A Novel Clustering Solution Based on Energy Threshold for Energy Efficiency Purposes in Wireless Sensor Networks
DOI:
https://doi.org/10.62411/jcta.13022Keywords:
Cluster head selection, Energy-aware clustering, Energy-efficient protocol, Reactive routing protocol, Small-scale sensor networks, Threshold-based data transmission, Wireless sensor networks, WSN life-time optimizationAbstract
In many wireless sensor network (WSN) applications, nodes are randomly deployed and self-organize into a wireless network to perform tasks. In practice, recharging the batteries of network nodes after deployment is often difficult. Network nodes often operate autonomously, so the main focus is on increasing the node lifetime. Data redundancy is another limitation that makes nodes inefficient. In most cases, densely deployed nodes in a monitoring area will have redundant data from neighboring nodes. Therefore, we propose a clustering technique to select the Cluster Head (CH) node in small-scale WSNs. Since transmission consumes more energy than data collection, this protocol enables reactive routing, where transmission occurs only when a certain threshold is reached. In addition, based on their heterogeneous energy levels, nodes can be grouped into three categories: Normal, Intermediate, and Advanced. Simulation results in MATLAB/Simulink show that, after approximately 3000 rounds, the proposed method successfully transmitted about 3.1 × 104 packets to the base station, compared to 2.3 × 104 packets for the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. In addition, the time when the last node died was approximately 3,500 rounds, whereas the LEACH protocol only maintained about 1,500 rounds. The results have shown the effectiveness of this technique in reducing the dead node rate and increasing packet transmission efficiency.References
B. Dalal and S. Kukarni, “Wireless Sensor Networks: Applications,” in Wireless Sensor Networks - Design, Deployment and Applications, IntechOpen, 2021. doi: 10.5772/intechopen.97079.
D. K. Kwon, S. J. Yu, J. Y. Lee, S. H. Son, and Y. H. Park, “WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks,” Sensors, vol. 21, no. 3, p. 936, Jan. 2021, doi: 10.3390/s21030936.
J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Networks, vol. 52, no. 12, pp. 2292–2330, Aug. 2008, doi: 10.1016/j.comnet.2008.04.002.
Minh Tuan Nguyen and K. A. Teague, “Tree-based energy-efficient data gathering in wireless sensor networks deploying compres-sive sensing,” in 2014 23rd Wireless and Optical Communication Conference (WOCC), May 2014, pp. 1–6. doi: 10.1109/WOCC.2014.6839920.
M. T. Nguyen, “Minimizing energy consumption in random walk routing for Wireless Sensor Networks utilizing Compressed Sensing,” in 2013 8th International Conference on System of Systems Engineering, Jun. 2013, pp. 297–301. doi: 10.1109/SYSoSE.2013.6575283.
A. K. Koshariya, D. Kalaiyarasi, A. A. Jovith, T. Sivakami, D. S. Hasan, and S. Boopathi, “AI-Enabled IoT and WSN-Integrated Smart Agriculture System,” in Artificial Intelligence Tools and Technologies for Smart Farming and Agriculture Practices, 2023, pp. 200–218. doi: 10.4018/978-1-6684-8516-3.ch011.
H. Benyezza, M. Bouhedda, R. Kara, and S. Rebouh, “Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture,” Internet of Things, vol. 23, p. 100830, Oct. 2023, doi: 10.1016/j.iot.2023.100830.
A. M. K. Abdulzahra, A. K. M. Al-Qurabat, and S. A. Abdulzahra, “Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods,” Internet of Things, vol. 22, p. 100765, Jul. 2023, doi: 10.1016/j.iot.2023.100765.
H. Radhappa, L. Pan, J. Xi Zheng, and S. Wen, “Practical overview of security issues in wireless sensor network applications,” Int. J. Comput. Appl., vol. 40, no. 4, pp. 202–213, Oct. 2018, doi: 10.1080/1206212X.2017.1398214.
M. T. Nguyen and K. A. Teague, “Random sampling in collaborative and distributed mobile sensor networks utilizing compressive sensing for scalar field mapping,” in 2015 10th System of Systems Engineering Conference (SoSE), May 2015, pp. 1–6. doi: 10.1109/SYSOSE.2015.7151962.
N. N. Malik, W. Alosaimi, M. I. Uddin, B. Alouffi, and H. Alyami, “Wireless Sensor Network Applications in Healthcare and Pre-cision Agriculture,” J. Healthc. Eng., vol. 2020, pp. 1–9, Nov. 2020, doi: 10.1155/2020/8836613.
P. Nayak, G. K. Swetha, S. Gupta, and K. Madhavi, “Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities,” Measurement, vol. 178, p. 108974, Jun. 2021, doi: 10.1016/j.measurement.2021.108974.
J. Luo, Y. Chen, M. Wu, and Y. Yang, “A Survey of Routing Protocols for Underwater Wireless Sensor Networks,” IEEE Commun. Surv. Tutorials, vol. 23, no. 1, pp. 137–160, 2021, doi: 10.1109/COMST.2020.3048190.
C. V. Mahamuni and Z. M. Jalauddin, “Intrusion Monitoring in Military Surveillance Applications using Wireless Sensor Networks (WSNs) with Deep Learning for Multiple Object Detection and Tracking,” in 2021 International Conference on Control, Automation, Power and Signal Processing (CAPS), Dec. 2021, pp. 1–6. doi: 10.1109/CAPS52117.2021.9730647.
A. J. Sam and C. Vijaykumar Mahamuni, “A Wireless Sensor Network (WSN) Prototype for Scouting and Surveillance in Military and Defense Operations using Extended Kalman Filter (EKF) and FastSLAM,” SSRN Electron. J., 2022, doi: 10.2139/ssrn.4235160.
R. Vankdothu, M. A. Hameed, H. Fatima, and A. Subbarao, “Multicast Scaling in Heterogeneous Wireless Sensor Networks for Security and Time Efficiency,” Wirel. Pers. Commun., Feb. 2025, doi: 10.1007/s11277-024-11696-x.
M. Adil, M. A. Almaiah, A. Omar Alsayed, and O. Almomani, “An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks,” Sensors, vol. 20, no. 8, p. 2311, Apr. 2020, doi: 10.3390/s20082311.
M. Mamdouh, M. A. I. Elrukhsi, and A. Khattab, “Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey,” in 2018 International Conference on Computer and Applications (ICCA), Aug. 2018, pp. 215–218. doi: 10.1109/COMAPP.2018.8460440.
M. Tuan Nguyen, K. A. Teague, and N. Rahnavard, “CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing block-wise compressive sensing,” Comput. Networks, vol. 106, pp. 171–185, Sep. 2016, doi: 10.1016/j.comnet.2016.06.029.
M. T. Nguyen and K. A. Teague, “Compressive sensing based random walk routing in wireless sensor networks,” Ad Hoc Networks, vol. 54, pp. 99–110, Jan. 2017, doi: 10.1016/j.adhoc.2016.10.009.
M. T. Nguyen and N. Rahnavard, “Cluster-Based Energy-Efficient Data Collection in Wireless Sensor Networks Utilizing Com-pressive Sensing,” in MILCOM 2013 - 2013 IEEE Military Communications Conference, Nov. 2013, pp. 1708–1713. doi: 10.1109/MILCOM.2013.289.
T. Rault, A. Bouabdallah, and Y. Challal, “Energy efficiency in wireless sensor networks: A top-down survey,” Comput. Networks, vol. 67, pp. 104–122, Jul. 2014, doi: 10.1016/j.comnet.2014.03.027.
M. T. Nguyen and K. A. Teague, “Compressive Sensing Based Data Gathering in Clustered Wireless Sensor Networks,” in 2014 IEEE International Conference on Distributed Computing in Sensor Systems, May 2014, pp. 187–192. doi: 10.1109/DCOSS.2014.11.
X. Fu, H. Yao, and Y. Yang, “Modeling and analyzing cascading dynamics of the clustered wireless sensor network,” Reliab. Eng. Syst. Saf., vol. 186, pp. 1–10, Jun. 2019, doi: 10.1016/j.ress.2019.02.009.
A. I. Al-Sulaifanie, B. K. Al-Sulaifanie, and S. Biswas, “Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review,” Comput. Commun., vol. 191, pp. 395–424, Jul. 2022, doi: 10.1016/j.comcom.2022.05.006.
A. Gambhir, A. Payal, and R. Arya, “Comparative Analysis of SEP, I-SEP, LEACH and PSO-Based Clustering Protocols in WSN,” in Soft Computing: Theories and Applications, 2020, pp. 609–615. doi: 10.1007/978-981-15-0751-9_57.
A. R. Khan, N. Rakesh, A. Bansal, and D. K. Chaudhary, “Comparative study of WSN Protocols (LEACH, PEGASIS and TEEN),” in 2015 Third International Conference on Image Information Processing (ICIIP), Dec. 2015, pp. 422–427. doi: 10.1109/ICIIP.2015.7414810.
O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mob. Comput., vol. 3, no. 4, pp. 366–379, Oct. 2004, doi: 10.1109/TMC.2004.41.
S. Bharany et al., “Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol,” En-ergies, vol. 14, no. 19, p. 6016, Sep. 2021, doi: 10.3390/en14196016.
H. A. Sahib, S. Kurnaz, A. H. Mohammed, and Z. A. Sahib, “Network of Low Energy Adaptive Clustering Protocols,” in 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Oct. 2020, pp. 1–5. doi: 10.1109/ISMSIT50672.2020.9254821.
S. O. Ooko and S. M. Karume, “Application of Tiny Machine Learning in Predicative Maintenance in Industries,” J. Comput. Theor. Appl., vol. 2, no. 1, pp. 131–150, Aug. 2024, doi: 10.62411/jcta.10929.
M. D. Nguyen, M. T. Nguyen, T. C. Vu, T. M. Ta, Q. A. Tran, and D. T. Nguyen, “A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes,” J. Comput. Theor. Appl., vol. 2, no. 1, pp. 102–117, Jul. 2024, doi: 10.62411/jcta.10486.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Thang C. Vu, Binh D. Do, Mui D. Nguyen, Dung T. Nguyen, Tao V. Nguyen, Long Q. Dinh, Hung T. Nguyen, Minh T. Nguyen

This work is licensed under a Creative Commons Attribution 4.0 International License.













