN must respond to the inquiries as soon as feasible in order to speed up response to a fire and enhance fire prevention efforts [21]. The monitoring applications require successful data reception by the server irrespective of the transmission time.
WSNs were first used for military and defense applications, which further motivated researchers to explore new technologies that could enhance their performance [22]. The main domains of applications of the WSNs are as follows:
(a)
Environment monitoring: Since the attention on sustainable energy solutions has increased substantially, smart technologies for energy conservation have gained importance. Monitoring environmental conditions have been one of the popular applications of WSN that controls and manages services such as air, water, and soil monitoring [23,24]. This network allows the end-user to gather data at a resolution located in areas where accessing data is otherwise difficult. Moreover, long-term monitoring is required to obtain sufficient information to decide.
(b)
Home Application: With the expansion of WSN integrated IoT, tiny sensor nodes can be implanted into household equipment such as electric appliances and furniture to access from a remote place [25]. For instance, the nodes can be incorporated into microwave ovens, vacuum cleaners, washing machines, and even air conditioners that can be connected to a room server. Such arrangements are self-manageable and require minimal human interventions to frame a smart home structure.
(c)
Healthcare Application: Driven by the convergence of data collection regarding the health of people and maintaining accuracy in collected information with minimal cost, WSN for healthcare has evolved in recent years [26]. Researchers have invented a new branch of WSN exclusive for healthcare, called Body Area Network (BAN), that provides better treatment at a lesser cost. BAN is administered to monitor patients’ physiological, cognitive, and psychological information.
(d)
Tracking and Military Application: Battlefield surveillance was a wireless medium’s most critical application of sensor networks. Characteristics such as self-association, fast organization, and well adaptation to node failures make WSN an extremely desired sensing technique for military applications [27]. Sensor nodes could be located in remote areas to sense and receive data as long as possible that can alert the user about possible blast location, enemy positions, and chemical attacks.
(e)
Transportation: WSN helps drivers alert any congestion or traffic problem by regularly monitoring traffic statistics. Vehicular motions can be tracked instantaneously to avoid any blockage or accidents [28]. WSN also reduces the length of the wiring harness and saves time with the cost of its installation.
(f)
Industrial Applications: WSNs offer momentous cost reductions and investments that allow innovative functionalities for industry-based technologies. Continuous sensing of the environment, condition monitoring, and process automation are some of the requirements of Industrial WSN [29]. The solutions need to be simple to use and install yet versatile with low-cost devices and a long lifetime.

1.1. Related Work

Inspired by the classical LEACH protocol, numerous hierarchical clustering protocols have evolved over the years that apply different factors to achieve better performances. Different clustering approaches in [30] analyze several clustering methodologies and categorizes current clustering into meta-heuristic, fuzzy logic, and hybrid based on network organization and clustering management strategies. Similarly, Ref. [31] compared the optimized clustering methods based on a few parameters and suggested the best approaches to a WSN application. An in-depth examination of LEACH-based protocols is discussed in [30], where it first focuses on cluster formation and CHs selection techniques and their benefits and drawbacks. As shown in Table 1, several reviews and surveys have focused on LEACH variants and successors.
Nevertheless, it will be important to mention that all the reviews mentioned in Table 1 highlight the limited number of LEACH descendants compared to a few parameters. From the literature, it can be concluded that CH selection is the key parameter used by researchers to enhance the performance of any clustering algorithm. Throughout the process of CH selection, residual energy and the number of clusters in the network should be of paramount importance [48]. Other issues found in conventional clustering algorithms can be described as shown in Figure 3. Apart from these, network security is one of the key issues and various routing protocols have been suggested to make the network resilient against insider and outsider attackers [49]. Applications using wireless sensors need to be protected from packet insertion, modification, and eavesdropping. Data cryptography and encryption can avoid these security problems to protect against these issues.
Hence, to overcome these problems, several algorithms have been proposed. As far as possible, this article intends to present a more comprehensive survey that discusses a wide range of routing protocols that will help researchers gain knowledge about routing protocols to work in proper future directions. The classification of routing protocols is performed based on a homogenous and heterogeneous environment suitable for the specific application. A homogeneous WSN consists of nodes with the same initial energy, and a heterogeneous sensor network contains nodes of two or more energy levels. The type of network can be chosen depending on the requirement of the application.

1.2. Organization of the Paper

The rest of the paper is structured as follows: Section 2 presents an overview of WSN, the node architecture, its design criteria, clustering strategies, and methods to overcome the issues. The classical routing LEACH and its successors in terms of CH selection are discussed in Section 3. The bio-inspired algorithms associated with the LEACH protocols are highlighted in Section 4. The performance analysis and discussion are presented in Section 5, followed by the conclusion and future perspectives on clustering protocols in Section 6.

2. Overview

WSN is a bridge element that combines the digital virtual world with the real world [50,51]. A WSN is formed by collecting many sensors called nodes, which have limited computing, sensing, and communication functionaries. The sensor nodes are implemented in a geographical area for monitoring physical phenomena such as humidity, temperature, and vibrations [52,53]. The nodes are small devices with essential components, such as the detection, processing, and communication of subsystems and a power supply unit, as shown in Figure 4.
The node architecture shown in Figure 4 has four important units. Sensors and an ADC (analog to digital converter) constitute the sensing unit. The analog signals generated by sensors are converted to their digital form by the ADC and are then forwarded to the processing unit, which consists of a memory-equipped microprocessor or microcontroller. The processing unit is also responsible for controlling the sensor nodes intelligently. Data transmission and reception via a radio frequency (RF) channel are handled by the communication unit. It also connects the nodes to the rest of the network. The most vital component is the power unit containing a battery that supplies energy to all the components of the system. Taking into account the low cost of production and energy consumption, these units are integrated into a small module. There can be other sub-units of the node that are application dependents such as a power generator, location finding system, and a mobilizer.

2.1. Energy Consumption in WSN

Researchers consider various approaches to prolong network lifetime in WSNs because sensors become inaccessible after deployment. Hence, energy reduction is an essential criterion in the design process of a sensor network [54]. The protocol stack for WSN is given in Figure 5 with five distinct layers. Energy minimization approaches in WSN can be analyzed in each layer.
Physical Layer: To receive and transfer data collected from the hardware, the physical layer must meet the needs of the receiving and transmitting device. The layer is responsible for generating and selecting the carrier frequency, signal detection, modulation and signal encryption, and signal reception. Due to the radio channel’s usage for transmission and reception of data, the amount of energy consumed is significant. The channel can be operated in three distinct modes: Idle, Active, and Sleep. Consequently, the energy consumed can be minimized by shutting off the radio when the channel is idle [55].
Datalink Layer: This layer is responsible for preventing neighboring signals from interfering with each other in a noisy environment. This layer should have the appropriate access, error control, multiplexing, and error detection and correction. TDMA-based protocols have been extensively used to avoid collisions of packets. However, Halkes et al. [56] reported that their deployment in multi-hop ad-hoc networks is very complex. Another method for efficient energy management is to reduce the time between transmission of a frame and idle listening.
Network Layer: Several approaches, including topology control and routing schemes, have been adopted in this layer, increasing network lifetime. Selecting a suitable topology that could provide a well-connected network is often a difficult task. Routing plays a major role in lifetime enhancement by selecting the most energy-efficient path from sensing nodes to the base station (BS) [57]. Routing techniques can be categorized as location-based, data-centric, hierarchical, mobility-based, and quality of service (QoS)-based. However, hierarchical clustering routing algorithms have proved to be effective in enhancing lifetime and reducing power consumption by determining the optimal route.
Transport Layer: Traffic flow regulation is provided by the transport layer, which distributes network traffic to the distant end. Additionally, traffic is provided with reliability measures. It is divided into sequential segments to forward upper layer application data, which are then reassembled into data packages. The transport layer can perform flow control, congestion control, and error checking at a higher level [58].
Application Layer: The application layer serves as a connection point between users and the network services dedicated to electronic mail, file transfers, virtual terminals, and file servers [59]. Extraction of energy from the environment in solar, thermal, and vibration have evolved as the latest technologies to deal with the energy problem. Energy harvesting is emerging as an efficient technique that recharges sensors after depletion.

2.2. Clustering Strategies in WSN

Because battery power is limited, proper clustering is essential for significantly extending the network’s life span. To perform clustering, there are many methods to choose from [60]. The clustering strategies in WSN [61] can be classified as shown in Figure 6.
(a)
Deterministic: Here, the CHs are set at fixed positions in the network [62]. The sensors broadcast a HELLO message to their neighbors, and the node that first receives the maximum number of these messages is elected as CHs and initiates the cluster formation phase. The important attributes of these clustering schemes are node identity numbers (IDs) and node degree (number of neighboring nodes).
(b)
Adaptive: Instead of random CH selection, adaptive clustering schemes are based on the selection of CH considering particular parameters, such as remnant energy, the distance between nodes, energy dissipated in the last round, and distance to BS [63]. Specific combinations of these parameters form the objective function for CH selection that can adapt to the rapid variations in the network. Adaptive schemes can be further categorized as BS-assisted or probabilistic (self-organized) based on who has the power to initiate the CH selection process. Again, considering the parameters for the role of a sensor node, the probabilistic scheme can be classified as resource adaptive and fixed parameters.
(c)
Hybrid: This clustering strategy considers combined clustering metrics with other architectures to increase energy efficiency.
Figure 6. Taxonomy of clustering strategies.
Figure 6. Taxonomy of clustering strategies.
Electronics 11 02282 g006

3. Classical Routing Protocols

Due to the network being homogenous, nodes will be identical in terms of hardware complexity and battery energy. In these networks, static clustering has been used only. This implementation utilizes a single network topology, and it is not complicated. However, the most significant drawback of a homogeneous sensor network is that all network nodes may be able to act as cluster heads, which means they must have the hardware capabilities to meet the hardware requirements [64]. Since energy is an extremely critical resource, various routing protocols have been proposed to minimize the energy consumption at different levels of the network [65].

3.1. LEACH

Low Energy Adaptive Clustering Hierarchy (LEACH) [66,67] is a TDMA-based medium access control (MAC) protocol that uses a clustering strategy to ensure uniform energy distribution among sensors on the network. The sensor nodes are organized in groups, transmitting important data to the BS through the CH. As indicated in Figure 7, the end-users can receive data through the core network via the Internet. Additionally, the data transmission modes in cluster-based networks can be categorized into three types [12]: intra-cluster, inter-cluster, and long-haul communication. When cluster members transmit data to their respective CHs according to TDMA scheduling, then it is called intra-cluster transmission. The data exchange between CHs is managed through inter-cluster transmission. Finally, the CH sends their combined data to the BS in the long-haul transmission method.
The LEACH protocol operation consists of several rounds, where each round consists of two broad phases, i.e., the setup phase and steady-state phase, as shown in Figure 8.
The initial setup phase consists of clustering and CH selection. Each cluster node is involved by a random value generated in the window [0, 1] during the CH selection process [68]. The node will be declared CH if the number generated is lower than the member node’s predefined T(n) value. Equation (1) indicates the value of the T(n) threshold. The CH is also responsible for assigning TDMA schedules for the corresponding cluster members.
T ( n ) = { P 1 P ( r m o d 1 P ) ;   n   ϵ   G 0 ;   O t h e r w i s e
where, P is the desired percentage of sensor nodes which may be CH, r refers to the current round, and G to a set of nodes that in the previous 1/P rounds have not been involved in the CH selection. Since only these nodes participate in the CH selection process, which in the last 1/P rounds was not CH, every sensor node of a cluster is therefore equally likely to become CH. The energy dissipation between the sensor nodes is therefore spread uniformly over the network.
During the steady-state stage, cluster nodes will transmit sensed data based on the assigned TDMA schedule to their respective CH nodes. The nodes can transmit data only during a particular time slot; all other nodes go to sleep state by switching off their radios. In this way, the intra-cluster collision can be avoided. The main objective of the LEACH protocol is to increase energy efficiency by adopting a rotation-based CH selection procedure using a random number.

3.1.1. Advantages of LEACH

  • The concept of clustering in LEACH effectively increases the network lifetime;
  • Traffic reduction due to aggregation of data at the cluster head level;
  • One-hop data routing from node to CH reduces energy consumption;
  • Global knowledge of the network is not required as LEACH is a distributed protocol, and BS does not control nodes in cluster formation.
  • Intra-cluster collisions are avoided due to the allocation of TDMA slots for data transfer.

3.1.2. Disadvantages of LEACH

  • Due to the random selection of CH, the probability of CH election remains the same for each node, indicating that the probability of a node with high residual and low residual energy remains the same [69]. However, if a low residual energy node gets elected as CH, it will eventually limit the network lifetime to a short span;
  • The number of CHs in each round varies randomly in LEACH. Moreover, the position of CH is not fixed and may be centrally or boundary placed [70]. This will eventually contribute to extra energy consumption in cluster-level communication and degrade network performance;
  • CHs have responsibilities such as data collection, aggregation, and transfer to BS. Hence, it is very likely that the CHs will deplete energy faster than other nodes [71]. Moreover, if a CH fails, all the member nodes connected to it will run out of power, resulting in a broken network;
  • The CHs communicate with the BS in a single-hop mode, making LEACH not preferably used in large-scale wireless sensor networks [72].

3.2. Modification of LEACH Based on CH Selection

Over time, several improvements have been incorporated into the LEACH protocol considering various parameters to enhance network performance [73]. Researchers have mainly focused on enhancing the CH selection criteria and the clustering process that prove to conserve energy more efficiently.

3.2.1. LEACH-C

In LEACH Centralized, proposed by Heinzelman [67], the base station performs decisions for cluster formation, CH selection, and data distributions. It ensured uniform energy distribution among all sensor nodes and created better clusters than LEACH. The overhead during the cluster formation phase is reduced due to control by BS. CH selection process considers residual energy and evaluates the optimal number of clusters K using the formula
K = N f s 2 Π m p M d t o B S 2
The node distance to BS is given as dtoBS and M is the sensing area of interest. The BS communicates the CH ID to each node, and if the CH id matches a sensor node, it is declared as CH; otherwise, it behaves like a normal node. To achieve this, the location of each node is known to BS with the help of a Global Positioning System (GPS) receiver. The steady-state phase is the same as that of the LEACH protocol. Since the entire process is controlled and processed by BS, LEACH-C has proved more energy-efficient than LEACH. However, the usage of GPS increases the cost and also consumes energy.

3.2.2. LEACH-DCS

The stochastic CH selection in LEACH is enhanced in [68], which modifies the CH selection threshold using a deterministic approach. Two modifications of T(n) have been considered to enhance the network lifetime. The first approach multiplies the remaining battery power level (Ecurrent) of each node and is given as:
T ( n ) = P 1 P ( r m o d 1 P ) × E c u r r e n t E m a x
where Emax is the initial node energy. However, after a few rounds, the network becomes stuck, with nodes having high energy levels alive for data transmission. Hence, the T(n) value is further expanded as:
T ( n ) = P 1 P ( r m o d 1 P ) × [ E c u r r e n t E m a x ( r s d i v 1 P ) ( 1 E c u r r e n t E m a x ) ]
where rs represents the number of consecutive rounds in which a node has not acted as CH. The method proved to be energy efficient as nodes themselves decide to be the CH, as no global information needs to be stored in BS. With the modified values of T(n), the network lifetime was enhanced by 30%, but the frequent cluster formation process degraded the network performance and demanded recursive cluster maintenance.

3.2.3. Solar-Aware Distributed LEACH

Since battery-driven sensor nodes run out of power faster, Voigt et al. [74] proposed solar-operated WSN and imposed it on a LEACH environment. The preferable candidates for CHs are given to solar-driven nodes only, while battery-driven nodes act as member nodes [75]. Hence, the threshold for CH selection needs to be changed to increase the probability of solar-operated nodes and is given as:
T ( n ) = s f ( n ) × P 1 ( C H e a d s n u m N o d e s )
where CHeads is the number of CHs since the start of the last (1/P) round and numNodes is the total number of nodes, sf(n) is a scaling factor higher than 1 for solar-operated nodes and is set to reciprocal for battery-operated nodes. The introduction of solar-aware WSN increased the network lifetime for typical scenarios as compared to centralized LEACH.

3.2.4. Multi-Hop LEACH

A simple multi-hop routing protocol was proposed by Xiangning et al. [72] that selects CH based on the residual energy of each node. In the first round, the CH is selected randomly; the node with the highest residual energy acts as CH, and so on. Since all the CHs send data to BS directly irrespective of its distance in LEACH, much energy becomes consumed. Hence, in this multi-hop protocol, an optimal path is selected, and each CH sends its data to the node nearest to the sink. Both modifications enhanced the energy consumption and node lifetime more than the LEACH protocol.

3.2.5. A-LEACH

LEACH protocol was modified by Abuhelaleh [76] to achieve better security with less energy consumption and minimal data overhead. The protocol combines the features of Security-LEACH [77] and the Time-controlled Clustering Algorithm (TCCA) [78] that protects the network from various attacks such as sinkhole and selective forwarding attacks. The TCCA forms multi-hop clusters using timestamp and time-to-live (TTL) messages. To decide the eligibility of a node to become CH, TCCA adds some modifications to the threshold value as given in (6):
T ( n ) = { m a x ( P 1 P ( r m o d 1 P ) × R E E m a x ,   T m i n ) ;   n G 0                                              ;   Otherwise
where Tmin is the minimum value of the threshold to avoid the residual energy (RE) shortage. After the CH selection, it sends an ADV message to become its member, as shown in Figure 9. The nodes whose TTL value matches join the CH to form a cluster by sensing a REQ message consisting of the original timestamp and the remaining TTL value.
Compared to LEACH, Sec-LEACH, and TCCA, it was found that A-LEACH outperforms in terms of energy consumption and lifetime. Moreover, the protocol protects the network from sinkholes, jamming, and replay attacks. However, the only disadvantage of this protocol is the wastage of bandwidth due to the exchange of large control packets.

3.2.6. T-LEACH

T-LEACH, a CH replacement protocol based on a threshold value, was discussed in [70]. As CHs change in each round for most of the clustering protocols, a huge amount of energy is consumed during exchanging message signals. T-LEACH comes with a solution where the same CH operates for consecutive rounds if it has sufficient residual energy. A threshold value is calculated, and only if a CH has residual energy below it, the new CHs selection process starts. It reduces the number of times a CH selection process is conducted by considering a threshold of residual energy. This reduces the cost of CH replacement and enhances the network lifetime. However, the process leads to uneven energy consumption and generates control overhead. The T-LEACH is further modified as MT-CHR [79], which modifies the threshold so that the death of the first node is further delayed and reduces overhead. The threshold energy to retain the CH is given as
E T h = C o u n t R N D × E T X × q + 5 × A D R S E
A D R S E = E R X _ e l e c × q × ( N k 1 ) Received   power   per   cluster + q × N k × ( E T X _ e l e c + ε a m p d m ) Transmit   power   to   BS
ETX is the total energy of the transmitting node, and ADRSE is the approximated data transmitting and receiving energy. The multiplying factor 5 is chosen experimentally from the range 1 to 10, giving maximized performance metrics [75]. Since no setup is required in every round, the control overhead is considerably reduced, thereby giving better performance than T-LEACH.

3.2.7. Improved-LEACH

The hotspot problem in single-hop communication such as LEACH is overcome using an unequal clustering scheme [80] in the LEACH protocol. Since CHs in the LEACH protocol transmit data directly to BS, leading to the death of nodes located farther from BS. Hence, the authors here consider clusters of unequal concentric circles so that the cluster size would decrease with distance from BS. The CH is selected considering residual energy, weight factor, and distance as major parameters. Simulation results proved improved network lifetime but do not discuss other factors such as throughput, average residual energy, and network stability.

3.2.8. LEACH-SWDN

A dynamic method of CH selection is proposed by Wang et al. in [81], where a sliding window is set up for the election probability of nodes. A random number is generated between 0 to (Eavg/Emax) during the setup state by each node. Eavg is the average energy level of nodes that are never elected as CH and Emax is the initial node energy. In a network of k clusters and N sensors, a node is declared CH only if the generated number is less than a threshold P(i) given as
T ( n ) = { k N k ( r m o d N k ) E c u r r e n t E m a x 0                               ;   C ( t ) = 0
The non-CH node of the present round sends its remaining energy information to the CH of the last slot, which is then forwarded to the BS for Eavg calculation. The simulation result shows improved network metrics such as FND and HND that are 41% and 36% higher than LEACH. However, repeated transfer of residual energy information increases the network load.

3.2.9. MOD-LEACH

Another modification of LEACH is proposed in [82], which segregates the intra and inter-cluster communication by allocating two different signal amplifications. Since intra-cluster communication deals with the transfer of information between nodes, a low amplification signal is allocated. On the other hand, inter-cluster communication is the transfer between CHs, and a high amplification signal is chosen.
The protocol was further modified as EMOD-LEACH by Singh et al. in [83] using dual transmitting energy levels. EMOD-LEACH is a reactive protocol that uses two threshold values: a soft and a hard threshold. The hard threshold is the absolute sensed value, and the soft threshold is the minor change in the sensed value attribute. If the energy of a CH falls below the threshold value, then only that CH gets replaced in the next round. As a result, the network longevity increases due to optimal data transmission. Both MOD-LEACH and EMOD-LEACH perform better in terms of power consumption and network lifetime. However, synchronization is a significant issue in these protocols due to different signal amplifications.

3.2.10. EC-LEACH

Bsoul et al. [84] proposed a variant of LEACH based on a centralized approach with a multi-hop clustering methodology. The CH selection process is conducted by BS by calculating threshold T(n) using Equation (12).
T ( n ) = R E ( n ) i = 1 m d ( i , m ) R E ( i )
The residual energy of each node is RE(n) and d(i,n) is the distance of node i to node n in a network of m nodes. The node with the highest value of T(n) is selected as the CH and then its distance from the node with second-highest T(n) is computed. This leads to the following two possibilities:
  • If this distance is greater than or equal to the minimum distance between every CH and the next (MDCH), then the second-highest T(n) node is declared as CH.
  • If this distance is lesser than the minimum distance between every CH and the next (MDCH), the BS does not select any of these nodes as CH.
As a result, a node with less energy will never be chosen as CH, saving significant amounts of energy. However, the protocol suffers a problem with scalability and extra overhead.

3.2.11. LEACH-MAC

In the LEACH protocol, an optimum value of CHs is pre-defined. However, the number varies randomly in a clustering algorithm. This randomness in LEACH is controlled in LEACH-MAC [85], which uses MAC layer information. The method tends to restrict the number of ADV messages of CH. When the selection of CHs starts, a variable CHheard is initialized to 0 and is incremented by 1 when it receives an ADV message. After the threshold value, the node selects a random time between interval [0, total_adv_time], where total_adv_time is the total time for CH transmission and reception given as
t o t a l _ a d v _ t i m e = a d v _ t i m e × ( N u m _ o f _ c l u s t e r s ) × 4 + 1 )
a d v _ t i m e = T r a n s m i s s i o n _ t i m e   of ( C o n t r o l P a c k e t _ s i z e × 4 )
T r a n s m i s s i o n _ t i m e = ( N u m b e r _ o f _ b y t e s × 8 ) B a n d w i d t h
If the selected time is Rt, then the ADV sending time tadv_CH can be evaluated t a d v _ C H = R t C u r r e n t E n e r g y so that nodes with higher energy could send ADV messages earlier than those with lower energy. Then, the node checks the variable CHheard, to know the number of ADV messages received. If the value is less than the optimal value of clusters formulated by Equation (1), it will send the CH ADV; otherwise, it remains a normal node. LEACH_MAC performs better than ALEACH and LEACH-DCS in terms of network lifetime and energy consumption.

3.2.12. Modified-LEACH

LEACH protocol is modified for a heterogeneous network in [86], where CHs are selected from advanced nodes only. The network has two categories of nodes called normal and advanced, where the latter has higher energy than the former. After nodes are deployed, the threshold value for CH selection is set as
T ( n ) = { p × a 1 a × p [ r mod ( 1 p × a ) ] , n G
If the node is normal, then a = 1 and 5 otherwise. Simulation results with a network with 10% advanced nodes show that the network lifetime is considerably increased. The paper does not discuss other parameters such as stability period, throughput, and energy dissipation.

3.2.13. I-LEACH

One disadvantage of the LEACH protocol is that a new CH is selected in each round, requiring energy to form a new cluster. This also leads to excessive energy use through routing overhead, which is unacceptable for any IoT device [87]. Behera et al. [2] proposed an effective CH replacement method, which can be used to avoid extra energy during the formation of the cluster and the transmission of advertising messages to the cluster members. A threshold value is calculated, and only when the remaining energy of the CH is lower than the threshold does a new cluster and CH need to be formed; otherwise, the same CH will continue to the next round. It can be considered that the minimum energy level that is the best for the CH replacement method is evaluated as:
P T h = C o u n t R n d ( P k T x + P k R x ) P T x
CountRnd is the number of rounds to act as member nodes within a cluster. PkTx and PkRx are the transmission and reception packet sizes, and PTx is the power required to transmit 1 byte of data.

3.2.14. R-LEACH

The R-LEACH protocol is a variation of LEACH that chooses the CH based on two essential parameters: the individual node’s remaining energy and the network’s ideal number of CHs [50]. After each round, the non-CH nodes’ residual energy is examined, and the one with the highest energy level in relation to the others has a higher possibility of being chosen as CH for the current round. This would prevent the network from dying out too soon, extending its lifespan. The threshold value for CH selection is modified as:
T ( n ) = { P 1 P ( r m o d 1 P ) × E r e s i d u a l E i n i t i a l k o p t ; f o r   all   n   ϵ   G 0 ;   Otherwise
where Eresidual is the remaining energy level of the node and Einitial is the initial assigned energy level. The optimal number of cluster kopt can be written as in [88].
k o p t = n 2 π E f s E a m p d 4 ( 2 m 1 ) E i n i t i a l m E D A M
M is the network diameter, m is the number of CHs in each cluster and d is the distance between nodes.
The R-LEACH was further modified using Fuzzy logic to evaluate the value of kopt using a Fuzzy base rule called FR-LEACH [89]. An exponential member function based on energy is used to find the number of clusters adapting to the network energy changes.

3.2.15. Enhanced LEACH

In [90], the LEACH protocol is modified to select the CH based on the lowest degree of distance from the BS, decreasing energy consumption in the network. When normal nodes select appropriate CHs located at a minimum distance from the BS, it was proved that there is reduced battery power consumption. The goal is to determine how sensitive the network is to power consumption and how long the network can last.

3.2.16. SE-LEACH

According to the authors in [91], a protocol named stability enhancement for LEACH (SE-LEACH) is proposed to expand the stable zone of WSN by balancing the load and ensuring that all nodes dissipate power in the same way. Because the most critical requirement for the job of cluster head is the best candidate selection, the selection criteria consider node density, residual energy, distance from the base station, and the candidate’s power dissipation.

3.2.17. AvgRLEACH and VarRLEACH

Regarding CH selection, the threshold equation is modeled using first and second-order statistics to give prominence to network information on a local and global scale [92]. To meet this requirement, overall energy information must be collected and used to aid in selecting the CH. Not only can this help to extend the network’s life by maintaining a balanced network power distribution, but it can also help increase overall throughput. To account for the average and variance of energy, the threshold was modified as in AvgRLEACH given in Equation (18) and VarRLEACH given in Equation (19), where Na(r) is the number of alive nodes in each round. An(r) denotes the normalized average value of the node energy concerning initial energy E0 for each round r and Vn(r) is the normalized variance of the energy of nodes in round r.
T ( n ) = p 1 p ( r   m o d ( 1 p ) ) ( E i ( r ) E 0 ) A n ( r ) N a ( r )
T ( n ) = p 1 p ( r   m o d ( 1 p ) ) ( E i ( r ) E 0 ) V n ( r )   N a ( r )

4. Advent of Bio-Inspired Algorithms

To prolong the network lifetime of WSN, the use of routing protocols based on intelligent algorithms has been quite popular. Adaptive mechanisms that exhibit intelligent behavior in complicated and dynamic contexts, such as WSNs, are provided by a few bio-inspired algorithms [93,94]. Numerous social insect community traits, such as self-organization, self-adaptation, and cooperation, meet the most of the requirements for routing protocols for next-generation sensor networks [93]. The routing protocols in cluster-based WSNs that rely on intelligence algorithms are discussed in several papers [94].
CH-selection is an NP-hard optimization problem. Canonical optimization approaches become useless as the network grows in size. Several engineering areas are used to solve various challenging optimization problems, revealing their superiority or cost-effectiveness over existing metaheuristics such as the genetic algorithm (GA), Ant Colony Optimization (ACO), and Particle Swarm Optimization (PSO), and others. Artificial Bee Colony (ABC), ACO, and Cuckoo Search (CS) are three techniques that help the WSN network live longer. A good Swarm Intelligence (SI) algorithm improves global search and brings the global best solution closer together. GA and Krill Herd (KH) optimization algorithms are bio-inspired algorithms that work well for NP-hard problems. Furthermore, these algorithms are simple to construct and have good exploration and exploitation capabilities, leading to speedy convergences and the ability to escape from local minima. To improve this, a variety of hybrid strategies have been proposed.

4.1. PSO

The social behavior of a flock of birds inspired this algorithm. A swarm is a collection of possible solutions to an optimization problem, each referred to as a particle. The PSO aims to locate the particle position that yields the best fitness function assessment. During the PSO startup procedure, each particle is given random beginning parameters and ‘flown’ over the multi-dimensional search space. Each particle uses knowledge about its past best individual and global positions during each generation to increase the likelihood of shifting to a better solution space, resulting in improved fitness. The social behavior of a flock of birds inspired this algorithm. When fitness superior to the individual’s best fitness is discovered, it will be utilized to replace the individual’s best fitness and update the candidate [95].
PSO-based CH selection finds the fittest position for the head nodes. Clustering in WSN using PSO was proposed in [96] and implemented at BS. The cost function aims to minimize the intra-cluster distance to optimize the network’s energy consumption. When compared to LEACH and LEACH-C, it was found that data delivery and lifetime were improved to a great extent.
Lobiyal et al. [97] state that the head node is in the best position only when the intra-cluster distance is minimized. The PSO-based method localizes the head nodes around the center of cluster density. The distance covered by packet transmission from a sensor node to its cluster head is computed using the optimum CH position. The PSO-based approach is semi-distributed because it runs in a cluster rather than on the BS. The objective function selection is based on intra-cluster distance, residual energy, node degree, and the number of feasible CHs. The suggested energy consumption model impacts the projected number of packet retransmissions with the approximated route to the CHs.
Rao et al. [98] considered intra-cluster distance, distance to sink, and residual energy of nodes as fitness function parameters to be implemented using PSO to select the next CH. The optimal CH selection aims to minimize the linear programming function F:
F = α f 1 + ( 1 α ) f 2
The functions f1 and f2 are given by:
f 1 = j = 1 m 1 l j [ i = 1 l j d i s ( s i , C H j ) + d i s ( C H j ) ] , f 2 = 1 j = 1 m ( E C H j )
The f1 represents the average sink distance and f2 is the residual energy parameter. Simulation results proved reduced energy consumption and enhanced network lifetime.

4.2. ABC

Karaboga et al. [99] proposed an energy-saving clustering algorithm. The ABC algorithm is used to improve the life of the network. In the clustering method, the intelligent foraging of the bee colony is simulated. In order to minimize energy consumption, the distance between the node and the CH and the distance between the cluster head and the base are considered in the selection process. Since a CH should have enough energy to feed the current round of communication, the energy level of the candidate node is also important for selection. Another important parameter that defines energy consumption is the distance between the transmitter and receiver nodes. Ahmad et al. [100] considered the distance to BS, residual energy, and node to node distance to optimize the ABC algorithm’s fitness function. The algorithm aims to select the optimal CH in a cluster by reducing energy consumption.

4.3. HBO

Selvi et al. [101] suggested that HBO (Honey Bee Optimization) intends to reduce energy consumption by finding the best way to reduce costs. The purpose of this concept is to improve network life and throughput. Existing technologies provide better performance in energy efficiency parameters such as scalability and connection quality. Yuvaraja et al. [93] proposed energy distrusted clustering for effective cluster head selection based on the HBO algorithm. This algorithm considers the energy and distance factors as a parameter to improve CH selection. The main goal of EDC-HBO is to enhance the network lifetime and improve the power consumption of the network.

4.4. FLION

Sirdeshapande et al. [102] introduced the Fractional Lion (FLION) clustering method as a competent optimization algorithm for creating an energy-efficient routing plan. This clustering approach can develop the energy and longevity of network nodes using a rapid collection of CHs. This fitness function is built on the foundation of five objects: delay, normal energy nodes, cluster, and inter-cluster distance, and CH energy. The recommended fitness function locates the quick cluster centroid for an optimal routing path. The proposed FLION-based multi-objective clustering technique has been proven to improve network lifetime with results.

4.5. Tabu PSO

A new technique proposed by Vijayalakshmi et al. [103] chooses the optimal path to route that can enhance the lifespan of the network and its energy effectiveness. Researchers have used PSO extensively but with a decreased local optimal problem. TPSO uses Tabu Search (TS) algorithms which creates a more flexible search. The scheme chooses CHs effectively, optimizes the routing path, and increments the network’s lifetime. Due to the optimized routing path, the average packet loss rate and end-to-end delay are also reduced.

4.6. WOA

An energy-efficient CH selection algorithm is discussed [104] whose basis is on WOA (Whale Optimization Algorithm) called WOA Clustering (WOA-C). The CHs are chosen based on a fitness function where residual energy and the sum of the adjacent node’s energy. The BS is authorized to select the CH following WOA by minimizing the fitness function. When compared with LEACH, LEACH-C, and PSO-C, it is found that WOA-C performs better in terms of energy utilization, lifetime, and stability period.

4.7. LEACH-GA

GA was used in [105] for optimized CH selection for centralized clustering protocol to obtain a load-balanced network. The fitness function used to select the CH depends on residual energy, intra-cluster distance, CH count, and CH to BS distance. Simulation results proved, LEACH-GA extended the network lifetime better than LEACH and LEACH-C. LEACH-GA proposed by Liu et al. [106], where the optimal probability P is determined using GA that depends upon the distance to BS. The value of P is highest when the BS is positioned at the center and decreases gradually when it moves in an outward direction. The network lifetime was effectively enhanced in LEACH-GA as compared to LEACH, MTE (Minimum Transmission Energy), and DT (Direct Transmission) protocols.

4.8. KH Algorithm

The KH algorithm was first proposed by Gandomi et al. in [107], inspired by a non-random and under-dispersed group of oceanic animals. Shopon et al. [108] presented a central method regarding an energy awareness of WSNs using the Krill Herd (KH) algorithm that focuses on data aggregation by an effective clustering scheme. After a certain round, the KH selects the CH based upon energy possessed by the node and distance from member nodes. The CHs are uniformly distributed, thereby extending the network’s lifetime compared to LEACH, LEACH-C, and PSO. An optimized CH selection that used the KH algorithm was discussed in [109] that optimizes the energy expenses within the nodes concerning their residual energy.

4.9. FL-LEACH

Decision fusion is a key issue in WSN [110]. With two systems, a two fuzzy-based cluster head selection was performed [106]. Systems 1 and 2 consider linguistic parameters such as battery power of nodes and distance of cluster centroid. In addition, system 1 takes the traffic of the network instead of system 2, which takes the degree of the number of neighbor nodes to select the CH. Simulation results proved that system 2 gives better results than system 1 and that residual energy of nodes and the number of neighboring nodes are important parameters in CH selection compared to the node’s distance from the sink. Kim et al. developed a Cluster Head Election mechanism using Fuzzy (CHEF) [111], which takes a distributed approach for CH election. This mechanism considers two descriptors: residual energy and proximity distance to reduce the collection and calculation overhead, thereby prolonging the network lifetime. Lee and Cheng [112] considered a method of uniformly distributed load based on fuzzy logic, which considered CH selection based on energy prediction, aiming to extend the life of the network. CH selection in [113] is based on a fuzzy decision-making approach. In order to extend the life of the network, several attributes are considered, including the remaining energy, the number of neighboring nodes, and the distance between the nodes and the BS. Battery power, mobility, and centrality are the fuzzy descriptor used in [114] to select the CH in a mobile sensor network. When compared with LEACH, it demonstrated better results in terms of longevity and end-to-end delay.

4.10. SMOCH (Spider Monkey Optimized CH Selection)

To improve convergence performance and exploitation capabilities, this algorithm adjusts the position of individual nodes based on their fitness scores. By nominating cluster leaders with better placement coordinates, SMOCH [115] improves the ability of the original Spider monkey optimization algorithm and LEACH to increase the overall network performance in terms of the fewest dead nodes and energy usage.

5. Discussion

Different routing protocols are designed to enhance different performance metrics in WSN. Some of the major metrics are
  • Network Lifetime: The precious resource of WSN nodes is energy, and the lifetime of WSNs is completely dependent on the amount of energy the nodes contain. The network lifetime is defined as the total time the network is fully operative until the last nodes run out of energy. It depicts the total time of network operation.
  • Network Throughput: It is an important parameter that estimates the overall successful data transfer rate.
  • Residual Energy: Every device on the network requires a certain amount of energy to carry out various network activities. The total energy consumption is calculated as the total sum of energy used by all the nodes in the network. If it is assumed that nodes consume energy while sending data, then the total energy consumed is equal to the total number of packets sent in the network. To be more precise, the residual energy represents the overall network energy level after the operation is complete.
  • Packet Delivery Ratio (PDR): PDR is the ratio between the total packets sent from the source to the number of packets received at the destination. The network performance is better for higher PDR values.
  • Scalability: It is a key criterion of WSN studied to observe the impact of network size on network lifetime. As the routing of data in a large-scale WSN is conducted with nodes having limited resources, the routing process becomes a very challenging issue. Hence, an efficient and scalable routing protocol design becomes essential to constrain such limitations.

5.1. Comparison of LEACH, A-LEACH, and LEACH DCS

The stability period is indicated by calculating the number of rounds until the network’s first node dies out. It is an important parameter to predict how stable the protocol is. Lifetime and stability period analysis for 100 nodes deployed over 100 × 100 m2 with an initial energy of 5 J shows LEACH-MAC outperforms LEACH, A-LEACH, and LEACH DCS, as indicated in Figure 10.

5.2. Comparison of LEACH, I-LEACH, and MOD-LEACH

For a network with 100 nodes and BS located centrally in a 100 × 100 m2 field, the I-LEACH protocol gives a better result than the LEACH protocol, with a 67% rise in throughput and network lifetime extended to 1750 rounds. The analysis conducted in Figure 11 shows that I-LEACH is a more scalable protocol than MOD-LEACH and LEACH.

5.3. Comparison of LEACH, LEAC-GA, and LEACH-KH

Compared to the CH selection mechanism in LEACH and LEACH-GA [105], and LEACH-KH, the latter proves to have a higher average PDR with the higher residual energy of the network, as shown in Figure 12.
To summarize, it can be said that LEACH can equally disperse energy among the sensors, resulting in reduced transmission between nodes and BSs. This saves energy at each node and hence extends the network’s lifespan. It also saves energy by applying data aggregation techniques to locally gathered data before sending it to a sink node or base station. The main problem with LEACH is that the CHs are chosen at random, without concern for the amount and distribution of CHs in a cluster. As a result, nodes with lower residual energy may be chosen as CH, resulting in the network’s premature death.
Although this technique ensures equitable energy dissipation across the network, cluster creation is unpredictable, resulting in uneven cluster distribution across the network. It also does not count the number of clusters in the area or their location inside each cluster.
As a result, LEACH protocol restricts intra-cluster communication due to increased energy consumption. Because the CHs interact with the BS in a single hop, LEACH is not suitable for large-scale networks. Computational Intelligence paradigms, on the other hand, are well suited to be used and can adapt to the dynamic nature of WSN.

6. Conclusions and Future Perspective

Routing techniques differ depending on the applications and dependability of the node’s hazardous condition. The robustness of the routing strategy is dependent on the network architecture and design of the WSN. The design challenges for routing protocols in WSNs are outlined. Numerous clustering strategies are highlighted, which are projected with comprehensive routing techniques, resulting in improved performance. Fully demonstrated and tested LEACH extends network longevity while eliminating intra-cluster collisions. Researchers have mostly focused on enhancing the CH selection criteria, which have been demonstrated to save energy more efficiently. Owing to the challenges such as power, network scalability, security, and packet-delivery ratio, the LEACH protocol has been modified by researchers over time. This paper intends to present a more comprehensive survey of LEACH-based classical and bio-inspired protocols that will help researchers understand routing protocols with diverse architectures, novel strategies, and enhanced performance. It can be concluded that the LEACH-MAC protocol can be used in networks where life is a major issue. I-LEACH protocol can be beneficial in large scale as well as small networks. Similarly, the LEACH-KH protocol yields a high PDR and can be adopted in networks where reliability is the prime factor.
There are still research possibilities in real-time applications that solve difficulties with video and image sensors. Because stationary sensor nodes cannot match demand, the network must include node mobility. The primary issue is that the frequent updating locations of the sensor nodes and BS’s position deplete the network energy. As a result, the overhead of mobility and topological fluctuations necessitates the invention of unique protocols. Additionally, the wireless connection technology used in a WSN commonly facilitates various types of cyber-attacks when transferring data packets and the randomly moving sensors provide hackers with several opportunities to launch denial of service attacks, thus decreasing the WSN’s security. Despite significant research efforts and advances in recent years, there are still many unanswered research concerns with routing in WSNs that need to be addressed. The development of cryptographic methods for authenticated encryption in WSNs that enable privacy and network security can be explored.

Author Contributions

Conceptualization, T.M.B., S.K.M. and U.C.S.; methodology, T.M.B. and B.A.; software, T.M.B. and S.K.M., validation, B.A. and M.S.K.; investigation, T.M.B. and U.C.S.; resources, T.M.B.; data curation, T.M.B.; writing—original draft preparation, T.M.B. and B.A.; supervision, N.B.; project administration, B.A.; formal analysis: N.B.; funding acquisition: N.B. and P.T.; visualization: N.B. and P.T.; writing—review and editing: N.B. and P.T.; figures and tables: M.S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Framework Agreement between University of Pitesti (Romania) and King Mongkut’s University of Technology North Bangkok (Thailand), in part by an International Research Partnership “Electrical Engineering—Thai French Research Center (EE-TFRC)” under the project framework of the Lorraine Université d’Excellence (LUE) in cooperation between Université de Lorraine and King Mongkut’s University of Technology North Bangkok, and in part by the National Research Council of Thailand (NRCT) under Senior Research Scholar Program under Grant No. N42A640328.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mainetti, L.; Patrono, L.; Vilei, A. Evolution of wireless sensor networks towards the internet of things: A survey. In Proceedings of the SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks, Split, Croatia, 15–17 September 2011; pp. 1–6. [Google Scholar]
  2. Behera, T.M.; Samal, U.C.; Mohapatra, S.K. Energy Efficient Modified LEACH Protocol for IoT Application. IET Wirel. Sens. Syst. 2018, 8, 223–228. [Google Scholar] [CrossRef]
  3. Misra, D.; Das, G.; Das, D. Review on Internet of Things (IoT): Making the world smart. In Advances in Communication, Devices and Networking; Springer: Berlin/Heidelberg, Germany, 2018; pp. 827–836. [Google Scholar]
  4. Chase, J. The evolution of the internet of things. Texas Instrum. 2013, 1, 1–7. [Google Scholar]
  5. Zhang, Y.; He, D.; Zeadally, S.; Wang, D.; Choo, K.-K.R. Efficient and provably secure distributed signing protocol for mobile devices in wireless networks. IEEE Internet Things J. 2018, 5, 5271–5280. [Google Scholar] [CrossRef]
  6. Tan, L.; Wang, N. Future internet: The internet of things. In Proceedings of the 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), Chengdu, China, 20–22 August 2010; Volume 5, pp. 376–380. [Google Scholar]
  7. Wang, Y.; Wang, X.; Xie, B.; Wang, D.; Agrawal, D.P. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans. Mob. Comput. 2008, 7, 698–711. [Google Scholar] [CrossRef]
  8. Yarvis, M.; Kushalnagar, N.; Singh, H.; Rangarajan, A.; Liu, Y.; Singh, S. Exploiting heterogeneity in sensor networks. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; Volume 2, pp. 878–890. [Google Scholar]
  9. Callaway, E.H., Jr. Wireless Sensor Networks: Architectures and Protocols; CRC Press: Boca Raton, FL, USA, 2003. [Google Scholar]
  10. Kanithan, S.; Vignesh, N.A.; Panigrahy, A.K.; Pillai, V.A.; Karthikeyan, E.; Kumari, C.H.U.; Jayabalan, S.; Kumar, T.S. A Survey on Energy Efficient Image Transmission in WSN. In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 5–6 July 2019; Volume 1, pp. 41–44. [Google Scholar]
  11. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  12. Abbasi, A.A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30, 2826–2841. [Google Scholar] [CrossRef]
  13. Mhatre, V.; Rosenberg, C. Design guidelines for wireless sensor networks: Communication, clustering and aggregation. Ad Hoc Netw. 2004, 2, 45–63. [Google Scholar] [CrossRef] [Green Version]
  14. Mohapatra, H.; Rath, A.K. Survey on fault tolerance-based clustering evolution in WSN. IET Netw. 2020, 9, 145–155. [Google Scholar] [CrossRef]
  15. Heinzelman, W.R.; Kulik, J.; Balakrishnan, H. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, WA, USA, 15–18 August 1999; pp. 174–185. [Google Scholar]
  16. Younis, O.; Krunz, M.; Ramasubramanian, S. Node clustering in wireless sensor networks: Recent developments and deployment challenges. IEEE Netw. 2006, 20, 20–25. [Google Scholar] [CrossRef]
  17. Ye, W.; Heidemann, J.; Estrin, D. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1567–1576. [Google Scholar]
  18. Shahraki, A.; Taherkordi, A.; Haugen, Ø.; Eliassen, F. A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms. IEEE Trans. Netw. Serv. Manag. 2020, 18, 2242–2274. [Google Scholar] [CrossRef]
  19. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  20. Tunca, C.; Isik, S.; Donmez, M.Y.; Ersoy, C. Ring Routing: An Energy-Efficient Routing Protocol for Wireless Sensor Networks with a Mobile Sink. IEEE Trans. Mob. Comput. 2015, 14, 1947–1960. [Google Scholar] [CrossRef]
  21. Muruganathan, S.D.; Sesay, A.B.; Krzymien, W.A. Analytical query response time evaluation for a two-level clustering hierarchy based wireless sensor network routing protocol. IEEE Commun. Lett. 2010, 14, 486–488. [Google Scholar] [CrossRef]
  22. Wang, C.; Sohraby, K.; Li, B.; Daneshmand, M.; Hu, Y. A survey of transport protocols for wireless sensor networks. IEEE Netw. 2006, 20, 34–40. [Google Scholar] [CrossRef] [Green Version]
  23. Kassim, M.R.M.; Harun, A.N. Applications of WSN in Agricultural Environment Monitoring Systems. In Proceedings of the 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 19–21 October 2016; pp. 344–349. [Google Scholar]
  24. Dixit, E.; Jindal, V. Survey on Recent Cluster Originated Energy Efficiency Routing Protocols For Air Pollution Monitoring Using WSN. In Proceedings of the 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 6–8 November 2020; pp. 160–166. [Google Scholar]
  25. Zatout, Y.; Campo, E.; Llibre, J.-F. WSN-HM: Energy-efficient Wireless Sensor Network for home monitoring. In Proceedings of the 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia, 7–10 December 2009; pp. 367–372. [Google Scholar]
  26. Saleh, N.; Kassem, A.; Haidar, A.M. Energy-efficient architecture for wireless sensor networks in healthcare applications. IEEE Access 2018, 6, 6478–6486. [Google Scholar] [CrossRef]
  27. Mahamuni, C.V. A military surveillance system based on wireless sensor networks with extended coverage life. In Proceedings of the 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, 22–24 December 2016; pp. 375–381. [Google Scholar]
  28. Souadih, R.; Semchedine, F. Energy-efficient coverage and connectivity of wireless sensor network in the framework of hybrid sensor and vehicular network. Int. J. Comput. Appl. 2020, 44, 1–11. [Google Scholar] [CrossRef]
  29. Polavarapu, S.C.; Panda, S.K. A Survey on Industrial Applications using MEMS and WSN. In Proceedings of the 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 7–9 October 2020; pp. 982–986. [Google Scholar]
  30. Jubair, A.M.; Hassan, R.; Aman, A.H.M.; Sallehudin, H.; Al-Mekhlafi, Z.G.; Mohammed, B.A.; Alsaffar, M.S. Optimization of Clustering in Wireless Sensor Networks: Techniques and Protocols. Appl. Sci. 2021, 11, 11448. [Google Scholar] [CrossRef]
  31. Wohwe Sambo, D.; Yenke, B.O.; Förster, A.; Dayang, P. Optimized clustering algorithms for large wireless sensor networks: A review. Sensors 2019, 19, 322. [Google Scholar] [CrossRef] [Green Version]
  32. Daanoune, I.; Abdennaceur, B.; Ballouk, A. A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks. Ad Hoc Netw. 2021, 114, 102409. [Google Scholar] [CrossRef]
  33. Bhagat, A.; Geetha, G. A review of LEACH successors using single-hop and multi-hop communication model. In Proceedings of the International Conference on Futuristic Trends in Networks and Computing Technologies, Chandigarh, India, 22–23 November; pp. 3–13.
  34. Guleria, K.; Verma, A.K. Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks. Wirel. Netw. 2019, 25, 1159–1183. [Google Scholar] [CrossRef]
  35. Prasad, D.R.; Naganjaneyulu, P.V.; Prasad, K.S. Modified LEACH Protocols in Wireless Sensor Networks—A Review. In Proceedings of the 2nd International Conference on Micro-Electronics, Electromagnetics and Telecommunications; Springer: Singapore, 2018; pp. 681–688. [Google Scholar]
  36. Singh, S.K.; Kumar, P.; Singh, J.P. A Survey on Successors of LEACH Protocol. IEEE Access 2017, 5, 4298–4328. [Google Scholar] [CrossRef]
  37. Sabor, N.; Sasaki, S.; Abo-Zahhad, M.; Ahmed, S.M. A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: Review, taxonomy, and future directions. Wirel. Commun. Mob. Comput. 2017, 2017, 2818542. [Google Scholar] [CrossRef]
  38. Arora, V.K.; Sharma, V.; Sachdeva, M. A survey on LEACH and other’s routing protocols in wireless sensor network. Optik 2016, 127, 6590–6600. [Google Scholar] [CrossRef]
  39. Manjeshwar, A.; Agrawal, D.P. TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks. In Proceedings of the International Symposium on Parallel and Distributed Processing, San Francisco, CA, USA, 23–27 April 2001; Volume 1, p. 189. [Google Scholar]
  40. Manjeshwar, A.; Agrawal, D.P. APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. In Proceedings of the International Symposium on Parallel and Distributed Processing, Fort Lauderdale, FL, USA, 15–19 April 2002; p. 0195b. [Google Scholar]
  41. Kashaf, A.; Javaid, N.; Khan, Z.A.; Khan, I.A. TSEP: Threshold-sensitive stable election protocol for WSNs. In Proceedings of the 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 17–19 December 2012; pp. 164–168. [Google Scholar]
  42. Mahapatra, R.P.; Yadav, R.K. Descendant of LEACH based routing protocols in wireless sensor networks. Procedia Comput. Sci. 2015, 57, 1005–1014. [Google Scholar] [CrossRef] [Green Version]
  43. Dhawan, H.; Waraich, S. A comparative study on LEACH routing protocol and its variants in wireless sensor networks: A survey. Int. J. Comput. Appl. 2014, 95, 21–27. [Google Scholar] [CrossRef]
  44. Tyagi, S.; Kumar, N. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 623–645. [Google Scholar] [CrossRef]
  45. Bhattacharjee, A.; Bhallamudi, B.; Maqbool, Z. Energy-efficient hierarchical cluster based routing algorithm in WSN: A survey. Int. J. Eng. Res. Technol. 2013, 2, 302–311. [Google Scholar]
  46. Liu, X. A survey on clustering routing protocols in wireless sensor networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef]
  47. Ramesh, K.; Somasundaram, D.K. A comparative study of clusterhead selection algorithms in wireless sensor networks. arXiv 2012, arXiv:1205.1673. [Google Scholar] [CrossRef]
  48. Yao, Y.-D.; Li, X.; Cui, Y.-P.; Wang, J.-J.; Wang, C. Energy-Efficient Routing Protocol Based on Multi-Threshold Segmentation in Wireless Sensors Networks for Precision Agriculture. IEEE Sens. J. 2022, 22, 6216–6231. [Google Scholar] [CrossRef]
  49. Zhang, Y.; Ren, Q.; Song, K.; Liu, Y.; Zhang, T.; Qian, Y. An Energy Efficient Multi-Level Secure Routing Protocol in IoT Networks. IEEE Internet Things J. 2021, 9, 10539–10553. [Google Scholar] [CrossRef]
  50. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. Residual Energy Based Cluster-head Selection in WSNs for IoT Application. IEEE Internet Things J. 2019, 6, 5132–5139. [Google Scholar] [CrossRef] [Green Version]
  51. Kocakulak, M.; Butun, I. An overview of Wireless Sensor Networks towards internet of things. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; pp. 1–6. [Google Scholar]
  52. Anastasi, G.; Conti, M.; Di Francesco, M.; Passarella, A. Energy conservation in wireless sensor networks: A survey. Ad Hoc Netw. 2009, 7, 537–568. [Google Scholar] [CrossRef]
  53. Dargie, W.; Poellabauer, C. Fundamentals of Wireless Sensor Networks: Theory and Practice; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
  54. Sharma, D.; Tomar, G.S. Comparative energy evaluation of LEACH protocol for monitoring soil parameter in wireless sensors network. Mater. Today Proc. 2020, 29, 381–396. [Google Scholar] [CrossRef]
  55. Raghunathan, V.; Schurgers, C.; Sung, P.; Srivastava, M.B. Energy-aware wireless microsensor networks. IEEE Signal Process. Mag. 2002, 19, 40–50. [Google Scholar] [CrossRef]
  56. Halkes, G.P.; Van Dam, T.; Langendoen, K.G. Comparing energy-saving MAC protocols for wireless sensor networks. Mob. Netw. Appl. 2005, 10, 783–791. [Google Scholar] [CrossRef]
  57. Zagrouba, R.; Kardi, A. Comparative Study of Energy Efficient Routing Techniques in Wireless Sensor Networks. Information 2021, 12, 42. [Google Scholar] [CrossRef]
  58. Griotti, M.; Gandino, F.; Rebaudengo, M. Transitory master key transport layer security for WSNs. IEEE Access 2020, 8, 20304–20312. [Google Scholar] [CrossRef]
  59. Dias, G.M.; Margi, C.B.; de Oliveira, F.C.P.; Bellalta, B. Cloud-empowered, self-managing wireless sensor networks: Interconnecting management operations at the application layer. IEEE Consum. Electron. Mag. 2018, 8, 55–60. [Google Scholar] [CrossRef]
  60. Mishra, P.K.; Verma, S.K. A survey on clustering in wireless sensor network. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–5. [Google Scholar]
  61. Xu, L.; Collier, R.; O’Hare, G.M.P. A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet Things J. 2017, 4, 1229–1249. [Google Scholar] [CrossRef]
  62. Jia, D.; Zhu, H.; Zou, S.; Hu, P. Dynamic cluster head selection method for wireless sensor network. IEEE Sens. J. 2015, 16, 2746–2754. [Google Scholar] [CrossRef]
  63. Yi, S.; Heo, J.; Cho, Y.; Hong, J. PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Comput. Commun. 2007, 30, 2842–2852. [Google Scholar] [CrossRef]
  64. Vazhuthi, P.P.I.; Manikandan, S.P. Survey on Various Modified LEACH Hierarchical Protocols for Wireless Sensor Networks. In Proceedings of the International Conference on Emerging Current Trends in Computing and Expert Technology, Chennai, India, 22–23 March 2019; pp. 511–518. [Google Scholar]
  65. Ren, F.; Zhang, J.; He, T.; Lin, C.; Ren, S.K. Das EBRP: Energy-balanced routing protocol for data gathering in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 2108–2125. [Google Scholar] [CrossRef]
  66. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; p. 10. [Google Scholar]
  67. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  68. Handy, M.J.; Haase, M.; Timmermann, D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network, Stockholm, Sweden, 9–11 September 2002; pp. 368–372. [Google Scholar]
  69. Luan, W.; Zhu, C.; Su, B.; Pei, C. An improved routing algorithm on LEACH by combining node degree and residual energy for WSNs. In Internet of Things; Springer: Berlin/Heidelberg, Germany, 2012; pp. 104–109. [Google Scholar]
  70. Fu, C.; Jiang, Z.; Wei, W.E.I.; Wei, A. An energy balanced algorithm of LEACH protocol in WSN. Int. J. Comput. Sci. Issues 2013, 10, 354. [Google Scholar]
  71. Liang, Y.; Yu, H. Energy adaptive cluster-head selection for wireless sensor networks. In Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT’05), Dalian, China, 5–8 December 2005; pp. 634–638. [Google Scholar]
  72. Xiangning, F.; Yulin, S. Improvement on LEACH protocol of wireless sensor network. In Proceedings of the 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), Valencia, Spain, 14–20 October 2007; pp. 260–264. [Google Scholar]
  73. Zamry, N.M.; Zainal, A.; Rassam, M.A. LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. In Proceedings of the 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia, 29–31 January 2021; pp. 1–6. [Google Scholar]
  74. Voigt, T.; Dunkels, A.; Alonso, J.; Ritter, H.; Schiller, J. Solar-aware clustering in wireless sensor networks. In Proceedings of the ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No. 04TH8769), Alexandria, Egypt, 28 June–1 July 2004; Volume 1, pp. 238–243. [Google Scholar]
  75. Aslam, M.; Javaid, N.; Rahim, A.; Nazir, U.; Bibi, A.; Khan, Z.A. Survey of extended LEACH-based clustering routing protocols for wireless sensor networks. In Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, Liverpool, UK, 25–27 June 2012; pp. 1232–1238. [Google Scholar]
  76. Abuhelaleh, M.A.; Mismar, T.M.; Abuzneid, A.A. Armor-LEACH-energy efficient, secure wireless networks communication. In Proceedings of the 2008 17th International Conference on Computer Communications and Networks, St. Thomas, VI, USA, 3–7 August 2008; pp. 1–7. [Google Scholar]
  77. Oliveira, L.B.; Wong, H.C.; Bern, M.; Dahab, R.; Loureiro, A.A.F. SecLEACH-A random key distribution solution for securing clustered sensor networks. In Proceedings of the Network Computing and Applications, 2006, NCA 2006, Fifth IEEE International Symposium on Net-work Computing and Applications (NCA’06), Cambridge, MA, USA, 24–26 July 2006; pp. 145–154. [Google Scholar]
  78. Selvakennedy, S.; Sinnappan, S.S. A configurable time-controlled clustering algorithm for wireless sensor networks. In Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS’05), Fukuoka, Japan, 20–22 July 2005; Volume 2, pp. 368–372. [Google Scholar]
  79. Darabkh, K.A.; Wala’a, S.; Hawa, M.; Saifan, R. MT-CHR: A modified threshold-based cluster head replacement protocol for wireless sensor networks. Comput. Electr. Eng. 2018, 72, 926–938. [Google Scholar] [CrossRef]
  80. Ren, P.; Qian, J.; Li, L.; Zhao, Z.; Li, X. Unequal Clustering Scheme Based LEACH for Wireless Sensor Networks. In Proceedings of the 2010 Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen, China, 13–15 December 2010; pp. 90–93. [Google Scholar]
  81. Wang, A.; Yang, D.; Sun, D. A clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks. Comput. Electr. Eng. 2012, 38, 662–671. [Google Scholar] [CrossRef]
  82. Mahmood, D.; Javaid, N.; Mahmood, S.; Qureshi, S.; Memon, A.M.; Zaman, T. MODLEACH: A variant of LEACH for WSNs. In Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, 28–30 October 2013; pp. 158–163. [Google Scholar]
  83. Singh, D.; Nayak, S.K. Enhanced modified LEACH (EMODLEACH) protocol for WSN. In Proceedings of the 2015 International Symposium on Advanced Computing and Communication (ISACC), Silchar, India, 14–15 September 2015; pp. 328–333. [Google Scholar]
  84. Bsoul, M.; Al-Khasawneh, A.; Abdallah, A.E.; Abdallah, E.E.; Obeidat, I. An energy-efficient threshold-based clustering protocol for wireless sensor networks. Wirel. Pers. Commun. 2013, 70, 99–112. [Google Scholar] [CrossRef]
  85. Batra, P.K.; Kant, K. LEACH-MAC: A new cluster head selection algorithm for Wireless Sensor Networks. Wirel. Netw. 2016, 22, 49–60. [Google Scholar] [CrossRef]
  86. Amwary, A.; Maga, D.; Nahdi, T. Modified LEACH protocol for heterogeneous wireless networks. In Proceedings of the 2016 New Trends in Signal Processing (NTSP), Demanovska Dolina, Slovakia, 12–14 October 2016; pp. 1–4. [Google Scholar]
  87. Abidoye, A.P.; Obagbuwa, I.C. Models for integrating wireless sensor networks into the Internet of Things. IET Wirel. Sens. Syst. 2017, 7, 65–72. [Google Scholar] [CrossRef]
  88. Hussain, S.; Matin, A.W. Energy Efficient Hierarchical Cluster-Based Routing for Wireless Sensor Networks; Technical Report; Jodrey School of Computer Science Acadia University Wolfville: Wolfville, NS, Canada, 2005; pp. 1–33. [Google Scholar]
  89. Behera, T.M.; Nanda, S.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Gandomi, A.H. CH Selection via Adaptive Threshold Design Aligned on Network Energy. IEEE Sens. J. 2021, 21, 8491–8500. [Google Scholar] [CrossRef]
  90. Salem, A.O.A.; Shudifat, N. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquitous Comput. 2019, 23, 901–907. [Google Scholar] [CrossRef]
  91. Mehra, P.S.; Doja, M.; Alam, B. Stability enhancement in LEACH (SE-LEACH) for homogeneous WSN. EAI Endorsed Trans. Scalable Inf. Syst. 2019, 6, e5. [Google Scholar] [CrossRef] [Green Version]
  92. Panda, S.; Behera, T.M.; Samal, U.C.; Mohapatra, S.K. Modified threshold for cluster head selection in WSN using first and second order statistics. IET Wirel. Sens. Syst. 2020, 10, 292–298. [Google Scholar] [CrossRef]
  93. Wang, Y.; Li, C.; Duan, Y.; Yang, J.; Cheng, X. An energy-efficient and swarm intelligence-based routing protocol for next-generation sensor networks. IEEE Intell. Syst. 2014, 29, 74–77. [Google Scholar] [CrossRef]
  94. Amutha, J.; Sharma, S.; Sharma, S.K. Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Comput. Sci. Rev. 2021, 40, 100376. [Google Scholar] [CrossRef]
  95. Thiagarajan, R. Others Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks. Comput. Commun. 2020, 149, 90–98. [Google Scholar]
  96. Latiff, N.M.A.; Tsimenidis, C.C.; Sharif, B.S. Energy-aware clustering for wireless sensor networks using particle swarm optimization. In Proceedings of the 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Montreal, QC, Canada, 3–7 September 2007; pp. 1–5. [Google Scholar]
  97. Singh, B.; Lobiyal, D.K. A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Human-Centric Comput. Inf. Sci. 2012, 2, 13. [Google Scholar] [CrossRef] [Green Version]
  98. Rao, P.C.S.; Jana, P.K.; Banka, H. A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks. Wirel. Netw. 2017, 23, 2005–2020. [Google Scholar] [CrossRef]
  99. Karaboga, D.; Okdem, S.; Ozturk, C. Cluster based wireless sensor network routing using artificial bee colony algorithm. Wirel. Netw. 2012, 18, 847–860. [Google Scholar] [CrossRef]
  100. Ahmad, T.; Haque, M.; Khan, A.M. An energy-efficient cluster head selection using artificial bees colony optimization for wireless sensor networks. In Advances in Nature-Inspired Computing and Applications; Springer: Berlin/Heidelberg, Germany, 2019; pp. 189–203. [Google Scholar]
  101. Selvi, M.; Nandhini, C.; Thangaramya, K.; Kulothungan, K.; Kannan, A. HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the 2016 Eighth International Conference on Advanced Computing (ICoAC), Chennai, India, 19–21 January 2017; pp. 89–92. [Google Scholar]
  102. Sirdeshpande, N.; Udupi, V. Fractional lion optimization for cluster head-based routing protocol in wireless sensor network. J. Franklin Inst. 2017, 354, 4457–4480. [Google Scholar] [CrossRef]
  103. Vijayalakshmi, K.; Anandan, P. A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN. Cluster Comput. 2019, 22, 12275–12282. [Google Scholar] [CrossRef]
  104. Shankar, T. Whale Optimization Based Energy-Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks. arXiv 2017, arXiv:1711.09389. [Google Scholar]
  105. Pal, V.; Singh, G.; Yadav, R.P. Others Cluster head selection optimization based on genetic algorithm to prolong lifetime of wireless sensor networks. Procedia Comput. Sci. 2015, 57, 1417–1423. [Google Scholar] [CrossRef] [Green Version]
  106. Liu, J.-L.; Ravishankar, C. V LEACH-GA: Genetic algorithm-based energy-efficient adaptive clustering protocol for wireless sensor networks. Int. J. Mach. Learn. Comput. 2011, 1, 79. [Google Scholar] [CrossRef] [Green Version]
  107. Gandomi, A.H.; Alavi, A.H. Krill herd: A new bio-inspired optimization algorithm. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 4831–4845. [Google Scholar] [CrossRef]
  108. Shopon, M.; Adnan, M.A.; Mridha, M.F. Krill herd based clustering algorithm for wireless sensor networks. In Proceedings of the 2016 International Workshop on Computational Intelligence (IWCI), Dhaka, Bangladesh, 12–13 December 2016; pp. 96–100. [Google Scholar]
  109. Karthick, P.T.; Palanisamy, C. Optimized cluster head selection using krill herd algorithm for wireless sensor network. Automatika 2019, 60, 340–348. [Google Scholar] [CrossRef] [Green Version]
  110. Zhang, Z.; Hao, Z.; Zeadally, S.; Zhang, J.; Han, B.; Chao, H.-C. Multiple attributes decision fusion for wireless sensor networks based on intuitionistic fuzzy set. IEEE Access 2017, 5, 12798–12809. [Google Scholar] [CrossRef]
  111. Kim, J.-M.; Park, S.-H.; Han, Y.-J.; Chung, T.-M. CHEF: Cluster head election mechanism using fuzzy logic in wireless sensor networks. In Proceedings of the 2008 10th International Conference on Advanced Communication Technology, Gangwon, Korea, 17–20 February 2008; Volume 1, pp. 654–659. [Google Scholar]
  112. Lee, J.-S.; Cheng, W.-L. Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sens. J. 2012, 12, 2891–2897. [Google Scholar] [CrossRef]
  113. Azad, P.; Sharma, V. Cluster head selection in wireless sensor networks under fuzzy environment. ISRN Sens. Netw. 2013, 2013, 909086. [Google Scholar] [CrossRef] [Green Version]
  114. Nayak, P.; Devulapalli, A. A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens. J. 2015, 16, 137–144. [Google Scholar] [CrossRef]
  115. Mittal, N.; Singh, U.; Salgotra, R.; Sohi, B.S. A boolean spider monkey optimization based energy efficient clustering approach for WSNs. Wirel. Netw. 2018, 24, 2093–2109. [Google Scholar] [CrossRef]
Figure 1. Clustered-based WSN.
Figure 1. Clustered-based WSN.
Electronics 11 02282 g001
Figure 2. (a) ADV message. (b) REQ message.
Figure 2. (a) ADV message. (b) REQ message.
Electronics 11 02282 g002
Figure 3. Issues of clustering protocols.
Figure 3. Issues of clustering protocols.
Electronics 11 02282 g003
Figure 4. Sensor node structure.
Figure 4. Sensor node structure.
Electronics 11 02282 g004
Figure 5. Protocol stack for WSN.
Figure 5. Protocol stack for WSN.
Electronics 11 02282 g005
Figure 7. System model of a clustered sensor network.
Figure 7. System model of a clustered sensor network.
Electronics 11 02282 g007
Figure 8. Phases of LEACH protocol.
Figure 8. Phases of LEACH protocol.
Electronics 11 02282 g008
Figure 9. ADV message.
Figure 9. ADV message.
Electronics 11 02282 g009
Figure 10. Lifetime metrics comparison for BS location (50, 175).
Figure 10. Lifetime metrics comparison for BS location (50, 175).
Electronics 11 02282 g010
Figure 11. Lifetime metrics (a) n = 100 (b) n = 400. Deployment area = 100 × 100 m2. BS location (50, 50). Initial energy = 0.5 J.
Figure 11. Lifetime metrics (a) n = 100 (b) n = 400. Deployment area = 100 × 100 m2. BS location (50, 50). Initial energy = 0.5 J.
Electronics 11 02282 g011
Figure 12. Comparison graph of LEACH, LEACH-GA, and LEACH-KH. (a) Packet delivery ratio; (b) Residual Energy at Network half-life.
Figure 12. Comparison graph of LEACH, LEACH-GA, and LEACH-KH. (a) Packet delivery ratio; (b) Residual Energy at Network half-life.
Electronics 11 02282 g012
Table 1. Survey on LEACH-based Protocols.
Table 1. Survey on LEACH-based Protocols.
ReferenceDescriptionRemarks
Daanoune et al. [32], 2021Classified LEACH-based protocols based on CH selection, data transmission, and both CH selection and data transmission techniquesDiscusses the strength and weaknesses of LEACH-based protocols but fails to study bio-inspired LEACH variants
Bhagat et al. [33], 2020Reviews LEACH successors based on single-hop and multi-hop modelsCategorizes LEACH protocols based on the path of data transmission from CH to BS
Guleria et al. [34], 2019Classification is conducted based on classical and swarm-intelligence approachesHandling sink mobility, QoS requirement, and overhead due to dynamic topology in an energy constraint environment are still major issues
Prasad et al. [35], 2018Analysis of different hierarchical routing protocols that are modified from LEACH based on energy efficiency onlyDoes not provide any information about the method or modification in detail
Singh et al. [36], 2017Classification of LEACH successors based on single-hop and multi-hop communication is conducted, and comprehensive studies have been providedThe survey presents a detailed summary but fails to inform about the simulation or testing tool, or software used in network analysis
Sabor et al. [37], 2017Survey on classical-based and optimized-based routing protocols for mobile WSNsReal-work implantations, overheads, and computational time have not been explored
Arora et al. [38], 2016LEACH and its extensions were discussed and compared that prolong network lifespan. The survey is not limited to proactive protocols and also focuses on reactive protocols such as TEEN [39], APTEEN [40], and TSEP [41]The authors prove enhanced network lifetime with increased network area and distance to BS. However, the comparison conducted considered only a few protocols and variants of LEACH
Mahapatra et al. [42], 2015The timeline of LEACH and its descendants are compared based on selected features such as scalability and mobilityCompares considering a few parameters
Dhawan et al. [43], 2014Performance comparisons between LEACH protocol variants are made Less number of examples discussed
Tyagi et al. [44], 2013Highlights advantages and disadvantages of various routing protocols inspired by LEACH where CH selection plays an important role.A brief comparison in terms of the CH selection process, load balancing, routing, and security
Bhattacharjee et al. [45], 2013Performance measurements of energy-efficient protocols conductedImprovement regarding application-specific deployment of nodes needs to be conducted
X Liu [46], 2012A comprehensive survey of clustering routing protocols is conductedGives an idea about possible future research directions
Ramesh [47], 2012Comparative study of CH selection algorithmScalability and stability factors are not explored
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Behera, T.M.; Samal, U.C.; Mohapatra, S.K.; Khan, M.S.; Appasani, B.; Bizon, N.; Thounthong, P. Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics 2022, 11, 2282. https://doi.org/10.3390/electronics11152282

AMA Style

Behera TM, Samal UC, Mohapatra SK, Khan MS, Appasani B, Bizon N, Thounthong P. Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics. 2022; 11(15):2282. https://doi.org/10.3390/electronics11152282

Chicago/Turabian Style

Behera, Trupti Mayee, Umesh Chandra Samal, Sushanta Kumar Mohapatra, Mohammad S. Khan, Bhargav Appasani, Nicu Bizon, and Phatiphat Thounthong. 2022. "Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance" Electronics 11, no. 15: 2282. https://doi.org/10.3390/electronics11152282

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop