Next Article in Journal
Pressure-Relieving Effect of Different Insole Top Covers in People with Diabetes at High Risk of Foot Ulceration
Previous Article in Journal
Photobleaching Effect on the Sensitivity Calibration at 638 nm of a Phosphorus-Doped Single-Mode Optical Fiber Dosimeter
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimizing Rule Weights to Improve FRBS Clustering in Wireless Sensor Networks

by
Jose-Enrique Muñoz-Exposito
1,†,
Antonio-Jesus Yuste-Delgado
1,*,†,
Alicia Triviño-Cabrera
2,‡ and
Juan-Carlos Cuevas-Martinez
1,†
1
Department of Telecommunication Engineering, Universidad de Jaén, 23700 Linares, Spain
2
Department of Electrical Engineering, Universidad de Málaga, 29071 Málaga, Spain
*
Author to whom correspondence should be addressed.
Current address: Escuela Politécnica Superior de Linares, Universidad de Jaén, Avenida de la Universidad s/n, 23700 Linares, Spain.
Current address: Escuela de Ingenierías Industriales, Universidad de Málaga, Campus de Teatinos, C/Doctor Ortiz Ramos s/n, 29071 Málaga, Spain.
Sensors 2024, 24(17), 5548; https://doi.org/10.3390/s24175548
Submission received: 31 July 2024 / Revised: 21 August 2024 / Accepted: 26 August 2024 / Published: 27 August 2024
(This article belongs to the Section Sensor Networks)

Abstract

:
Wireless sensor networks (WSNs) are usually composed of tens or hundreds of nodes powered by batteries that need efficient resource management to achieve the WSN’s goals. One of the techniques used to manage WSN resources is clustering, where nodes are grouped into clusters around a cluster head (CH), which must be chosen carefully. In this article, a new centralized clustering algorithm is presented based on a Type-1 fuzzy logic controller that infers the probability of each node becoming a CH. The main novelty presented is that the fuzzy logic controller employs three different knowledge bases (KBs) during the lifetime of the WSN. The first KB is used from the beginning to the instant when the first node depletes its battery, the second KB is then applied from that moment to the instant when half of the nodes are dead, and the last KB is loaded from that point until the last node runs out of power. These three KBs are obtained from the original KB designed by the authors after an optimization process. It is based on a particle swarm optimization algorithm that maximizes the lifetime of the WSN in the three periods by adjusting each rule in the KBs through the assignment of a weight value ranging from 0 to 1. This optimization process is used to obtain better results in complex systems where the number of variables or rules could make them unaffordable. The results of the presented optimized approach significantly improved upon those from other authors with similar methods. Finally, the paper presents an analysis of why some rule weights change more than others, in order to design more suitable controllers in the future.

Graphical Abstract

1. Introduction

Nowadays, wireless sensor networks (WSNs) are experiencing increasing importance due to Internet of Things (IoT) applications [1], which gather information from a wide variety of environments, such as health monitoring [2], smart cities [3], industrial facilities [4], vehicles [5], greenhouses [6], etc. These WSNs are composed of tens or hundreds of small devices called nodes or motes [7]. These nodes have limited processing and storage capabilities due to the fact that they are usually isolated and battery powered, as well as needing a wireless interface to communicate to the base station or directly to the Internet through a gateway using, e.g., LoRaWan technology [8].
As commented previously, nodes are commonly powered with batteries because most WSN applications do not allow a power connection to the electric grid. Moreover, those batteries are usually difficult to recharge, so efficient resource management is required in every node, mainly when they have to send data, which is the most energy-demanding process in a node. Among the several techniques used in WSNs to achieve efficient resource management (e.g., duty cycle scheduling [9] and data aggregation [10]), clustering appears one of the most important due to its capability to reduce the distance to send data [11]. Thus, with clustering it is possible to considerably decrease the energy spent in communications, and it can also be applied with other techniques like data aggregation.
Clustering is based on the premise of selecting some nodes among the total of the WSN. These nodes are called cluster heads (CH) and they are selected based on an algorithm. The remaining nodes choose one of those CHs to send their data to them. After receiving information from normal nodes (e.g., temperature, humidity, gas concentration, etc.), a CH aggregates these data and sends them to a base station (BS) or to a new layer of CHs when the network has a set hierarchy [11]. This process of selecting a set of CHs is commonly known as a r o u n d . A r o u n d consists of selecting the CHs, gathering information from the nodes via the CHs, and the transmission of the data from the CHs to the BS. In centralized clustering methods, it is usual that the BS initiates each r o u n d , whereas in distributed methods this process usually requires some kind of scheduling, due to the lack of a common reference.
Considering how clustering can be applied to the management of WSNs, it can be developed in several ways. Consequently, Figure 1 shows some of the most common approaches for clustering of WSNs.
According to Figure 1, the first level in the classification takes into account how long the current selection of CHs is maintained. Thus, the s k i p parameter defines how many r o u n d s will have the same CHs, avoiding the selection of these nodes in the second and ongoing rounds. Therefore, when the s k i p parameter is greater than one, the whole network can save the energy of selecting CHs, which always requires sending new control messages. Thus, as far as s k i p is concerned, most reviewed works renew the nodes that are selected as CHs each r o u n d ; therefore, this is equivalent to employing a value of one for s k i p , so that new CHs are selected for each r o u n d  [12].
Sometimes, the s k i p value changes over time depending on the network conditions. In [13], the authors defined a s k i p based on the output of a fuzzy controller. In [14], the authors proposed a semi-distributed method where the BS defines the s k i p value, while the CHs are selected by a fuzzy controller whose inputs are statistically normalized based on the data gathered from each node. A variable s k i p value was also computed in [15]. In this approach, nodes become CHs depending on prediction of the energy waste of being a CH.
The next level in the taxonomy in Figure 1 refers to the exact point at which the decision of selecting a node as a CH is performed. Thus, if the algorithm that determines the CH selection runs at a unique point like the BS, this is a centralized method. Conversely, if each node promotes itself as a CH depending on an internal processing that considers the data gathered by that node, the clustering is defined as a distributed method. Thus, in cases where the awareness of the whole network is high, centralized clustering algorithms usually perform significantly better than distributed ones. However, the acquisition of data often requires more complex processes of information interchange and the use of additional hardware like GPS devices in the nodes to obtain their precise location.
The way in which centralized and distributed clustering methods select CHs can be achieved by stochastic or heuristic methods or by some kind of artificial intelligence technique like fuzzy control or genetic algorithms, among others. For example, ref. [16] presented a centralized method that uses two heuristic equations to classify nodes: the first is based on coverage and the second on node connectivity. In [17], the authors used a particle swarm optimization (PSO) strategy to select the CHs. In addition, machine learning techniques are widely applied to WSN management, as pointed out in [18]. Fuzzy rule-based systems (FRBS) are the most common approach in these kinds of applications. In [19], the CH candidates were sorted based on a Type-II fuzzy system. In [20], an expert system was used with three variables to choose the best nodes to become CHs. Finally, as can be observed in Figure 1, the BS in a WSN application can be in a fixed location or it can move along a sensing path to cover all the nodes in the network. It must be noted that BS mobility allows more efficient data gathering, because it can be closer to the contributing nodes or CHs. With this approach, they will spend less energy and it also can cover a larger area [21]. However, the visits of the BS to a group of nodes must be carefully synchronized with the instant that they are ready to send data and considering the distance that the BS has to move.
As was previously mentioned, fuzzy control systems are usually applied in clustering methods [22]. However, the design of the knowledge base is a demanding task because it depends on the expert knowledge of the research team. In addition, when the number of variables and fuzzy sets are high, the definition of precise rules becomes a challenging problem. This often results in rules that have minimal effect in the developed method, while they waste computational time in the fuzzy engine. Moreover, in the case of applying clustering for WSN lifetime maximization, there are three instants that are usually studied [23]: the instant when the first node depletes its battery (or dies), called first node dies (FND); the r o u n d when half of the nodes are dead, or half of the nodes have died (HND); and the moment when the last alive node dies, or last node dies (LND). Thus, when a clustering method tries to maximize those parameters, one may be improved but the other two parameters could be negatively affected. This is a common problem of multi-objective optimization in WSNs [24] (the Pareto front), which degrades WSN performance. Consequently, a research team should make certain trade-offs according to the application they are studying. In particular, they should choose which of the parameters (FND, HND, or LND) is more important for the application. Therefore, in this paper, we present the optimization of the knowledge base of a Type-1 fuzzy control system adapted to the particular performance metric (FND, HND, or LND) that is expected to be improved. The proposed clustering method was applied in a WSN that was deployed in a rectangular area whose s k i p value was equal to 1. The clustering method employed was centralized with a BS in a fixed location for the entire duration of the application.
The main contribution of the present research paper is the definition of a centralized fuzzy controlled clustering algorithm ruled by three stages, as a result of a PSO optimization process or CFC3PSO. In each of the aforementioned stages, a different knowledge base is used, which, as mentioned above, is the product of an optimization process. According to our previous research, the application of three different KBs, which are the result of an incremental optimization performed by a PSO system, represents a certain innovation in the field of clustering. Therefore, the reason for using the presented optimization process to improve the performance of a WSN in its three phases of operation (up to FND, from FND to HND, and from HND to LND), taking into account three possible deployments of the base station, was because we wanted to achieve a clustering algorithm that can adapt to different deployments of the WSN, without having to make adjustments. Thus, the knowledge bases used in the fuzzy system for the selection of the CHs are prepared for situations in which the BS is inside the deployment area, as well as if the BS is in its vicinity, or even far from it. Consequently, this clustering method was developed using a optimization process based on a PSO that detects which rules of the entire knowledge base are meaningful for the clustering method in order to maximize the value of one of the three parameters (FND, HND, and LND). Moreover, as a consequence of the optimization process, the processing in the BS can be faster, because less relevant rules can be omitted from the fuzzy control system. Thus, after the optimization process, each rule is assigned a weight for one of the performance metrics (FND, HND, and LND). If the WSN application needs, for example, a highest LND, only the set of fuzzy rules with high weights for that parameter are chosen, while the rules with low weight values will barely affect that application and, consequently, they will be removed. In addition, the optimization process can detect those rules that are not meaningful for maximizing any of the three parameters, which helps with the analysis of the design process and can result in modifications that improve the system, such as removing, adding, or tuning fuzzy sets; suppressing or adding fuzzy variables; etc.
This paper is organized as follows: Section 2 presents the optimization algorithm for the rule base in a clustering application for WSNs. Then, in Section 3, the results of the proposed algorithm are shown within a specific scenario, while, in Section 4, we discuss how to interpret the final rule base and the weights obtained for the rules. Finally, the paper ends with Section 5, where the conclusions of the present work are presented.

2. Materials and Methods

This section describes the optimization process that determines the weights to be assigned to each rule in the knowledge base of a fuzzy control system used for a clustering method in a WSN. The optimization process is performed by a PSO algorithm, which will be described later in this section. The section is structured as follows:
  • A brief description of fuzzy logic: some concepts related to fuzzy logic will be introduced, for example, input and output variables and knowledge base (see Section 2.1).
  • The clustering algorithm developed for the present approach is detailed (see Section 2.2.)
  • The energy model for radio communications between nodes in the WSN is described (see Section 2.3).
  • The simulation scenarios used for the optimization process (area dimensions, number of nodes, mode of deployment, etc.). This subsection also includes a brief description of the network model used in the simulations (see Section 2.4)
  • The optimization process based on PSO is described (see Section 2.5).
It should be noted that the optimization process simulates different WSN deployments in three scenarios to obtain the final weight of the rules. Consequently, these simulations need an energy model (see Section 2.3) to evaluate the energy consumed by the nodes in their communication and internal processing (e.g., data aggregation).

2.1. Description of the Fuzzy System

Fuzzy logic [25,26] is applied to numerous scientific fields and to engineering in multiple types of applications, including denial-of-service cyber-attacks [27], flying ad hoc networks [28], microgrid systems [29], electric vehicles [30], and earthquake control [31], among others. The well-known structure of a fuzzy controller can be observed in Figure 2. A fuzzy controller is characterized by a knowledge base (KB) that contains the fuzzy rules that relate the input variables to the output variables. These rules are formed by a series of linguistic variables whose values represent the design of the fuzzy sets for any quantity or information that the fuzzy controller needs. In order to use the value of an input variable in the fuzzy controller, its crisp value must be first fuzzified, transforming this numerical value into a membership degree of the different fuzzy sets. These fuzzy values are then put together using the rules of the KB to obtain the fuzzy values of the output variables, which are defuzzified to obtain the final output of the fuzzy system. For this proposal, we decided to use a Mamdani system, so that the final output is the centroid of the aggregated output fuzzy sets.
Taking into account the fuzzy system designed for this paper, we selected some of the most common input variables used by other authors for clustering in WSNs. It must be also stated that the design of the fuzzy sets for all of these variables was the same, defining three triangular shapes (because they were for a Type-1 fuzzy system), as depicted in Figure 3. Thus, the input variables used in the present optimization process were the following:
  • Distance to the base station ( d B S ). This input is considered in most fuzzy controllers [32,33] because it informs about the dispersion of the nodes. The degree of dispersion is critical when nodes are only powered by batteries. This variable measures the normalized distance of each node to the BS using the maximum distance of a node to the BS as the normalization parameter.
  • Centrality (C). This variable is calculated based on the distance of the nodes in a CH to the center of the sensing area of their cluster [20]. In this approach, we use the Kmeans [34] function to find the center of the every area, and then the distance from each node to the center of that area is calculated.
  • Node degree ( N D ). This parameter is the number of neighbors that each node has. We assume that a neighbor is a node that is closer than d 0 meters ( d 0 is a constant of the radio model that will be detailed later (see Equation (3)) [35]. The neighbors of each node are then normalized by the maximum number of neighbors reached by one node in the set of the complete WSN.
  • Residual energy ( R E ). This value is used in most clustering methods for WSNs [36,37]. It is normalized by the maximum initial energy of the nodes, which is assumed to be equivalent for all of them.
  • CH rotation ( C H R ). This input variable informs about the number of times a node has been selected as a CH [38]. The reason for incorporating this variable into the fuzzy system is to limit the intensive use of energy in a node when it is selected as CH in continuous or very close rounds. In this approach, C H R is calculated as in Equation (1), where t i m e s C H is the number of times a node has been selected as the CH. Every time a node is promoted to CH, t i m e s C H is incremented by one and then normalized by the maximum value of this parameter for each r o u n d .
C H R = 1 t i m e s C H m a x ( t i m e s C H )
Following with the design of the fuzzy system, all input variables except d B S are defined by linguistic values: low (l), medium (m), and high (h). In the case of d B S , the fuzzy sets are named close (c), adequate (a), and far (f). The exact design of the fuzzy sets for the input variables is depicted in Figure 3.
Regarding the output of the proposed fuzzy control system, it only has one variable, defined as the chance of a node becoming a CH. Therefore, if the conditions that surround a node are propitious, the fuzzy system will infer a high chance, whereas in other cases, the chance obtained will reduce the possibilities of a node becoming a CH. It must be noted that the proposed clustering method is centralized. This means that all the executions of the fuzzy engine are accomplished by the BS, so that, for each r o u n d , the BS evaluates every node, executing the inference engine with the values for the input variables and obtaining the chance for all the nodes (the selection algorithm will be detailed in Section 2.2). Nevertheless, the output variable c h a n c e has a more complex layout that the input variables, being defined by 11 triangular fuzzy sets, as can be observed in Figure 3. The names of the fuzzy sets are as follows: very very weak (vvw), very weak (vw), weak (w), little lower medium (llm), lower medium (lm), higher medium (hm), medium (m), little higher medium (lhm), little strong (ls), strong (s), very strong (vs), and very very strong (vvs).
We defined 11 fuzzy sets for the output variable, because the number of output fuzzy sets depends, to some extent, on the number of rules. Therefore, when there are many rules, the number of fuzzy sets should be increased. When the number of inputs is small and has few sets, there are few rules and the output is usually in five sets, when the number of inputs is increased, the output is usually increased. In [39], the fuzzy system used four inputs, and consequently the output variable was composed of seven fuzzy sets. In our case, by increasing the number of inputs to five, we decided to increase the number of fuzzy sets of the output to 11, thus also increasing the variability, which allows greater adaptability in the optimization process. In particular, triangular sets were used because they also provide an immediate solution to the optimization problems that arise in fuzzy modeling [40].
Continuing with the description of the fuzzy control system, the knowledge base, as was previously mentioned, binds the inputs and the output through a set of linguistic rules that were designed by the research team based on their expert knowledge. For this approach, there are five input variables defined by three fuzzy sets each. As a result, the total number of rules to define is 3 5 = 243 rules. All these rules were stored in a Excel file and can be consulted at the published dataset (See data availability statement). As an example, an excerpt of the rules can be found in Table 1.
As can be observed in Table 1, the initial weight of the three rules is set to one (as for all the other rules not shown initially). Then, as detailed later in the paper, these weights are optimized for three different BS locations to obtain a general approximation for different types of scenarios.
Returning to the rules presented in Table 1, the first rule represents the situation of a node that is close to the BS but with a low centrality and node degree. This means that the node has poor connectivity. It also has a low energy and has been moderately selected as a CH. Consequently, this node will have a medium probability (llm). In the case of the second rule, the node is placed in an adequate location, it also has a good connectivity (C and N D high), but its energy is decreasing and it has been selected several times previously as a CH. Thus, the output probability will be better than the first rule, giving a value of ls. For the third rule, although the node was placed far from the BS, all other variables are sufficiently good, so the chance value should be strong (s).

2.2. Clustering Algorithm

After describing the fuzzy system designed for the clustering method CFC3PSO, it is necessary to detail the algorithm that governs the CH selection in the whole WSN. As mentioned before, the proposed clustering method is centralized. Consequently, the BS has to perform all the processing and then communicate the results to the nodes. In order to minimize the information exchanged between the nodes and the BS, the BS calculates or estimates all the values it needs from the nodes, because some of them are then related to the node location ( d B S , C, N D ), which needs to be communicated or estimated only once based on the received signal strength indicator (RSSI). In the same way, the BS knows the history of each node, so it can perfectly know C H R . Thus, the unique information that the BS has to calculate based on an estimation of the energy used by each node in each r o u n d is the residual energy R E . Therefore, with all these values, in each r o u n d ( s k i p = 1 ), the BS performs the following steps:
  • The BS calculates or estimates the input values for every alive node in the network.
  • The BS runs the fuzzy controller for every node to obtain its c h a n c e .
  • The chances are sorted from the maximum value to the lowest.
  • The BS selects the N nodes with the highest probability value, which become CHs. The value of N is determined by the optimum number of CHs defined for LEACH [12], calculated as N = 0.05 T , with T being the total number of nodes.
  • The BS sends a broadcast message with the selected CHs.
  • Contributing nodes send their data to the closest CH.
  • Each CH aggregates the received data and sends them to the BS.
Obviously, all the tasks in the previous algorithm assume an energy cost that is mainly consumed by the BS. However, all the alive nodes have to receive and send a message per r o u n d , so the selection of the right CHs is of paramount importance to reduce the transmission distances and consequently the energy consumed in the communication. Therefore, the right selection of the CHs will increase the lifetime of the WSN and its application can be carried out for a longer time. Thus, in order to evaluate the lifetime of a WSN with the proposed clustering method, the three metrics presented above are used: FND, HND, and LND.
As was mentioned previously, the rules of the KB can differently affect these three metrics (FND, HND, and LND). For example, one rule can increase FND, while it decrements HND or LND. Moreover, keeping the same weight for all the rules for the entire lifetime of the network may not be beneficial for all the metrics. Consequently, we propose a weight tuning for each rule for the three stages that the instants FND, HND, and LND delimit. Thus, we have three KBs, which are as follows:
  • from the first r o u n d to FND, we use an initial KB.
  • From FND to HND, we rely on an intermediate KB.
  • From HND to LND, we work with the final KB.
Thus, to obtain the three different KBs, the weights of the rules are optimized following the process depicted in Figure 4.
According to Figure 4, to carry out the optimization process, the initial stage starts with all the rules with a weight of one, to obtain the best weights that maximize the value of FND, so we obtain the initial KB or K B i n i t i a l . It should be noted that, for the whole optimization process, we use a set of scenarios that define different WSN deployments with common parameters (the size of the deployment area, number of nodes, etc.) The details can be found in Section 2.4. In the second phase of the optimization process, K B i n i t i a l is used as the initial KB, until the simulation reaches FND. After that point, the weights of the rules are optimized again to obtain the best HND. The resulting KB is called K B i n t e r m e d i a t e . The third step of the optimization process again takes K B i n i t i a l as the first until FND, then changes to K B i n t e r m e d i a t e from FND to HND, and then the weights are optimized to find the best LND to finally obtain a new KB named K B f i n a l .
Therefore, the final clustering method is based on the three different KBs that are employed in different stages over the network’s lifetime. These KBs mainly differ in the weights of their rules. Moreover, due to the fact that the clustering method is centralized, a change in the KB in the fuzzy controller in the BS does not entail any energetic effort or complex operation. Once the three sets of weights have been obtained, they can be studied to interpret some of the proposed rules, taking into account the lifetime of the WSN and their role in the KB.

2.3. Energy Model

The optimization of the weights in the three KBs requires performing WSN simulations. In this process, it is required to model the energy spent in the communication of the nodes. In our case, this was based on the first-order radio model detailed in [41]. This well-known model defines a set of equations that take into account the energy spent in the data exchange between radio devices, like those installed in the nodes. In addition, it is a reference widely used in the related literature. The main equations of the model are shown in Equations (2)–(4). This energy model calculates the energy spent in the transmitter and in the receiver based on the length in bits of the data message and the distance between them, assuming free space and multi-path fading channels. Thus, the energy consumed by the transmitter is detailed in Equation (2), while the energy spent by the receiver is shown in Equation (4).
E T x ( l , d ) = f ( x ) = l · ( E e l e c + E f s · d 2 ) , d d 0 l · ( E e l e c + E m p · d 4 ) , d > d 0
d 0 = E f s E m p
E R x ( l ) = E e l e c · l
where
  • l defines the number of bits of the message.
  • E e l e c measures the energy in Joules that the circuitry of the transmitter and the receiver consumes for each bit sent or received, respectively.
  • d is the distance in meters between the source and the destination of the message.
  • E f s stands for the energy in Joules that the amplifier consumes in order to obtain a acceptable bit error rate, according to the free space model ( d d 0 ) .
  • E m p is the energy in Joules that the amplifier consumes to obtain an suitable bit error rate in the multi-path (mp) model ( d d 0 ) .
This model also takes into account the reception of data and the aggregation process in every CH [42]. In a WSN aggregation, it is necessary to save energy by avoiding sending the value of each quantity measured by a node independently. Thus, it is a common practice that, through a statistical operation, only a summary of these values is sent from the CH to the BS, so that the energy spent in each bit of a received and aggregated message is defined as in Equation (5):
E R x D A = ( E e l e c + E D A ) · l
where
  • E D A stands for the energy in Joules spent by the CH when it receives and aggregates the data from a contributing node.
  • l is the number of bits of the final aggregated message.

2.4. Simulation Scenarios and Network Model

As mentioned above, the process used three typical WSN scenarios to optimize the weights of the rules, which were also used by other clustering methods for comparison. The dimensions of the node deployment area were the same for the three variants: a square area of 100 × 100 m2, where nodes were randomly placed. The number of nodes deployed was fixed for all scenarios (100 nodes). The main difference between the three scenarios was the location of the BS, which can be observed in Figure 5. The three scenarios can be identified as follows:
  • Scenario 1: BS located at (100, 0) m, a corner of the deployment area.
  • Scenario 2: BS located at (150, 50) m, outside of the sensing area.
  • Scenario 3: BS located at (50, 50) m, in the center of the deployment area.
In addition, the network model used in this approach specifies that each node transmits and receives through a symmetric communication channel without interference. The BS, CH, and contributing nodes used time division media access (TDMA) to send messages in a single-hop transmission directly to the destination. All messages containing information from normal nodes to CHs and from CHs to BS used the minimum power required to reach the destination based on the information the BS knew about the networks. The power consumed by the BS was not considered, because it was assumed that the BS had an unlimited power source. In addition, all nodes had the same initial energy. Finally, the values of the parameters used in the optimization process are shown in Table 2. As can be seen, these parameters belong to the first-order radio model described in Section 2.3.

2.5. Proposed Optimization Algorithm

As was mentioned in Section 2.2, in this paper, we used a scheduling algorithm that fine-tuned the weight of rules within a fuzzy rule-based system [43], in order to obtain three different KBs that tried to optimize the performance and lifetime of the WSN:
  • K B i n i t i a l that maximizes the value of FND.
  • K B i n t e r m e t i a t e that maximizes the value of HND.
  • K B f i n a l that maximizes the value of LND.
The tuning process employed a particle swarm optimization (PSO) strategy, referred to as PSO rule weight tuning (PSO-RWT). The reason for using PSO was its fast convergence, which makes it suitable for and widely used in other clustering methods in WSN [44]). In addition the authors have extensive experience in its use in other optimization problems. PSO-RWT was utilized to enhance the performance of FRBS by optimizing the rules involved. Consequently, each rule R i was multiplied by a weight factor w i (Figure 6). PSO has proven its effectiveness, taking advantage of the stochastic evolution of swarm intelligence and updating particles based on their internal velocities. A similar optimization can be found in [39]. In our proposal, the fitness function was changed to match the sensor network metrics (FND, HND, and LND).
In PSO, each individual, called a ’particle’, navigates within a multidimensional space that represents the search area. The system starts with a set of M particles randomly distributed throughout the n-dimensional search space R N . Additionally, a real-valued function f is defined within this space, serving as the fitness function, f : R N R . This fitness function is defined by the maximum value obtained for the three instants that delimit the interval of use of any of the three new KBs. Thus, for the first KB, the fitness function is the maximum FND; for the second, the maximum HND; and for the third, the maximum LND. Throughout the iterations, the position of each particle is updated with the goal of finding the optimal position where the best value for the fitness function or optimal state is achieved. As mentioned earlier, we chose the maximum value as the fitness function criterion. This positional adjustment was controlled by the components detailed in Equations (6) and (7), which drove the process.
v i ( t + 1 ) = d 0 v i t + d 1 r 1 ( P b i t x i t ) + d 2 r 2 ( G b t x i t )
x i ( t + 1 ) = x i t + v i ( t + 1 )
Here, d 1 and d 2 are constant factors, P b i is the best position that particle i has achieved, and G b i denotes the best position found by the neighbors of particle i. The terms r 1 and r 2 are random factors within the [0, 1] interval, and d 0 is the inertia weight. To ensure the algorithm’s convergence, velocity values v are restricted to the interval [ v m i n , v m a x ]. Another critical factor for convergence is the efficient setting of the inertia weight d 0 . A higher d 0 value promotes global search, whereas a lower value encourages local search. In other words, d 0 can be adjusted to balance both global and local searches, reducing the number of operations needed to find the optimum value. Typically, w is set to decrease over i iterations, intensifying local searches after the entire space has been explored. It is usually initialized with a value close to one. The Table 3 presents the values used for these parameters, assuming a number of 100 for generations ( m a x g e n ).
The proposed algorithm treats a particle as a weight set. A weight set is defined as the parameters that multiply each rule in a fuzzy knowledge base. Thus, a particle is structured as illustrated in Equation (8) (i is the number of particles and n is the number of rules).
P i = w 1 i . . . w n i
The particles are randomly generated, within a limited workspace. Their dimension is fixed and is linked to the number of fuzzy rules. The particles change their position according to the velocity in Equation (1), considering that the velocity of each particle ( V i ) is determined by Equation (6).
V i = V 1 i . . . V n i
Throughout the PSO process, each particle changes its position in the search domain (workspace). Since each particle is composed of a set of rule weights, modifying the particle’s value implies that the set of rule weights has changed. If any of the weights are outside the [0, 1] interval, the value is adjusted. The process continues until the stop condition is reached.
The following algorithm (Algorithm 1) summarizes the proposed scheduling and tuning process based on PSO.
Algorithm 1: PSO-RWT algorithm
              1. Swarm: Num_particles,
                             Num_iter, Init_rate ( r 0 ), Inertial_weight ω , Factors c 1 and c 2 .
              2. Random setting of swarm position.
              3. Random setting of velocity.
              4. Velocity constraints.
              5. Initialize Gbest ( P * )/Pbest ( P # )
          Do
              Do
                  1. Update position. Equation (7).
                  2. Constraints RB-Swarm position.
                              0 | P i | 1
                  3. Evaluate-Fitness. Evaluation system.
                  Particles++
              While (Num_particles)
                  Update Gbest ( P * ).
              Do
                      1. Update Pbest ( P # ).
                      2. Update velocity. Equation (6).
                      3. Velocity constraints.
                  Particles++
              While (Num_particles)
           iter++
          While (Num_iter)
          Return solution: Gbest ( P * )
The process detailed in the PSO-RWT algorithm was repeated three times to obtain the three different KBs enumerated at the beginning of this section. First, the PSO-RWT algorithm was applied for 30 different layouts taken from each of the three scenarios described in Section 2.4 (10 from each scenario), to obtain the weights that maximized the FND, which was the stop condition for this phase, obtaining K B i n i t i a l . Then, the PSO-RWT was repeated, taking K B i n i t i a l as the starting KB, and optimizing the rule weights from the FND until a maximum HND was reached. The new rule weights defined K B i n t e r m e d i a t e . Finally, the PSO-RWT algorithm was executed to obtain the maximum value for LND, using K B i n i t i a l until the FND was reached, K B i n t e r m e d i a t e from FND to HND, and from HND to LND, and PSO-RWT optimized the rule weights to obtain the new K B f i n a l . Therefore, the optimization process produced three different KBs, which were then used by the clustering algorithm in the three stages of the WSN lifetime.
Finally, when the optimization process ended, three different KBs were obtained: each one to be used in a different stage of the WSN lifetime, as mentioned in Section 2.2. Consequently, although three KBs were obtained, this does not mean that the clustering method had three variants, because each KB was only applied in one stage during the lifetime of the WSN. In the next section, we present a comparison of the proposed CFC3PSO clustering method with other algorithms, to contrast their behavior and performance.

3. Results

In order to check whether the optimization process presented in Section 2.5 was adequate for improving the performance of the proposed clustering method for the three types of scenarios described in Section 2.4, this section will detail the results for our approach CFC3PSO in comparison with three other well-known clustering methods and a recent one: (i) Low-Energy Adaptive Clustering Hierarchy (LEACH) [12], (ii) Cluster Head Election mechanism using Fuzzy logic (CHEF) [20], (iii) Clustering Routing protocol for WSN based on type-2 fuzzy logic and ant colony optimization (CRT2FLACO) [45], and (iv) Intelligent Clustering Under Uncertainty (ICUU) [33], which is the newest method. Although LEACH is an old distributed method, it is still used as a pattern for comparisons because it represents a simple mechanism for clustering that only employs stochastic methods to form the cluster. Thus, in LEACH, each node can independently become a CH based on an initial probability and the number of rounds. In CHEF, the authors used a fuzzy system to select the CHs. This fuzzy system has two input variables: the residual energy of each node, and the addition of the distance to every node that is within a predefined range. The third algorithm, CRT2FLACO, uses a centralized Type-2 fuzzy controller with three input variables: the residual energy of each node, the distance between the node and the BS, and the number of neighbors of a node. In addition, it employs ant colony optimization (ACO) to decrease the transmission energy from the CH to the BS. The last method in the comparison was ICUU, which proposes an intelligent clustering mechanism using the silhouette index (SI) score, which is later used as a benchmark for optimized clustering conducted with the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm.
The results were obtained by simulating the five methods (CFC3PSO, LEACH, CHEF, CRT2FLACO, and ICUU) for thirty WSNs generated for each scenario detailed in Section 2.4 that we call a m a p . A m a p contains the records of the locations of the 100 randomly deployed nodes, the position of the BS, and the value of the parameters of the energy model (Section 2.3. We then ran each method for the 30 different maps to obtain the FND, HND, and LND metrics, and finally obtained the mean of each of these metrics for the scenario under test. The simulations were performed in Matlab. The results for each scenario can be seen in Table 4 for scenario 1, where BS was located in a corner of the deployment area; Table 5, with the BS placed outside the area at coordinates (150, 50); and Table 6, with the BS in the center of the area.
As can be seen in Table 4, the proposed method CFC3PSO achieved better results than any of the compared methods for all metrics. Due to the optimization of FND, this metric for CFC3PSO was much better than the others, which suggests that the WSN could operate with all its nodes for longer than any of the other presented approaches. In addition, there was an increment in the value for HND, which was even higher than the LND of two other methods and very similar to the LND of CRT2FLACO and ICUU. Thus, these results show that the optimization performed clearly outperformed the other methods. Finally, the value obtained by CFC3PSO for LND was higher than any other approach. However, it was close to the HND, which means that the nodes had a very low energy after maximizing the HND and consequently they could not live much longer.
In Table 5, we can again see that CFC3PSO outperformed all the other methods compared, with a better value for FND, which was even higher than the LND values of the other approaches. In this case, the values obtained by CFC3PSO for HND and LND were slightly lower than those in scenario 1, due to the distance to the BS, which was located outside the deployment area of the nodes.
For this last scenario (Table 6), the improvement in the metrics caused by CFC3PSO was clearly significant. For FND, the value obtained was more than twice that of LEACH or CRT2FLACO, while it was 30% greater than with CHEF and significantly greater than with ICUU. In this case, the difference between HND and LND was greater than in the other scenarios. Considering HND and LND, CFC3PSO achieved the best results in the three cases because of the location of the BS in the center of the area.
In conclusion, we could establish that with the proposed clustering method CFC3PSO, a WSN that uses a fuzzy controller with an optimized KB for the three stages can achieve better metrics than the other approaches, even those with more complex methods like ICUU or CRT2FLACO, which use a Type-2 fuzzy system (our approach only needs a Type-1 fuzzy system, which requires less computational resources) and an ACO.
In the following subsection, we present the results of applying the previous clustering methods and the proposed CFC3PSO to two new WSN designs, to test the adaptability of the latter method to BS locations other than those used in the optimization process.

Comparison with New Scenarios

The purpose of this section was to validate the adaptability of the proposed CFC3PSO clustering method to WSN deployments that were not included in the optimization process. Therefore, Table 7 and Table 8 show the results for a new set of simulations with the BS located at coordinates (75, 75) and (125, 50), respectively. All other parameters remained unchanged (see Section 2.4).
As can be seen from the results in both tables (Table 7 and Table 8), the proposed method CFC3PSO continued to perform better than any other tested algorithm, significantly improving on the two more complex ones (CRT2FLACO and ICUU). Therefore, the proposed approach proved to be a good solution even for WSN deployments not included in its optimization.

4. Rule Weights Interpretation

This section aims to compare the weights obtained from the optimization process, to analyze them and give a proper interpretation of the three metrics (FND, HND, and LND) and of the three scenarios used. The first part of this section will show some examples of the differences among the weights comparing FND with HND, FND with LND, and finally HND with LND. The last part will present some of the rules that changed their weight depending on the location of the BS to obtain better metric results.

4.1. Metric Comparison

This section presents some examples of rules that received weight values that can be clearly contrasted because they were 0 or 1. Therefore, these values assume that a rule was not evaluated at all (weight 0) or that it was completely meaningful for this stage (weight 1). Note that the weight values for all other rules were between 0 and 1 and can be found at the published dataset (See data availability statement).
In Table 9, three rules can be found that show a significant difference between the weights for FND and HND when the BS was located in the center of the deployment area (Scenario 3). The table shows the weights obtained for K B i n i t i a l or W i n i t i a l and the weights for K B i n t e r m e d i a t e or W i n t e r m e d i a t e .
In this case, the rules in Table 9 were not taken into account in the KB to obtain the best FND, because their weights were 0. However, they should not be removed from the KB because they are needed to maximize the HND in the second stage. In a similar way, in Table 10, the weights for the other three rules can be found (take W f i n a l as the weight obtained from the optimization of K B f i n a l ), which had differences in the optimization process. In this case, the three rules were meaningful to maximize LND, whereas they were not taken into account to obtain the best FND.
The third example of differences in the weights optimized by the PSO-RWT algorithm are shown in Table 11. In this case, the four rules in the table were used to maximize the HND, while they were not considered for the LND.
One conclusion of this first analysis of the results is that fuzzy systems are difficult to design, even more when they have to use a high number of variables with complex layouts. In this case, rule optimization can help to tune the knowledge base and optimize the results. Consequently, as can be seen in Table 12, the knowledge base may sometimes contain rules that are useless for some situations, such as the rules when the base station was located in a corner of the coverage area (scenario 1). However, these rules cannot be removed from the KB, as previously mentioned, because they may be useful for other situations.

4.2. Scenario Comparison

After analyzing the weights obtained for maximizing FND, HND, or LND, in this section, we present some examples of rules that could improve the result for one metric in some scenarios, but not for all, while there were other rules that maximized one metric for all the scenarios.
In Table 13, all the rules that improved the results for FND only for Scenario 1 are enumerated, whereas they were completely useless for the other two.
Moreover, we can find examples of rules that maximized the result of FND for two scenarios (see Table 14) or for all, as can be seen in Table 15. In this last case, it can be observed that, for example, for most rules, the node was at an “adequate” distance from the BS, which means that nodes placed at an intermediate distance help the performance of the network to achieve good metrics. In contrast, in Table 16, the detailed rules were completely useless to maximize FND. We could make similar observations about the other two metrics, HND and LND, but we have summarized the results for FND because the whole set can be found in the link at the beginning of Section 4.1. We should remark that, after the optimization process, there were no rules whose weight was 0 for the three scenarios, consequently, the application of the three stages of KB had no rules without importance for this clustering method.

5. Conclusions

The presented CFC3PSO clustering algorithm was shown to be able to handle three different WSN layouts and achieved better results than the four other clustering algorithms. Consequently, this work proved the premise that a three-stage fuzzy controller based on three different knowledge bases optimized by a PSO can improve on the performance of other clustering methods, without drastically increasing the complexity. Furthermore, the rule weights obtained by the optimization process effectively added a new layer of information to the initial rule base, allowing a more precise definition of the rules for future work. More specifically, first, the presented optimization process based on the PSO-RWT algorithm successfully obtained three knowledge bases by optimizing the weight of its rules to maximize the FND, HND, and LND metrics for three different scenarios, in order to achieve better adaptability for new WSN designs that could have their BSs in different locations than those used in the optimization process. In addition, another contribution of our work was the way in which the three KBs were obtained by defining a three-stage process, where the first KB or K B i n i t i a l is applied by the FRBS until the first node dies, then the second KB or K B i n t e r m e d i a t e is loaded in the fuzzy engine until HND is reached, and finally using the third KB or K B f i n a l to obtain the maximum WSN lifetime.
Overall, in this paper, we presented a centralized clustering method that minimizes the communication between nodes based on a type-1 FRBS whose optimized KBs vary during the three stages. This proposal achieved significantly better results than the other compared methods and suggested an improvement due to the tuning of the knowledge base by the PSO-RWT algorithm, which detected which rules were more or less meaningful for each stage and scenario.
As future lines of work, we propose changing the FRBS from a Mamdani to a Takagi–Sugeno–Kang type [46], whose functional output is suitable for optimization by the PSO-RWT algorithm. Moreover, we could explore additional design parameters for the presented approach, such as increasing the s k i p from 1 to a higher value, which could reduce the number of transmissions from the BS to the nodes in order to reduce the reception energy cost, taking into account that a too high s k i p value reduces the CH rotation, which could lead to premature deaths, so this parameter is also suitable for being optimized. In addition, the results obtained after the optimization process, in terms of the weights for each rule of the KB, could be tested under other WSN conditions, to check how these weights improved the lifetime of other WSN layouts.

Author Contributions

Conceptualization, A.-J.Y.-D. and J.-E.M.-E.; methodology, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; software, A.-J.Y.-D., J.-E.M.-E. and J.-C.C.-M.; validation, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; formal analysis, A.-J.Y.-D., J.-E.M.-E. and J.-C.C.-M.; investigation, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; resources, A.-J.Y.-D., J.-E.M.-E. and J.-C.C.-M.; data curation, A.-J.Y.-D., J.-E.M.-E. and J.-C.C.-M.; writing—original draft preparation, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; writing—review and editing, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; visualization, A.-J.Y.-D., J.-E.M.-E., J.-C.C.-M. and A.T.-C.; supervision, A.-J.Y.-D. and J.-C.C.-M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The dataset can be found in https://ruja.ujaen.es/jspui/handle/10953/3168 (accessed on 28 July 2024) of the public Institutional Repository of Scientific Production of the University of Jaén.

Acknowledgments

We are grateful to the University of Jaén for their support with the article processing charges through the Institutional Open Access Program (IOAP) of the Multidisciplinary Digital Publishing Institute (MDPI).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Guiloufi, A.B.; El Khediri, S.; Nasri, N.; Kachouri, A. A comparative study of energy efficient algorithms for IoT applications based on WSNs. Multimed. Tools Appl. 2023, 82, 42239–42275. [Google Scholar] [CrossRef]
  2. Zheng, K.; Luo, R.; Liu, X.; Qiu, J.; Liu, J. Distributed DDPG-Based Resource Allocation for Age of Information Minimization in Mobile Wireless-Powered Internet of Things. IEEE Internet Things J. 2024, 11, 29102–29115. [Google Scholar] [CrossRef]
  3. Rejeb, A.; Rejeb, K.; Simske, S.; Treiblmaier, H.; Zailani, S. The big picture on the internet of things and the smart city: A review of what we know and what we need to know. Internet Things 2022, 19, 100565. [Google Scholar] [CrossRef]
  4. Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C.W. Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef]
  5. Singh, P.K.; Sharma, A. An intelligent WSN-UAV-based IoT framework for precision agriculture application. Comput. Electr. Eng. 2022, 100, 107912. [Google Scholar] [CrossRef]
  6. Maraveas, C.; Piromalis, D.; Arvanitis, K.G.; Bartzanas, T.; Loukatos, D. Applications of IoT for optimized greenhouse environment and resources management. Comput. Electron. Agric. 2022, 198, 106993. [Google Scholar] [CrossRef]
  7. Akyildiz, I.F.; Vuran, M.C. Wireless Sensor Networks; John Wiley & Sons: Chichester, UK, 2010. [Google Scholar]
  8. Miles, B.; Bourennane, E.B.; Boucherkha, S.; Chikhi, S. A study of LoRaWAN protocol performance for IoT applications in smart agriculture. Comput. Commun. 2020, 164, 148–157. [Google Scholar] [CrossRef]
  9. Tripathi, Y.; Prakash, A.; Tripathi, R. A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network. Digit. Commun. Netw. 2022, 8, 351–358. [Google Scholar] [CrossRef]
  10. Kaur, M.; Munjal, A. Data aggregation algorithms for wireless sensor network: A review. Ad Hoc Netw. 2020, 100, 102083. [Google Scholar] [CrossRef]
  11. Shahraki, A.; Taherkordi, A.; Haugen, Ø.; Eliassen, F. Clustering objectives in wireless sensor networks: A survey and research direction analysis. Comput. Netw. 2020, 180, 107376. [Google Scholar] [CrossRef]
  12. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000; Volume 2, p. 10. [Google Scholar] [CrossRef]
  13. Neamatollahi, P.; Naghibzadeh, M.; Abrishami, S. Fuzzy-Based Clustering-Task Scheduling for Lifetime Enhancement in Wireless Sensor Networks. IEEE Sens. J. 2017, 17, 6837–6844. [Google Scholar] [CrossRef]
  14. Yuste-Delgado, A.J.; Cuevas-Martínez, J.C.; Triviño-Cabrera, A. Statistical Normalization for a Guided Clustering Type-2 Fuzzy System for WSN. IEEE Sens. J. 2022, 22, 6187–6195. [Google Scholar] [CrossRef]
  15. Gong, Y.; Li, Y.; Ping, S.; Wang, J. An Energy-Efficient Centralized Node Status Maintenance Protocol for Cluster-Based WSNs. IEEE Wirel. Commun. Lett. 2024, 13, 2185–2189. [Google Scholar] [CrossRef]
  16. Roselin, J.; Latha, P.; Benitta, S. Maximizing the wireless sensor networks lifetime through energy efficient connected coverage. Ad Hoc Netw. 2017, 62, 1–10. [Google Scholar] [CrossRef]
  17. Thiagarajan, R. Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks. Comput. Commun. 2020, 149, 90–98. [Google Scholar] [CrossRef]
  18. Gaidhani, A.R.; Potgantwar, A.D. A Review of Machine Learning-Based Routing Protocols for Wireless Sensor Network Lifetime. Eng. Proc. 2023, 59, 231. [Google Scholar] [CrossRef]
  19. Zhang, F.; Zhang, Q.Y.; Sun, Z.M. ICT2TSK: An improved clustering algorithm for WSN using a type-2 Takagi-Sugeno-Kang Fuzzy Logic System. In Proceedings of the 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), Kuching, Malaysia, 22–25 September 2013; pp. 153–158. [Google Scholar] [CrossRef]
  20. Gupta, I.; Riordan, D.; Sampalli, S. Cluster-head election using fuzzy logic for wireless sensor networks. In Proceedings of the 3rd Annual Communication Networks and Services Research Conference (CNSR’05), Halifax, NS, Canada, 16–18 May 2005; pp. 255–260. [Google Scholar] [CrossRef]
  21. Abu Taleb, A.; Abu Al-Haija, Q.; Odeh, A. Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs. Future Internet 2023, 15, 182. [Google Scholar] [CrossRef]
  22. Verma, S.; Bhatia, S.; Zeadally, S.; Kaur, S. Fuzzy-based techniques for clustering in wireless sensor networks (WSNs): Recent advances, challenges, and future directions. Int. J. Commun. Syst. 2023, 36, e5583. [Google Scholar] [CrossRef]
  23. Mondal, S.; Ghosh, S.; Khatua, S.; Biswas, U.; Das, R.K. Energy efficient algorithms for enhancing lifetime in wireless sensor networks. Microsyst. Technol. 2022, 28, 2593–2610. [Google Scholar] [CrossRef]
  24. Kiani, F.; Seyyedabbasi, A.; Nematzadeh, S. Improving the performance of hierarchical wireless sensor networks using the metaheuristic algorithms: Efficient cluster head selection. Sens. Rev. 2021, 41, 368–381. [Google Scholar] [CrossRef]
  25. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  26. Zadeh, L.A. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975, 8, 199–249. [Google Scholar] [CrossRef]
  27. Pan, Y.; Wu, Y.; Lam, H.K. Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme. IEEE Trans. Fuzzy Syst. 2022, 30, 4359–4368. [Google Scholar] [CrossRef]
  28. Mansour, H.S.; Mutar, M.H.; Aziz, I.A.; Mostafa, S.A.; Mahdin, H.; Abbas, A.H.; Hassan, M.H.; Abdulsattar, N.F.; Jubair, M.A. Cross-Layer and Energy-Aware AODV routing protocol for flying Ad-hoc networks. Sustainability 2022, 14, 8980. [Google Scholar] [CrossRef]
  29. Al Sumarmad, K.A.; Sulaiman, N.; Wahab, N.I.A.; Hizam, H. Energy management and voltage control in microgrids using artificial neural networks, PID, and fuzzy logic controllers. Energies 2022, 15, 303. [Google Scholar] [CrossRef]
  30. Triviño, A.; López, A.; Yuste, A.J.; Cuevas, J.C. Decentralized EV charging and discharging scheduling algorithm based on Type-II fuzzy-logic controllers. J. Energy Storage 2024, 93, 112054. [Google Scholar] [CrossRef]
  31. Zhang, H.; Wang, L.; Shi, W. Seismic control of adaptive variable stiffness intelligent structures using fuzzy control strategy combined with LSTM. J. Build. Eng. 2023, 78, 107549. [Google Scholar] [CrossRef]
  32. Balaji, S.; Golden Julie, E.; Harold Robinson, Y. Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mob. Netw. Appl. 2019, 24, 394–406. [Google Scholar] [CrossRef]
  33. Sahoo, L.; Sen, S.; Tiwary, K.; Moslem, S.; Senapati, T. Improvement of Wireless Sensor Network Lifetime via Intelligent Clustering under Uncertainty. IEEE Access 2024, 12, 25018–25033. [Google Scholar] [CrossRef]
  34. Melo Silva, A.M.; Maciel, C.C.; do Carmo Correa, S. Multi-hop Energy-efficient Control for Heterogeneous Wireless Sensor Networks Using Fuzzy Logic. arXiv 2014, arXiv:1401.5163. [Google Scholar]
  35. Arjunan, S.; Sujatha, P. Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Appl. Intell. 2018, 48, 2229–2246. [Google Scholar] [CrossRef]
  36. Ullah, A.; Khan, F.S.; Mohy-ud din, Z.; Hassany, N.; Gul, J.Z.; Khan, M.; Kim, W.Y.; Park, Y.C.; Rehman, M.M. A Hybrid Approach for Energy Consumption and Improvement in Sensor Network Lifespan in Wireless Sensor Networks. Sensors 2024, 24, 1353. [Google Scholar] [CrossRef] [PubMed]
  37. El Khediri, S.; Selmi, A.; Khan, R.U.; Moulahi, T.; Lorenz, P. Energy efficient cluster routing protocol for wireless sensor networks using hybrid metaheuristic approache’s. Ad Hoc Netw. 2024, 158, 103473. [Google Scholar] [CrossRef]
  38. Cuevas-Martinez, J.C.; Yuste-Delgado, A.J.; Leon-Sanchez, A.J.; Saez-Castillo, A.J.; Triviño-Cabrera, A. A New Centralized Clustering Algorithm for Wireless Sensor Networks. Sensors 2019, 19, 4391. [Google Scholar] [CrossRef] [PubMed]
  39. Wang, C. A Distributed Particle-Swarm-Optimization-Based Fuzzy Clustering Protocol for Wireless Sensor Networks. Sensors 2023, 23, 6699. [Google Scholar] [CrossRef]
  40. Pedrycz, W. Why triangular membership functions? Fuzzy Sets Syst. 1994, 64, 21–30. [Google Scholar] [CrossRef]
  41. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  42. Dhand, G.; Tyagi, S. Data aggregation techniques in WSN: Survey. Procedia Comput. Sci. 2016, 92, 378–384. [Google Scholar] [CrossRef]
  43. Cordon, O.; Herrera, F.; Hoffmann, F.; Magdalena, L. Genetic Fuzzy Systems: Evolutionary Tuning and Learning of Fuzzy Knowledge Bases; World Scientific: London, UK, 2001; Volume 19. [Google Scholar]
  44. Sharma, R.; Vashisht, V.; Singh, U. Metaheuristics-based energy efficient clustering in WSNs: Challenges and research contributions. IET Wirel. Sens. Syst. 2020, 10, 253–264. [Google Scholar] [CrossRef]
  45. Xie, W.X.; Zhang, Q.Y.; Sun, Z.M.; Zhang, F. A clustering routing protocol for WSN based on type-2 fuzzy logic and ant colony optimization. Wirel. Pers. Commun. 2015, 84, 1165–1196. [Google Scholar] [CrossRef]
  46. Takagi, T.; Sugeno, M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 1985, SMC-15, 116–132. [Google Scholar] [CrossRef]
Figure 1. Clustering algorithm classification in WSN applications.
Figure 1. Clustering algorithm classification in WSN applications.
Sensors 24 05548 g001
Figure 2. Fuzzy inference system.
Figure 2. Fuzzy inference system.
Sensors 24 05548 g002
Figure 3. Fuzzy set layout for our clustering method.
Figure 3. Fuzzy set layout for our clustering method.
Sensors 24 05548 g003
Figure 4. Optimizing the rule weights for the three KBs.
Figure 4. Optimizing the rule weights for the three KBs.
Sensors 24 05548 g004
Figure 5. Simulation scenarios.
Figure 5. Simulation scenarios.
Sensors 24 05548 g005
Figure 6. Fuzzy rule-based system.
Figure 6. Fuzzy rule-based system.
Sensors 24 05548 g006
Table 1. Samples of rules in the KB.
Table 1. Samples of rules in the KB.
dBSCNDRECHRWeightOutput
CLLLM1llm
AHHMM1ls
FHHHH1s
Table 2. Values of the setup parameters for the energy model.
Table 2. Values of the setup parameters for the energy model.
ParameterValue
Initial energy of nodes0.5 J
Length of control message200 bits
Length of data message2000 bits
E e l e c 50 nJ/bit
E D A 5 nJ/bit
E f s 10 pJ/bit/m2
E m p 0.0013 pJ/bit/m4
Table 3. PSO parameters.
Table 3. PSO parameters.
d 0 d 1 d 2 maxgen
e 1 ( i m a x g e n ) 2 12100
Table 4. Results with the BS located in the corner of the deployment area.
Table 4. Results with the BS located in the corner of the deployment area.
AlgorithmsFNDHNDLND
LEACH754.2905.31002.1
CHEF1414.31766.31827
CRT2FLACO671.31596.82148.4
ICUU13971900.72115.9
CFC3PSO1827.32117.72222.5
Table 5. Results with the BS located at coordinates (150, 50) m.
Table 5. Results with the BS located at coordinates (150, 50) m.
AlgorithmFNDHNDLND
LEACH713.1841.03994.46
CHEF1379.41753.11785.5
CRT2FLACO604.11479.41837.4
ICUU1231.91769.62040.6
CFC3PSO1868.51972.72067.4
Table 6. Results with the BS placed in the center of the deployment area.
Table 6. Results with the BS placed in the center of the deployment area.
AlgorithmFNDHNDLND
AlgorithmFNDHNDLND
LEACH764.8936.51020
CHEF1402.21767.91827.2
CRT2FLACO510.91713.42183.4
ICUU1502.71984.72153.1
CFC3PSO1847.22198.12344.7
Table 7. Results for the BS placed at x = 75 m and y = 75 m.
Table 7. Results for the BS placed at x = 75 m and y = 75 m.
AlgorithmFNDHNDLND
LEACH764.1931.21019.4
CHEF1403.61775.71816.7
CRT2FLACO749.51707.62199.1
ICUU1485.31966.42145
CFC3PSO1800.62116.82359.6
Table 8. Results with the BS placed at x = 125 m and y = 50 m.
Table 8. Results with the BS placed at x = 125 m and y = 50 m.
AlgorithmFNDHNDLND
leach744897.11007.5
chef2014031769.31811.4
CRT2FLACO6391602.22040
ICUU1366.31885.72097.4
CFC3PSO1808.32064.12223.9
Table 9. FND versus HND. BS in center.
Table 9. FND versus HND. BS in center.
dBSCNDRECHROutput W initial W intermediate
CHLHLhm01
ALHMMm01
CHLHMls01
Table 10. FND versus LND. BS in center.
Table 10. FND versus LND. BS in center.
dBSCNDRECHROutput W initial W final
CMHMLhm01
FHLMHm01
FMMMHm01
Table 11. HND versus LND. BS in center.
Table 11. HND versus LND. BS in center.
dBSCNDRECHROutput W intermediate W final
FHMMHhm10
ALHHHls10
CMMLMm10
CLMLLllm10
Table 12. Rules whose weights were null for the three KBs for Scenario 1.
Table 12. Rules whose weights were null for the three KBs for Scenario 1.
dBSCNDRECHROutput
FMHLLllm
CLMMLlm
CLLHLlm
ALHLMlm
FMMMMlm
ALHMMm
CHMHMs
FLLMHllm
AMLHHhm
CMMHHs
Table 13. Rules that optimized FND for Scenario 1 but not for 2 and 3.
Table 13. Rules that optimized FND for Scenario 1 but not for 2 and 3.
dBSCNDRECHROutput
FMMHLlm
AMLLMllm
ALHLHm
CMHMHs
AMHMHls
Table 14. Rules that optimized FND for Scenario 1 and 2 but not for 3.
Table 14. Rules that optimized FND for Scenario 1 and 2 but not for 3.
dBSCNDRECHROutput
dBSCNDRECHROutput
FMMLLw
ALLHLllm
CLHMMhm
Table 15. Rules that optimized FND for all the scenarios.
Table 15. Rules that optimized FND for all the scenarios.
dBSCNDRECHROutput
ALHLLllm
AHLHLm
AHMHLhm
FMLLMw
AHMHMls
ALHHMhm
Table 16. Rules that were not meaningful for FND for all the scenarios.
Table 16. Rules that were not meaningful for FND for all the scenarios.
dBSCNDRECHROutput
ALHLLllm
AHLHLm
AHMHLhm
FMLLMw
AHMHMls
ALHHMhm
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Muñoz-Exposito, J.-E.; Yuste-Delgado, A.-J.; Triviño-Cabrera, A.; Cuevas-Martinez, J.-C. Optimizing Rule Weights to Improve FRBS Clustering in Wireless Sensor Networks. Sensors 2024, 24, 5548. https://doi.org/10.3390/s24175548

AMA Style

Muñoz-Exposito J-E, Yuste-Delgado A-J, Triviño-Cabrera A, Cuevas-Martinez J-C. Optimizing Rule Weights to Improve FRBS Clustering in Wireless Sensor Networks. Sensors. 2024; 24(17):5548. https://doi.org/10.3390/s24175548

Chicago/Turabian Style

Muñoz-Exposito, Jose-Enrique, Antonio-Jesus Yuste-Delgado, Alicia Triviño-Cabrera, and Juan-Carlos Cuevas-Martinez. 2024. "Optimizing Rule Weights to Improve FRBS Clustering in Wireless Sensor Networks" Sensors 24, no. 17: 5548. https://doi.org/10.3390/s24175548

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop